Modelling to Enhance GSM Network Security

نویسنده

  • Johnnes Arreymbi
چکیده

With the rapid development in global communication networks, the threat of security and in particular that of cellular telecommunication system is real and highly dangerous. Mobile phone and other wireless device usage is increasing daily with ground breaking technological developments – in design, style, content and micro-chips performance. The contents of the multimedia packages – conversation (audio), text, graphics, colour, and video messages delivered may be very important and confidential. Such confidentiality needs to be protected. Any interference and interceptions in the communication process would bring about reduced system usage and development benefits. This paper discusses the several aspects of security of GSM and takes into consideration the fact that World-wide GSM usage is very high. It will also look at how GSM protects the data from interception by authentication, encryption, and ciphering. Some likely flaws in these security methods will be explored and possible measures suggested to curb the security flaws.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Security in GSM

1. A BRIEF INTRODUCTION TO GSM .............................................................................................................2 1.1 MOBILE STATION................................................................................................................................................3 1.2 BASE STATION SUBSYSTEM ...................................................................

متن کامل

Enhanced privacy and authentication for the global system for mobile communications

The Global System for Mobile Communications (GSM) is widely recognized as the modern digital mobile network architecture. Increasing market demands point toward the relevancy of security-related issues in communications. The security requirements of mobile communications for the mobile users include: (1) the authentication of the mobile user and Visitor Location Register/Home Location Register;...

متن کامل

A SIM-based electronic transaction authentication system

This paper presents a SIM-based tool for user authentication in various service areas such as financial transactions in e-commerce. Other remote services can use SIM as an authentication tool over existing GSM technology through GPRS, which is an additional packet data feature for the GSM network. GPRS enables packet-switched traffic to exist in predominantly circuit-switched GSM infrastructure...

متن کامل

Security in mobile phone systems

In this paper, we discuss security issues associated with mobile telephone networks and focus on the unique issues that appear due to the mobility of the user. We provide an overview of how some of these issues are addressed in the second-generation mobile network GSM and consider some of the possible shortcomings of that network. We then compare security features in GSM with those implemented ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006