CFP last date
20 January 2025
Reseach Article

Security in GSM Networks

by Masum Bakaul, Md. Ashikul Islam, H. M. Abdul Ahad, Shayma Rahman
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Number 29
Year of Publication: 2020
Authors: Masum Bakaul, Md. Ashikul Islam, H. M. Abdul Ahad, Shayma Rahman
10.5120/ijca2020919774

Masum Bakaul, Md. Ashikul Islam, H. M. Abdul Ahad, Shayma Rahman . Security in GSM Networks. International Journal of Computer Applications. 177, 29 ( Jan 2020), 36-39. DOI=10.5120/ijca2020919774

@article{ 10.5120/ijca2020919774,
author = { Masum Bakaul, Md. Ashikul Islam, H. M. Abdul Ahad, Shayma Rahman },
title = { Security in GSM Networks },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2020 },
volume = { 177 },
number = { 29 },
month = { Jan },
year = { 2020 },
issn = { 0975-8887 },
pages = { 36-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume177/number29/31087-2020919774/ },
doi = { 10.5120/ijca2020919774 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:47:16.511251+05:30
%A Masum Bakaul
%A Md. Ashikul Islam
%A H. M. Abdul Ahad
%A Shayma Rahman
%T Security in GSM Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 177
%N 29
%P 36-39
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless medium is open to all. Hence it is always acceptable to threats and attacks. GSM being a wireless network is always prone to the unauthorized access to the network and entrustment to the privacy and confidentiality of the users. Therefore, the GSM provides security measures to ensure the privacy and confidentiality of the users to ensure that only registered and authorized users get the access to the network. This paper briefly presents the security measures of GSM technology. The study is enriched with a general overview of GSM protection and the algorithms that are mainly used in A3, A5 and A8. Author’s also discussed the authentication and encryption methods provided by GSM. A3 for MS authentication algorithm. A5 for powerful over wind voice privacy algorithms. A8 for voice privacy key generation algorithm.

References
  1. T. Stockinger, “GSM network and its privacy- the A5 stream cipher,” CiteSeerX, Nov-2005. [Online]. Available:http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.465.8718.
  2. C. Peng, “GSM and GPRS Security.”
  3. J. H. Schiller, Mobile communications. Reading, MA: Addison-Wesley, 2003.
  4. M. Toorani and A. Beheshti, “Solutions to the GSM Security Weaknesses,” 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies, Sep. 2008.
  5. Y. LI, Y. CHEN, and T.-J. MA, “Security in GSM,” pp. 2–11.
  6. [https://pdfs.semanticscholar.org/3aac/d711ae891c9a1ad70f3be26be4ab9de090a1.pdf]
  7. S. Srinivas, “The GSM Standard (An overview of its security),” SANS Institute Information Security Reading Room, pp. 2–7, 20-Dec-2001.
  8. J. Quirke, “Security in the GSM system,” pp. 2–13, 01-May 2004.
  9. [https://pdfs.semanticscholar.org/b0c8/493e0c6b6e5e08d870a1b318401236e07e82.pdf]
  10. Ihtesham ul Haq, Zia Ur Rahman, Shahid Ali and Engr. Muhammad Faisal (2017) 'GSM Technology: Architecture, Security and Future Challenges', International Journal of Science Engineering and Advance Technology, 5(1).
  11. Giuseppe Cattaneo,Giancarlo De Maio,Umberto Ferraro Petrillo (2013) 'Security Issues and Attacks on the GSM Standard: a Review1', Journal of Universal Computer Science, 19(16).
  12. Christian Kröger (2011) 'GSM security’.
  13. Opu Narcisse (2012) 'Security in the Global System for Mobile Communications (GSM)'.
  14. Juha Mynttinen (2000) 'End-to-end security of mobile data in GSM'.
Index Terms

Computer Science
Information Sciences

Keywords

GSM Security Algorithm Anonymity Authentication Encryption