• Corpus ID: 212468467

Analysing GSM Insecurity

@article{Donald2021AnalysingGI,
  title={Analysing GSM Insecurity},
  author={Ene Donald and Osagie Nosa Favour},
  journal={ArXiv},
  year={2021},
  volume={abs/2109.12408}
}
In the 1990s, GSM emerged as a cutting-edge technology that promised improved services, mobility, security, and increase in the revenues of companies through improved, secure communication for business transactions. The practical experience, however, has shown global subscribers and companies that mere technological excellence of GSM has not resulted in its success. This paper has been carried out to analyse the existing GSM subscriber activities in both personal and business worlds by… 

Data and voice signal intelligence interception over the GSM Um Interface

The Enhanced Data rates for GSM Evolution (EDGE) is a digital mobile phone technology that permits enhanced data communication rates as a backward-compatible annex of the Global System for Mobile

Security evaluation of cellular networks handover techniques

TLDR
An authenticated multi-factor neuro fuzzy handover protocol with low latency for both homogenous and heterogeneous cellular environments is proposed to address shortcomings of current handover techniques.

Fighting Crime and Insecurity in Nigeria: An Intelligent Approach

TLDR
Various modern technologies such as Facial recognition surveillance, Automatic plate number recognition, GIS and Crime Mapping, and Voice recognition are proposed to be integrated and used to identify and predict criminal activities, thus, mitigating the nation’s prolonged insecurity and terrorism vulnerabilities.

References

SHOWING 1-10 OF 22 REFERENCES

SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale

TLDR
This paper built a framework to analyze the security of SMS clients of feature phones, the most common type of mobile phone in the world, based on a small GSM base station and discovered vulnerabilities in the feature phone platforms of all major manufacturers.

GSM SECURITY AND ENCRYPTION

TLDR
In order for the authentication and security mechanisms of GSM to function, all three elements (SIM, handset, and GSM network) are required, and the distribution of security credentials and encryption algorithms provides an additional measure of security both in ensuring the privacy of cellular telephone conversations and in the prevention of cellular Telephone fraud.

The Bridge Project

The aim of this project is to visually demonstrate a personal understanding of the evolution of the computer generated "image work" [Mat77], by means of a free associative process that utilises the

SMS TRANSMISSION USING PDU MODE AND 7-BIT CODING SCHEME

TLDR
The design and implementation of an SMS transmission system using the PDU (Protocol Data Unit) mode of a GSM (Global System for Mobile Communications) modem and the circuit was tested using a Siemens S25 mobile telephone.

The Red Hat newlib C Library

  • 2010

Wireless application protocol: Wireless Telephony Application Interface Specification

  • Wireless Application Forum: GSM Specific Addendum
  • 1999

OpenBSC: Running your own GSM network

    The Baseband Apocalypse: All your baseband are belong to us

      Wideband GSM Sniffing

      • 01228.27C3.GSM-Sniffing.Nohl_Munaut.pdf >

      Available at: <www.cs.huji.ac.il/~sans/students_lectures/GSM%20Security.ppt > Accessed