Research Article

Security in GSM Networks

by  Masum Bakaul, Md. Ashikul Islam, H. M. Abdul Ahad, Shayma Rahman
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Issue 29
Published: Jan 2020
Authors: Masum Bakaul, Md. Ashikul Islam, H. M. Abdul Ahad, Shayma Rahman
10.5120/ijca2020919774
PDF

Masum Bakaul, Md. Ashikul Islam, H. M. Abdul Ahad, Shayma Rahman . Security in GSM Networks. International Journal of Computer Applications. 177, 29 (Jan 2020), 36-39. DOI=10.5120/ijca2020919774

                        @article{ 10.5120/ijca2020919774,
                        author  = { Masum Bakaul,Md. Ashikul Islam,H. M. Abdul Ahad,Shayma Rahman },
                        title   = { Security in GSM Networks },
                        journal = { International Journal of Computer Applications },
                        year    = { 2020 },
                        volume  = { 177 },
                        number  = { 29 },
                        pages   = { 36-39 },
                        doi     = { 10.5120/ijca2020919774 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2020
                        %A Masum Bakaul
                        %A Md. Ashikul Islam
                        %A H. M. Abdul Ahad
                        %A Shayma Rahman
                        %T Security in GSM Networks%T 
                        %J International Journal of Computer Applications
                        %V 177
                        %N 29
                        %P 36-39
                        %R 10.5120/ijca2020919774
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless medium is open to all. Hence it is always acceptable to threats and attacks. GSM being a wireless network is always prone to the unauthorized access to the network and entrustment to the privacy and confidentiality of the users. Therefore, the GSM provides security measures to ensure the privacy and confidentiality of the users to ensure that only registered and authorized users get the access to the network. This paper briefly presents the security measures of GSM technology. The study is enriched with a general overview of GSM protection and the algorithms that are mainly used in A3, A5 and A8. Author’s also discussed the authentication and encryption methods provided by GSM. A3 for MS authentication algorithm. A5 for powerful over wind voice privacy algorithms. A8 for voice privacy key generation algorithm.

References
  • T. Stockinger, “GSM network and its privacy- the A5 stream cipher,” CiteSeerX, Nov-2005. [Online]. Available:http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.465.8718.
  • C. Peng, “GSM and GPRS Security.”
  • J. H. Schiller, Mobile communications. Reading, MA: Addison-Wesley, 2003.
  • M. Toorani and A. Beheshti, “Solutions to the GSM Security Weaknesses,” 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies, Sep. 2008.
  • Y. LI, Y. CHEN, and T.-J. MA, “Security in GSM,” pp. 2–11.
  • [https://pdfs.semanticscholar.org/3aac/d711ae891c9a1ad70f3be26be4ab9de090a1.pdf]
  • S. Srinivas, “The GSM Standard (An overview of its security),” SANS Institute Information Security Reading Room, pp. 2–7, 20-Dec-2001.
  • J. Quirke, “Security in the GSM system,” pp. 2–13, 01-May 2004.
  • [https://pdfs.semanticscholar.org/b0c8/493e0c6b6e5e08d870a1b318401236e07e82.pdf]
  • Ihtesham ul Haq, Zia Ur Rahman, Shahid Ali and Engr. Muhammad Faisal (2017) 'GSM Technology: Architecture, Security and Future Challenges', International Journal of Science Engineering and Advance Technology, 5(1).
  • Giuseppe Cattaneo,Giancarlo De Maio,Umberto Ferraro Petrillo (2013) 'Security Issues and Attacks on the GSM Standard: a Review1', Journal of Universal Computer Science, 19(16).
  • Christian Kröger (2011) 'GSM security’.
  • Opu Narcisse (2012) 'Security in the Global System for Mobile Communications (GSM)'.
  • Juha Mynttinen (2000) 'End-to-end security of mobile data in GSM'.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

GSM Security Algorithm Anonymity Authentication Encryption

Powered by PhDFocusTM