Investigating vulnerabilities in GSM security

M Pannu, R Bird, B Gill, K Patel - … International Conference and …, 2015 - ieeexplore.ieee.org
The telecommunications industry uses a combination of 2G (GSM), 3G (UMTS) and 4G
(LTE) systems to access communication worldwide. Concurrent with a recent rise in cyber …

Wireless security: securing mobile UMTS communications from interoperation of GSM

E Southern, A Ouda, A Shami - Security and Communication …, 2013 - Wiley Online Library
Wireless communications have revolutionized the way the world communicates. An
important process used to secure that communication is authentication. As flaws in the …

Stragglers of the herd get eaten: Security concerns for GSM mobile banking applications

M Paik - Proceedings of the Eleventh Workshop on Mobile …, 2010 - dl.acm.org
The first GSM standard was published in 1989 [10], fully two decades ago. Since then,
cryptanalysis has weakened or broken significant parts of the original specification. Yet …

A network based imsi catcher detection

S Steig, A Aarnes, T Van Do… - 2016 6th International …, 2016 - ieeexplore.ieee.org
The weaknesses of 2G combined with the need for backward compatibility make all the
mobile networks 2G, 3G and 4G vulnerable to Man-in-the-Middle attacks using fake base …

[引用][C] A precis of the new attacks on GSM encryption

G Rose, Q Australia - Qualcomm, Australia, Sept, 2003

[PDF][PDF] Security in the GSM Network

AY Korkusuz - Term project, 2012 - miralishahidi.ir
GSM is the biggest wireless network in the world. Billions of people are using this
technology and only some of them know its structure and security mechanisms. In this paper …

GSM security issues and challenges

SM Siddique, M Amir - Proceedings of the Seventh ACIS International …, 2006 - dl.acm.org
This paper addresses the current GSM security system. It presents the terminology,
operation including principals and features. It also discusses the flaws and weaknesses of …

Evaluation of mobile network security

Z Simate - 2013 Pan African International Conference on …, 2013 - ieeexplore.ieee.org
Mobile Transactions are on the increase in third world countries enabling access to banking
services and payment solution. With this rapid increase, most of the underlying platforms are …

Developing and implementing encryption algorithm for addressing GSM security issues

S Islam, F Ajmal - 2009 International Conference on Emerging …, 2009 - ieeexplore.ieee.org
GSM bears numerous security vulnerabilities. Although GSM's architecture is designed in
such a way to provide various security features like authentication, data/signaling …

Vulnerability by design in mobile network security

A Jøsang, L Miralabé, L Dallot - Journal of Information Warfare, 2015 - JSTOR
The GSM network, commonly called 2G, was designed during the 1980s when the Cold War
was still ongoing. Due to political pressure from European governments, the security of GSM …