Walter T. Penzhorn

Learn More
—This paper presents an in-depth analysis and evaluation of the security of UMTS. Four classes of attacks and threats are discussed in detail. Thereafter, the available security mechanism and services of UMTS are reviewed and evaluated. It is found that most of the potential attacks and threats can be thwarted by the available security services and(More)
—Existing communication utilities, such as the ISO/OSI model and the associated automation pyramid, have limitations regarding the increased complexity of modern automation systems. The introduction of profiles for fieldbus systems, or field-area networks (FANs), was an important innovation. However, in the foreseeable future the number of FAN nodes in(More)
— In this paper we propose architecture and design methodology for the Inter-Domains Security Management (IDSM) Model for the IP Multimedia System (IMS) [1] which is standardized by Third Generation Partnership Project (3GPP) [2] and 3GPP2 [3] as Next Generation Mobile Networks. The IDSM Model is based on Trust Domain Relationship between different network(More)
  • 1