Analysing GSM Insecurity
@article{Donald2021AnalysingGI, title={Analysing GSM Insecurity}, author={Ene Donald and Osagie Nosa Favour}, journal={ArXiv}, year={2021}, volume={abs/2109.12408} }
In the 1990s, GSM emerged as a cutting-edge technology that promised improved services, mobility, security, and increase in the revenues of companies through improved, secure communication for business transactions. The practical experience, however, has shown global subscribers and companies that mere technological excellence of GSM has not resulted in its success. This paper has been carried out to analyse the existing GSM subscriber activities in both personal and business worlds by…
Figures from this paper
3 Citations
Data and voice signal intelligence interception over the GSM Um Interface
- Computer Science
- 2016
The Enhanced Data rates for GSM Evolution (EDGE) is a digital mobile phone technology that permits enhanced data communication rates as a backward-compatible annex of the Global System for Mobile…
Security evaluation of cellular networks handover techniques
- Computer Science
- 2018
An authenticated multi-factor neuro fuzzy handover protocol with low latency for both homogenous and heterogeneous cellular environments is proposed to address shortcomings of current handover techniques.
Fighting Crime and Insecurity in Nigeria: An Intelligent Approach
- Computer Science
- 2021
Various modern technologies such as Facial recognition surveillance, Automatic plate number recognition, GIS and Crime Mapping, and Voice recognition are proposed to be integrated and used to identify and predict criminal activities, thus, mitigating the nation’s prolonged insecurity and terrorism vulnerabilities.
References
SHOWING 1-10 OF 22 REFERENCES
SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale
- Computer ScienceUSENIX Security Symposium
- 2011
This paper built a framework to analyze the security of SMS clients of feature phones, the most common type of mobile phone in the world, based on a small GSM base station and discovered vulnerabilities in the feature phone platforms of all major manufacturers.
GSM SECURITY AND ENCRYPTION
- Computer Science
- 2013
In order for the authentication and security mechanisms of GSM to function, all three elements (SIM, handset, and GSM network) are required, and the distribution of security credentials and encryption algorithms provides an additional measure of security both in ensuring the privacy of cellular telephone conversations and in the prevention of cellular Telephone fraud.
SMS TRANSMISSION USING PDU MODE AND 7-BIT CODING SCHEME
- Computer Science
- 2005
The design and implementation of an SMS transmission system using the PDU (Protocol Data Unit) mode of a GSM (Global System for Mobile Communications) modem and the circuit was tested using a Siemens S25 mobile telephone.
The Bridge Project
- Computer ScienceCAe
- 2007
The aim of this project is to visually demonstrate a personal understanding of the evolution of the computer generated "image work" [Mat77], by means of a free associative process that utilises the…
The Red Hat newlib C Library
- 2010
Wireless application protocol: Wireless Telephony Application Interface Specification
- Wireless Application Forum: GSM Specific Addendum
- 1999
OpenBSC: Running your own GSM network
The Baseband Apocalypse: All your baseband are belong to us
Wideband GSM Sniffing
- 01228.27C3.GSM-Sniffing.Nohl_Munaut.pdf >
Available at: <www.cs.huji.ac.il/~sans/students_lectures/GSM%20Security.ppt > Accessed