Thursday, January 5, 2012

GSM

GSM (Global System for Mobile Communications)




These are some of the features that are supported by GSM
  • Short Message Service which allows you to send and receive 126 character text messages
  • Ability to use same phone in a number of network-related countries
  • Forwarding of calls to another number
  • More capacity, ensuring rapid call set-up. Handsets also smaller and more robust.
  • Talk to a number of other parties simultaneously

The main focus of GSM security is to provide authentication for mobile users over the network, to provide high-confidentiality for the signalling information as well as user data, to not disclose subscriber's identity and to use SIM (Subscriber Identity Module) as a security module.

GSM faces such security threats due to the openness of wireless communications and it make users vulnerable to such threats. Some of the threats faced are:
  • Interception of data over the air media
  • Illegal access to a mobile service
  • Man-In-Middle Attacks
  • Flaws in implementation of A3/A8 algorithm
  • Flaws in cryptography algorithms
  • SIM card cloning
  • Vulnerability to the DOS attacks

Through several research, I have found some solutions to solve the threats that are faced by GSM. Firstly, implementation of secure algorithms such as the newer A5/3 can be done to improve the flaws found in the A3/A8 algorithm and it can also prevent SIM card cloning from occurring. Lastly, securing of backbone traffic is done to further encrypt the data to prevent attacker or eavesdropper from modifying the transmitted data.

2 comments:

  1. hey..i drop by to say your blog damn cool..!! lol.
    ok.i hope teacher dont see my comment.i didnt really read all the points. just here and there read about it..lol. so ya.i just comment only..

    well.i see you have pointed out some key points of the threats which i also included. its sad to see not much solutions too.i also cannot find.so yeah..good finding=D

    ReplyDelete
  2. Maybe other then algorithm based security method, from what I know from my research is that digital modulation technique like Gaussian Minimum Shift Keying (GMSK) etc is also part of the security method.

    ReplyDelete