ABSTRACT

CONTENTS 1.1 UMA: Brief History and Evolution ..................................................................... 4

1.1.1 UMA Architecture ................................................................................. 5 1.1.2 UMA Services........................................................................................ 5 1.1.3 Benefits of UMA for Mobile Operators and Service Providers Benefit........... 7

1.2 UMAThreat Analysis ........................................................................................ 8 1.2.1 Different UMAThreats and Possible Attacks ............................................. 8 1.2.2 UMA Security Requirements ................................................................... 9 1.2.3 Security Countermeasures in UMA ........................................................ 10

1.3 UMA Security Solutions .................................................................................. 10 1.3.1 Standard Security Solutions ................................................................... 10

1.3.1.1 Protecting UMA ................................................................... 10 1.3.1.2 User Authentication............................................................... 12 1.3.1.3 Data Encryption ................................................................... 12 1.3.1.4 Mobile Packet Core Protection................................................ 13 1.3.1.5 GSM Security Mechanisms..................................................... 13

1.3.2 Security Gateways: Proprietary Solutions ................................................ 13 1.3.2.1 nCite Security Gateway .......................................................... 14 1.3.2.2 Reef Point UMA Security Gateway.......................................... 14 1.3.2.3 VPN-1 MASS Security Gateway ............................................. 15

1.4 Implications of UMA for GSM Security ............................................................ 15

1.4.1 Impact of Open Platforms..................................................................... 15 1.4.2 Countermeasures for Mitigating Threats in Open Platforms...................... 16

1.5 Conclusion and Outlook ................................................................................. 16 Acknowledgment .................................................................................................... 17 References .............................................................................................................. 17

Unlicensed mobile access (UMA) technology was born from the requirements of mobile integrated operators to deliver high-performance, low-cost, mobile voice and data services to subscribers at home and the office. With UMA, mobile operators can leverage the cost and performance advantages of Internet Protocol (IP) access technologies of fixed networks (DSL, cable, Wi-Fi, etc.) to deliver good-quality, low-cost, mobile voice and data services in locations where subscribers spend most of their time (home and office). Another trend in UMA technology is to extend the technology beyond homes and offices, precisely to hot spot areas.