Cryptographic analysis of gsm networks

F Ahmed, M Imran - 6th International Bhurban Conference on …, 2009 - ieeexplore.ieee.org
GSM Communication is growing exponentially and there is need of efficient ciphering
mechanism for secure communication between mobile subscribers. In this research we …

[PDF][PDF] Secure Communication System over a GSM Network

R Alvarez, J Oliver, JF Vicent, A Zamora - WSEAS Transactions on …, 2005 - Citeseer
As standard GSM protection methods are now well-known to be insecure, we have designed
a new secure communication system over GSM network which is developed using the …

Secure end-to-end SMS communication over GSM networks

S Islam, IU Haq, A Saeed - 2015 12th International Bhurban …, 2015 - ieeexplore.ieee.org
In today's GSM networks, security mechanisms provided by network operators are limited to
the wireless links only, leaving the information traveling over the wired links insecure to a …

[PDF][PDF] GSM: Improvement of Authentication and Encryption Algorithms

VN Payal - International Journal of Computer Science and Mobile …, 2014 - academia.edu
GSM is the name of a standardization group established in 1982 to create a common
European mobile telephone standard that would formulate specifications for a pan …

Design and Research of a New secure Authentication Protocol in GSM networks

A Qi, Y Shen - MATEC Web of Conferences, 2016 - matec-conferences.org
As the first line of defense in the security application system, Authentication is an important
security service. Its typical scheme is challenge/response mechanism and this scheme …

[PDF][PDF] A Review of Security issues and mitigation Measures in GSM

G Kaur, P Kaur, KK Saluja - … Journal of Research in Engineering & Applied …, 2012 - Citeseer
ABSTRACT Under European telecommunication Standards Institute (ETSI), GSM is named
as “Global System for Mobile communication “. It is a globally accepted standard for digital …

[PDF][PDF] Cyber Security for GSM Data Protection

FC Obodoeze, TGI Ozue… - Masters of Engineering …, 2010 - researchgate.net
With the increasing use of extensive IT and Telecommunication systems for sensitive or
safety-critical applications, the matter of IT and Telecommunication security is becoming …

[PDF][PDF] An Improved Secure Authentication and Key Protocol for GSM Network

A Adeyelu, IJ Orban, M Ashawa, J Riley, A Philip - researchgate.net
The wireless network is at the focal point amongst the changing technology trends of the
past decade with the mobile telecommunication system as its most prevalent technology, in …

[PDF][PDF] Enhancing security system of short message service for m-commerce in GSM

N Saxena, A Payal - International Journal of Computer Science & …, 2011 - ijcset.com
Global System for Mobile (GSM) is a second generation cellular standard developed to cater
voice services and data delivery using digital modulation. Short Message Service (SMS) is …

[图书][B] An investigation into authentication security of GSM algorithm for mobile banking

A Raheem - 2014 - books.google.com
Due to the mobility of its users, GSM systems are vulnerable to an unauthorized access and
eaves droppings when compared with the traditional fixed wired networks. The main idea of …