• Corpus ID: 2627047

Security in the GSM system

@inproceedings{Quirke2004SecurityIT,
  title={Security in the GSM system},
  author={Jeremy Quirke},
  year={2004}
}
AUTHENTICATION ...................................................................................................................................... 3 The SIM card ........................................................................................................................................ 3 Additional local security in the SIM...................................................................................................... 4 The A3 algorithm and authentication procedure… 
Action-Triggered Public-Key cryptography for GSM systems with Phone-Dependent end-to-end encryption
TLDR
This paper will integrate a very well known technique in the GSM system, namely Public-key technique, and introduce the solutions in a different point of view, which will leave the original system working in normal cases.
Modelling to Enhance GSM Network Security
TLDR
This paper discusses the several aspects of security of GSM and takes into consideration the fact that World-wide GSM usage is very high and how GSM protects the data from interception by authentication, encryption, and ciphering.
A new mutual authentication protocol for GSM networks
TLDR
This paper proposes a novel mutual entity authentication using the TESLA protocol that not only provides secure bilateral authentication, but also decreases the call setup time and the required connection bandwidth.
An Enhanced SMS-based OTP Scheme
TLDR
A parameter is introduced to make sure the request for SMS-based OTP is sponsored by the real user and then theOTP is send from the server to the user by encryption to enhance the security of SMS- based OTP.
Investigating Issues in Mobile Network (In)Security
TLDR
Investigating Issues is presented to evaluate the data security protection accorded by the global telecommunication systems against interception, using encryption, authentication, and ciphering, and it will also attempt to discuss several issues of mobile wireless (in)security.
Review of mobile short message service security issues and techniques towards the solution
TLDR
An overview of the current SMS security aspects and concerns during the SMS transmission is detailed and the existing mechanisms used to protect the SMS are presented with the goal to provide useful advices for further research.
A SIM-based electronic transaction authentication system
TLDR
An electronic payment protocol that uses SIM based authentication along with illustration of its formal modelling and verification results are presented, which offers more robust security features than other electronic transaction systems proposed to date.
A Conceptual Framework for a SIM-based Electronic Transaction Authentication System
TLDR
This paper depicts an electronic payment protocol by means of SIM based authentication with the illustrations of its formal modelling & verification results.
Enhancement of GSM Security Using Elliptic Curve Cryptography Algorithm
TLDR
This paper will be focusing on the comparison of working procedure of elliptic curve cryptography and RSA algorithm in GSM network to how it's a better promise for a faster and more secure method of encryption in comparison to the current standards in the Public-Key Cryptographic algorithms of RSA.
Examining security in mobile communication networks
TLDR
How GSM protects the data from interception by authentication, encryption, and ciphering is examined and some likely flaws in these security methods are considered and possible measures to curb the flaws are suggested.
...
...

References

SHOWING 1-8 OF 8 REFERENCES
Reducing the Collision Probability of Alleged Comp128
TLDR
Two different approaches are suggested to strengthen the alleged Comp128 algorithm with respect to this attack on the GSM A3A8 authentication function by inducing collisions on the second (out of 40) round of the compression function.
102 – Technical Specification Group Services and Security Aspects
  • 102 – Technical Specification Group Services and Security Aspects
GSM 05.03 -Digital cellular telecommunications system (Phase 2+); Channel coding (GSM 05.03 version 8.5.1 Release
  • GSM 05.03 -Digital cellular telecommunications system (Phase 2+); Channel coding (GSM 05.03 version 8.5.1 Release
  • 1999
202 -3G Security; Specification of the 3GPP Confidentiality and Integrity Algorithms
  • 202 -3G Security; Specification of the 3GPP Confidentiality and Integrity Algorithms
  • 2005
201 -Technical Specification Group Services and System Aspects; 3G Security; Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 1: f8 and f9 Specification
  • 201 -Technical Specification Group Services and System Aspects; 3G Security; Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 1: f8 and f9 Specification
  • 2005
216 – 3G Security; Specification of the A5/3 encryption algorithms for GSM and EDGE, and the GEA3 encryption algorithm for GPRS; Document 1: A5/3 and GEA3 specification
  • 216 – 3G Security; Specification of the A5/3 encryption algorithms for GSM and EDGE, and the GEA3 encryption algorithm for GPRS; Document 1: A5/3 and GEA3 specification
  • 2005
20 -Digital cellular telecommunications system (Phase 2+); Security related network functions (GSM 03
  • GSM 03
  • 1999