Security Management System of Cellular Communication: Case Study
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33085
Security Management System of Cellular Communication: Case Study

Authors: Othman O. Khalifa, Abdulrazzag Aburas, A. Al Bagul, Meftah Hrairi, Muhammad Shahril bin Shahbuddin, Harman bin Mat Kasa

Abstract:

Cellular communication is being widely used by all over the world. The users of handsets are increasing due to the request from marketing sector. The important aspect that has to be touch in this paper is about the security system of cellular communication. It is important to provide users with a secure channel for communication. A brief description of the new GSM cellular network architecture will be provided. Limitations of cellular networks, their security issues and the different types of attacks will be discussed. The paper will go over some new security mechanisms that have been proposed by researchers. Overall, this paper clarifies the security system or services of cellular communication using GSM. Three Malaysian Communication Companies were taken as Case study in this paper.

Keywords: GSM, Security systems, SIM CARD, IMSI, Authentication.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1334329

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2489

References:


[1] Definition of GSM, Retrieved January 2007, http://www.aboutwireless. com/terms/gsm.htm
[2] Imai, H., et. al., Wireless communications security, Boston: Artech House, 2006.
[3] EIA/TIA, Cellular Radio-Telecommunications Intersystem Operations," Tech. Rep. IS-41 Revision C, 1995.
[4] M. Mouly and M. B. Pautet, The GSM System for Mobile Communications, M. Mouly, 49 rue Louise Bruneau, Palaiseau, France, 1992.
[5] GSM Association 2007, retrived January 2007, http://www.gsmworld.com/index.shtml
[6] H. Granbohm and J. Wiklund, GPRS: General Packet Radio Service, Ericsson Review, vol. 76, no. 2, pp. 82-88, 1999.
[7] J. Ebersp├ñcher and H.-J. Vögel, GSM: Switching, Services and Protocols, John Wiley & Sons, 1998.
[8] Yang, H., et. al., Securing a Wireless World, Proceedings of the IEEE v. 94 no. 2 Feb. 2006.
[9] Fernandez, E., et. al., Some security issues of wireless systems, Advanced Distributed Systems: 5th International School and Symposium, ISSADS 2005, Guadalajara, Mexico, January 24-28, 2005
[10] Zhu, J., A new authentication scheme with anonymity for wireless environments, Consumer Electronics, IEEE Transactions on Publication Feb 2004 Volume: 50, Issue: 1 p.p.: 231- 235.
[11] Carneiro, G., Cross-Layer Design In 4G Wireless Terminals, IEEE Wireless Communications, 2004.
[12] Lauter, K., The Advantages Of Elliptic Curve Cryptography For Wireless Security, Wireless Communications, IEEE Feb 2004 Volume: 11, Issue:1, pp. 62-67.
[13] Akyildiz, McNair, et al. Mobility management in next-generation wireless systems. Proceedings of the IEEE, August 1999.
[14] Brookson, C., GSM security: a description of the reasons for security and the techniques, IEE Colloquium on Security and Cryptography Applications to Radio Systems. June ÔÇÿ94.