{"title":"Security Architecture for Third Generation (3G) using GMHS Cellular Network","authors":"A. Jalal, I. Uddin","doi":"10.1109/ICET.2007.4516319","DOIUrl":null,"url":null,"abstract":"This paper presents the standardized effects of GMHS (Global Mobile Home Security) technology to achieve high security reasons using transmission of data (queries and data calls) in cellular networks. GMHS make use of the mobile's SMS and 3G services conducting the two-way communication between the primary user and the Security device. This operation is conducted by verifying the primary cellular number along with the security pin code and the query. The device has been made capable to alert user, of any change occurring intentionally and unintentionally, making it more secure and friendly. The results show the performance with respect to service conditions as the service is mainly depend upon the cellular network being used as the medium for queries.","PeriodicalId":346773,"journal":{"name":"2007 International Conference on Emerging Technologies","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"53","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Emerging Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICET.2007.4516319","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 53
Abstract
This paper presents the standardized effects of GMHS (Global Mobile Home Security) technology to achieve high security reasons using transmission of data (queries and data calls) in cellular networks. GMHS make use of the mobile's SMS and 3G services conducting the two-way communication between the primary user and the Security device. This operation is conducted by verifying the primary cellular number along with the security pin code and the query. The device has been made capable to alert user, of any change occurring intentionally and unintentionally, making it more secure and friendly. The results show the performance with respect to service conditions as the service is mainly depend upon the cellular network being used as the medium for queries.