KEYWORDS: Global system for mobile communications, Standards development, Receivers, Environmental sensing, Antennas, Networks, Received signal strength, Telecommunications, RF communications, Data communications
Network environment challenges on identifying and direction finder of the emission sources can be performed in several different ways, depending on the spectral inter-frequency and of the equipment used. The tests performed that are still under development will show that there are many different scenarios that may lead to large difficulties in indoor locating of the radio equipment that are registered in standard mobile networks. Therefore, in this paper, we intend to test different receivers from different mobile communication standards with respect to the possibility of identifying and localization and to see the advantages and disadvantages of each generation of standards with respect to this issue.
The purpose of this paper is to validate the existence of vulnerabilities in computer networks - wireless networks which have in their architecture Windows operating systems. In order to demonstrate the vulnerabilities that still exist in windows 10 and windows 11 operating systems, the NetBIOS Name Service, Link Local Multicast Name Resolution, multicast DNS and WPAD protocols will be exploited. By exploiting these protocols, users' access credentials to the systems can be obtained. At the same time, we will propose a series of solutions that will reduce the chances of exploiting these protocols, to increase the security level of the network. Another role of this paper is to show that the use of Wi-Fi networks for the purpose of conveying confidential data is still unsafe. It also highlights the fact that improper use of the operating system Windows can lead to obtaining access data to an attacker who does not need powerful resources. The WPA2 protocol will be exploited to gain access to network resources, to subsequently formulate a series of conclusions aimed at inhibiting or completely reducing these security issues.
Within this paper the authors intend to measure and evaluate the parameters of a WiMax BTS when different interference conditions are existing within its operating area. The measurements were performed in laboratory conditions, in the semianechoic chamber. The effect of variable intensity disturbance interference on the emission parameters of a WiMax base station were measured and analyzed. As a result of these measurements, several situations were analyzed and a number of interesting conclusions were drawn. These measurements have been developed in order to evaluate the effect of a of disruptive interference on the quality of the transmitted signal, as well as the importance of detecting, measuring and analyzing the interference effect on the transmitted signal in different use-case scenarios. The narrowband disturbance signal, with variable intensity, was generated on the 3.623 GHz frequency with the SME 03 Rohde and Schwarz signal generator. Parameter measurements and spectral evaluations were performed with the Anritsu Master Spectrum 2723C spectrum analyzer, tuned to the frequency 3.623 GHz, using transmission and reception antennas in the respective band. An Airspan MacroMAXe-4RX base station, 3600-3700 MHz frequency band, with 5 MHz bandwidth, was used to perform the tests.
KEYWORDS: Global system for mobile communications, Standards development, Networks, Cell phones, Network security, Receivers, Algorithm development, Mobile communications, Telecommunications
The rapid development of the telecommunication standards, which are getting close to the implementation of the 5th generation now (5G) leads to us to neglect the GSM standard, where there are still vulnerabilities that can be exploited by attackers. The purpose of this paper is to demonstrate step by step the authentication in GSM, of mobile subscribers, technical parameters and vulnerabilities identified in this process, with practical measurements. In Romania, GSM is used by the Operators as a backup network, or to cover with signal long areas (in the mountains) where there is no specific (high data rate transfer) demands from the users. Based on the results obtained a number of interesting conclusions are drawn.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.