|
||||
T1. Managing Future Radiomobile and Wireless Networks through Reconfigurable Radio systems T2. Mobile Phone Security, Interception and Forensics
DETAILS
T1. Managing Future Radiomobile and Wireless Networks through Reconfigurable Radio systems In the past decades many wireless and mobile access technologies were standardized and deployed in different countries. Starting from GSM, the European digital system designed to offer voice service in seamless mobility, the evolution of mobile networks was towards multimedia services and higher bandwidth. Data transmission is evolving from a few cents of kbit/s with UMTS up to tens of Mbit/s with HSPA+ and cents of Mbit/s with LTE. Besides, other wireless networks with different degrees of performances and portability are being deployed: wireless LANs, WiMAX, mesh networks, sensor networks, etc. The tutorial describes how this multiplicity of Radio Access Technologies (RAT) can be integrated in a multi-standard Reconfigurable Radio System (RRS), deployed in network centric, ad hoc, mesh and distributed architectures, by using both licensed and unlicensed frequency bands. It is shown that, with the availability of reconfigurable nodes, the network operator will be able to efficiently manage the radio and processing resource pool, with cost reductions in network deployment, operation and maintenance.
T2. Mobile Phone Security, Interception and Forensics The tutorial has all the necessary theoretical and practical background for the topic. Security and secrets of mobile phones will be discussed, in software and hardware level. Interception, fraud and other malicious techniques “against” their users will be analyzed. Audience will be able to understand fraudsters’ modus operandi and will be presented with protection methods. Participants will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. There will be hands-on parts, where the techniques will be demonstrated live. Finally, an actual implementation-demonstration of interception of voice and sms with specific equipments will take place (law permitting - otherwise it will be presented in video). Outline: Introduction |
||||
Copyright (c) 2006-2011, IARIA