Security in the GSM system
@inproceedings{Quirke2004SecurityIT, title={Security in the GSM system}, author={Jeremy Quirke}, year={2004} }
AUTHENTICATION ...................................................................................................................................... 3 The SIM card ........................................................................................................................................ 3 Additional local security in the SIM...................................................................................................... 4 The A3 algorithm and authentication procedure…
No Paper Link Available
28 Citations
Action-Triggered Public-Key cryptography for GSM systems with Phone-Dependent end-to-end encryption
- Computer Science, Mathematics
- 2019
This paper will integrate a very well known technique in the GSM system, namely Public-key technique, and introduce the solutions in a different point of view, which will leave the original system working in normal cases.
Modelling to Enhance GSM Network Security
- Computer ScienceSecurity and Management
- 2006
This paper discusses the several aspects of security of GSM and takes into consideration the fact that World-wide GSM usage is very high and how GSM protects the data from interception by authentication, encryption, and ciphering.
A new mutual authentication protocol for GSM networks
- Computer Science2009 Canadian Conference on Electrical and Computer Engineering
- 2009
This paper proposes a novel mutual entity authentication using the TESLA protocol that not only provides secure bilateral authentication, but also decreases the call setup time and the required connection bandwidth.
An Enhanced SMS-based OTP Scheme
- Computer Science
- 2017
A parameter is introduced to make sure the request for SMS-based OTP is sponsored by the real user and then theOTP is send from the server to the user by encryption to enhance the security of SMS- based OTP.
Investigating Issues in Mobile Network (In)Security
- Computer Science
- 2008
Investigating Issues is presented to evaluate the data security protection accorded by the global telecommunication systems against interception, using encryption, authentication, and ciphering, and it will also attempt to discuss several issues of mobile wireless (in)security.
Review of mobile short message service security issues and techniques towards the solution
- Computer Science
- 2011
An overview of the current SMS security aspects and concerns during the SMS transmission is detailed and the existing mechanisms used to protect the SMS are presented with the goal to provide useful advices for further research.
A SIM-based electronic transaction authentication system
- Computer ScienceComput. Syst. Sci. Eng.
- 2009
An electronic payment protocol that uses SIM based authentication along with illustration of its formal modelling and verification results are presented, which offers more robust security features than other electronic transaction systems proposed to date.
A Conceptual Framework for a SIM-based Electronic Transaction Authentication System
- Computer Science2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)
- 2007
This paper depicts an electronic payment protocol by means of SIM based authentication with the illustrations of its formal modelling & verification results.
Enhancement of GSM Security Using Elliptic Curve Cryptography Algorithm
- Computer Science2012 Third International Conference on Intelligent Systems Modelling and Simulation
- 2012
This paper will be focusing on the comparison of working procedure of elliptic curve cryptography and RSA algorithm in GSM network to how it's a better promise for a faster and more secure method of encryption in comparison to the current standards in the Public-Key Cryptographic algorithms of RSA.
Examining security in mobile communication networks
- Computer Science
- 2007
How GSM protects the data from interception by authentication, encryption, and ciphering is examined and some likely flaws in these security methods are considered and possible measures to curb the flaws are suggested.
References
SHOWING 1-8 OF 8 REFERENCES
Reducing the Collision Probability of Alleged Comp128
- Computer ScienceCARDIS
- 1998
Two different approaches are suggested to strengthen the alleged Comp128 algorithm with respect to this attack on the GSM A3A8 authentication function by inducing collisions on the second (out of 40) round of the compression function.
Digital cellular telecommunications system (Phase 2+); Handover procedures (GSM 03.09 version 5.1.0)
- Engineering
- 1997
102 – Technical Specification Group Services and Security Aspects
- 102 – Technical Specification Group Services and Security Aspects
GSM 05.03 -Digital cellular telecommunications system (Phase 2+); Channel coding (GSM 05.03 version 8.5.1 Release
- GSM 05.03 -Digital cellular telecommunications system (Phase 2+); Channel coding (GSM 05.03 version 8.5.1 Release
- 1999
202 -3G Security; Specification of the 3GPP Confidentiality and Integrity Algorithms
- 202 -3G Security; Specification of the 3GPP Confidentiality and Integrity Algorithms
- 2005
201 -Technical Specification Group Services and System Aspects; 3G Security; Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 1: f8 and f9 Specification
- 201 -Technical Specification Group Services and System Aspects; 3G Security; Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 1: f8 and f9 Specification
- 2005
216 – 3G Security; Specification of the A5/3 encryption algorithms for GSM and EDGE, and the GEA3 encryption algorithm for GPRS; Document 1: A5/3 and GEA3 specification
- 216 – 3G Security; Specification of the A5/3 encryption algorithms for GSM and EDGE, and the GEA3 encryption algorithm for GPRS; Document 1: A5/3 and GEA3 specification
- 2005
20 -Digital cellular telecommunications system (Phase 2+); Security related network functions (GSM 03
- GSM 03
- 1999