Get the complete project »
- The Complete Research Material is averagely 152 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: MTech, MSc or PhD.
- Full Access Fee: ₦8,000
With the increasing use of extensive IT and Telecommunication systems for sensitive or safety-critical applications, the matter of IT and Telecommunication security is becoming more important. For the computer system, and its related applications, including data, to be trustworthy, it must be secured. This project covers all aspects of Computer System security. This project equally understudied the security of data as it affects mobile systems vis-à-vis Global System for Mobile Telecommunications (GSM). The existing security algorithms in the GSM network were understudied and critical flaws found in them that cannot guarantee the security and confidentiality of user’s data during communication session. This poses a great threat in sensitive and safety-critical environments such as financial institutions, Military, Educational, or even in espionage establishments such as State Secret Services (SSS) and security establishments. This Masters project finally proffered solution to these flaws found in GSM security system by adopting a software-based approach. A computer-based program was written in JAVA programming language to provide end-to-end data (SMS only) encryption in two-way communication using compatible MIDP mobile phones or other portable communication devices.
1.0 Background to the Study
The term security lacks meaning until one has defined what is to be secured and for whom. Likewise, security is difficult to comprehend without a potential threat. Mobile phones for third-generation mobile systems (3G) have several security stakeholders for which the mobile platform must provide security services. Moreover, the potential threats may differ from stakeholder to stakeholder.
The first class of security stakeholders, users, expects that mobile phones will offer secure and reliable communication – that is, they assume their phones can be trusted to handle sensitive tasks, such as e-commerce transactions. The main threats to this class of stakeholders are malicious software, such as viruses and Trojans, or weak or misbehaving security mechanisms. The second class of stakeholders, mobile network operators, relies on phone network identification mechanisms (related to billing capability) and network-related software.
Criminal-minded users or hostile software must not be allowed to circumvent these mechanisms.
Operators thus require that the integrity of software can be guaranteed when the mobile phone is in operation. They also want to be certain that users cannot break SIM lock mechanisms.
A third class of security stakeholders, content providers, wants to be paid for the content (music, pictures, videos and software) that users download. It also wants to know that
users cannot (mis)use their phones to illegally copy or distribute content. This is where digital rights management (DRM) functions come into play. However, DRM mechanisms alone cannot provide all necessary security. To provide a DRM solution that meets content provider requirements, the mobile phone platform must contain security functions that guarantee secure execution and code integrity.
Security is usually measured in terms of a set of basic aspects :
- authentication and
Confidentiality is ensuring that the data is hidden from those that are not supposed to see it.
Confidentiality of data is achieved by cryptographically transforming original data, often called, plaintext, into cipher text, which hides the content of plaintext. This operation is realized as a parameterized transformation that keeps the controlling parameter secret. The controlling parameter is often called a key. The transformation is called encryption. With a key it is easy to perform the inverse transform or decryption. Without the key, decryption would be difficult.
Integrity is about ensuring that data has not been replaced or modified without authorization during transport or storage. This is achieved using cryptographic transforms and a key. Additional information must also be added to the plaintext to verify its integrity.
Authentication is the procedure by which a unit (the claimant) convinces another unit (the verifier) of its (correct) identity. Authentication is different from authorization, which is the process of giving a person or entity permission to do or have access to something.
Non-repudiation is ensuring that someone who sent a message does not deny that he is the one that sent it by using security processes such as digital signature.
There are two major classes of cryptographic mechanisms: symmetric and asymmetric. In symmetric mechanisms, the same key is used for encryption and decryption. Examples of symmetric confidentiality mechanisms are
• block ciphers, such as DES and AES; and
• stream ciphers, such as the GSM A1, A2 and A3 algorithms.
Integrity is often protected using symmetric mechanisms. Integrity-protection algorithms are also called message authentication codes (MAC). The most popular MAC is the HMAC algorithm. Because the key in symmetric mechanisms can be used to decrypt content, it must be kept secret from all but legitimate users of the encryption scheme.
Asymmetric mechanisms use separate pairs of keys for encryption transform and decryption transform. The public key can be made publicly available, but the private key must never be revealed. Asymmetric mechanisms are typically used for distributing keys (for example, a symmetric key) or for digital signing purposes. A public key can be used to encrypt a symmetric key, which in turn, can only be decrypted by the legitimate
You either get what you want or your money back. T&C Apply
You can find more project topics easily, just search
SIMILAR ELECTRICAL ENGINEERING FINAL YEAR PROJECT RESEARCH TOPICS
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF REPORT Motion detector is a two jointed word which are simply motion and detector, all these pairs of words...Continue Reading »
» CHAPTER ONE INTRODUCTION · BACKGROUND INFORMATION As the world becomes concerned with conserving electric power and the fuels that generate electrici...Continue Reading »
3. DESIGN AND IMPLEMENTATION OF A MICROCONTROLLER-BASED VERSATILE Y- AND CROSS-JUNCTION TRAFFIC LIGHT CONTROL SYSTEM/TRAINER» ABSTRACT A microcontroller based Versatile Traffic Light Control System/Trainer has been designed and implemented in the course of this project. The s...Continue Reading »
» ABSTRACT This work is designed to provide assistance in engaging and overcoming challenges involved in troubleshooting and maintenance of local area n...Continue Reading »
5. TO HARNESS THE ABUNDANT AND FREE SOLAR ENERGY DURING THE DAY TIME AND CONVERT IT TO ELECTRICAL ENERGY THAT WILL BE USED TO POWER SOME COMPONENTS OF AN...» CHAPTER ONE 1.0 BACKGROUND OF STUDY A solar cell is an electronic device that converts the sunlight energy directly into electric energy without any f...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.1 Background of study Has technology transformed humankind into omniscient being? Years back, communication was done throug...Continue Reading »
7. DESIGN AND IMPLEMENTATION OF A CONGESTION CONTROL SYSTEM FOR MULTI USER TELECOMMUNICATION NETWORK» CHAPTER ONE 1.0 INTRODUCTION 1.1 BACKGROUND OF THE STUDY The world is fast becoming a global village and a necessary tool for this process is communic...Continue Reading »
8. A SURVEY OF FACTORS AFFECTING ELECTRICAL/ELECTRONIC TRADE STUDENTS’ ACHIEVEMENT IN NATIONAL TECHNICAL CERTIFICATE (NTC) EXAMINATION IN TECHNICAL COL...» TABLE OF CONTENTS TITLE PAGE i CERTIFICATION ii APPROVAL PAGE iii DEDICATION iv ACKNOWLEDGEMENT v TABLE OF CONTENTS vi LIST OF TABLES ix LIST OF APPEN...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.0 BACKGROUND The project “automatic water level control with an automatic pump control system” is design to mon...Continue Reading »
» ABSTRACT A microcontroller Based Versatile Stepper Motor System/Trainer has been designed and implemented in this project. The developed prototype was...Continue Reading »