Security in GSM
نویسندگان
چکیده
1. A BRIEF INTRODUCTION TO GSM .............................................................................................................2 1.1 MOBILE STATION................................................................................................................................................3 1.2 BASE STATION SUBSYSTEM ................................................................................................................................3 1.3 NETWORK SUBSYSTEM .......................................................................................................................................3 2. GSM SECURITY MODEL ................................................................................................................................4 2.1 THE PURPOSE OF GSM SECURITY: ...................................................................................................................4 2.2 SECURITY FEATURES OF GSM ...........................................................................................................................4 2.2.1 Authentication of the registered subscribers ................................................................................................4 2.2.2 Encryption of the data .................................................................................................................................5 2.2.3 Other secuity features...................................................................................................................................7 2.3 THE ALGORITHMS ..............................................................................................................................................7 3. PROBLEMS WITH GSM SECURITY.............................................................................................................9 3.1 THE LIMITATION AND PROBLEMS WITH GSM SECURITY .................................................................................9 3.2 SOME POSSIBLE METHOD OF ATTACKS. .............................................................................................................9 3.3. POSSIBLE IMPROVEMENT ................................................................................................................................10 4. CONCLUSION..................................................................................................................................................10
منابع مشابه
A TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملA Contemporary Foreword on GSM Security
This article contains a current outline of the GSM system security, with focus on the air interface protocol. It presents the terminology and describes the GSM security operation, including its principles and features. This document also discusses the effectiveness of GSM authentication and the strength of GSM encryption. It includes therefore the most significant physical and cryptanalytic att...
متن کاملA Security Analysis of GSM Security using ECC Technique
GSM (Group Special Mobile or System for Mobile Communications) is the PAN-EUROPEAN standard for digital cellular communication. GSM provides enhanced features when compared with the older analog-based wireless systems. A GSM network is more vulnerable to unauthorized access and eavesdropping when compared with the traditional fixed wired networks due to the mobility of users, the transmission o...
متن کاملGSM Security
Mobile wireless networks are more vulnerable to unauthorised access and eavesdropping when compared with the traditional fixed wired networks due to the mobility of users, the transmission of signals through open-air and the requirement of low power consumption by a mobile user. This paper focuses on the security techniques used within the GSM standard. First, current GSM security system vulner...
متن کاملGSM Security Using Identity-based Cryptography
Current security model in Global System for Mobile Communications (GSM) predominantly use symmetric key cryptography. The rapid advancement of Internet technology facilitates online trading, banking, downloading, emailing using resource-constrained handheld devices such as personal digital assistants and cell phones. However, these applications require more security than the present GSM support...
متن کامل