Deliverable 02 - Initial report on security
requirements |
This is a report collating and analysing initial requirements on UMTS
security migration, security services and for fraud management. It is based
on the views of users, service providers, network operators and regulatory
bodies. |
Deliverable 04 - Report on the use of
UIMs for UMTS |
This deliverable reports on the work undertaken by WP2.4 in Year 1,
including a preliminary view of the UIM migration path, security requirements
on multi-application cards, a review of physical constraints on smart cards,
and an initial study of the feasibility of alternative user-UIM authentication
methods. |
Deliverable 05 - Migration scenarios |
This report outlines the possibilities for the migration path from
second-generation systems to UMTS, to enable a more detailed set of security
requirements to be established than were available in D02. |
Deliverable 06 - Definition of fraud
detection concepts |
This was the main deliverable from WP2.2 in Year 1, giving the results
of investigations into typical ways in which fraud occurs, and identifying
fraud indicators. The different possible approaches are described and an
initial evaluation of their suitability made. |
Deliverable 08 - Fraud management
tool: First prototype |
These initial tools were used to establish the feasibility of different
approaches to detecting and preventing fraud in mobile networks. Enough
functionality was included to determine whether the approach - rule-based
or neural network - was suited to the application. |
Deliverable 09 - Trusted third party
services: First implementation |
The specification in D07 was implemented to allow a simple demonstration
of the services that could be provided and verify the operation of the
key management mechanisms. |
Deliverable 10
- Secure billing: First implementation |
This deliverable contains a demonstration of the protocol between user
and the network side providing the non-repudiation service required for
secure billing. |
Deliverable 11 - Report on limiting
smart card constraints on UIMs |
This report identifies current and future physical constraints on smart
cards relevant to the UMTS UIM, and assesses the impact on UIM functionality. |
Deliverable 12 - Migration scenario:
First implementation |
After the detailed investigation on security aspects of different migration
scenarios, this report identifies which are feasible. |
Deliverable 13 - Fraud management tool:
Evaluation report |
The trials of the first implementation of the fraud management tools
are evaluated. |
Deliverable 14 - Trusted third parties:
Evaluation report |
Feedback from users and other parties on the initial end-to-end security
service demonstration are reviewed and assessed. |
Deliverable 16 - Secure billing: Evaluation
report |
The demonstrator forming D10 is evaluated and concepts adapted and
refined accordingly. This deliverable contains the results of this evaluation. |
Deliverable 17 - Migration scenario:
final version |
This deliverable describes a single migration scenario, showing how
all security concerns are addressed. |
Deliverable 18 - Fraud detection concepts:
Final report |
This report contains continuing analysis of the different approaches,
and, in particular, reviews how they could be taken further for the final
trial. |
Deliverable 19 - Final trial and demonstration
implementations |
This consists of demonstrations of the use of the UIM with access to
end-to-end security services and billing security services, as well as
trials of the fraud management tool and the migration performance. |
Deliverable 20 - Project final report
and results of trials |
This contains an evaluation of the results of the trials and feedback
from the demonstrations. It also contains all the publicly available major
results of the project. |
Deliverable 23 - Vocal password-based
user authentication demonstration |
This deliverable demonstrates the implementation of the the multi-password
system, and the storage and retrieval of the low-storage voice templates
on the smart-card. |
Deliverable 24 - Vocal Password-Based
User Authentication Report |
This report contains an overview of the research work done within this
field, both single- and multiple-password algorithms are discussed, and
some security issues are mentioned. |
Deliverable 25 - Legal aspects of fraud
detection |
This objective of this deliverable is to determine the legal rules
which apply in the various fields of law to the use of fraud detection
systems by mobile communications operators or service providers. |