SlideShare a Scribd company logo
1 of 15
LOCALIZATION & CALLING,
HANDOVER,SECURITY
N.SURATHAVANI MSc(Information
Technology)
Nadar Saraswathi college of arts
& science.Theni.
LOCALIZATION & CALLING:
GSM (Global System for mobile
communication) provides many useful
services in which, one of the most important is
the automatic, worldwide localization of users.
For localization of users, GSM performs
periodic location updates even if a user does
not use the mobile phones or some other
devices but user should not be out of GSM
network and is not completely switched off
their devices.
GSM USES TWO TYPES OF
DATABASES:
Home Location Register (HLR)
Visitor Location Register (VLR)
HOME LOCATION REGISTER
(HLR):
The Home Location Register is a
database from a mobile network in
which information from all mobile
subscribers is stored.
VISITOR LOCATION REGISTER
(VLR):
VLR is responsible for the MS (Mobile
Station) to inform the HLR about
location changes.
As soon as user moves from one
location to another location, the HLR
sends all user data needed to the new
VLR (New Location). Changing of one
VLR to another VLR and their
uninterrupted services is called as
Roaming.
ROAMING CAN BE TAKEN PLACE AS
FOLLOWS:
Within the network of one
provider.
Between two providers in one
country (National Roaming).
Different providers in different
countries (International
Roaming)
TO LOCATE AN MS NEEDED:
Mobile station international ISDN
number (MSISDN).
International mobile subscriber identity
(IMSI).
Temporary mobile subscriber identity
(TMSI).
Mobile station roaming number (MSRN)
HANDOVER:
A handover is a process in
telecommunications and mobile
communications in which a connected
cellular call or a data session is
transferred from one cell site to another
without disconnecting the session.
Cellular services are based on mobility
and handover, allowing the user to be
moved from one cell site range to
another or to be switched to the nearest
cell site for better performance.
Handovers are a core element in
planning and deploying cellular
networks.
It allows users to create data sessions or
connect phone calls on the move.
This process keeps the calls and data
sessions connected even if a user
moves from one cell site to another
TYPES OF HANDOVERS:
Hard Handover
Soft Handover
HARD HANDOVER:
An instantaneous handover in
which the existing connection is
terminated and the connection to
the destination channel is made.
It is also known as a break-before-
make handover. The process is so
instantaneous that the user does
not hear any noticeable
interruption.
SECURITY:
The authentication protocols used in
GSM are described in a number of
places, such as (which also describes
the mechanisms in an incompatible
U.S. system).
But the industry tried to keep secret
the cryptographic and other protection
mechanisms that form the core of the
GSM security system.
There’s a personal identification
number, which you use to unlock the
card. In theory, this stops stolen mobiles
being used. In practice, many networks
set an initial PIN of 0000, and most
users never change it.
There’s an international mobile
subscriber identification (IMSI), a unique
number that maps on to your mobile
phone number.
Finally there is a subscriber
authentication key Ki, a 128-bit number
that serves to authenticate that IMSI
and is known to your home network.
Telecom System Security:

More Related Content

What's hot (20)

Mobile Originated Call Process in Simple Words
Mobile Originated Call Process in Simple WordsMobile Originated Call Process in Simple Words
Mobile Originated Call Process in Simple Words
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Mobility Management
Mobility ManagementMobility Management
Mobility Management
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
Frequency Reuse
Frequency ReuseFrequency Reuse
Frequency Reuse
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
 
Presentation on CDMA
Presentation on CDMAPresentation on CDMA
Presentation on CDMA
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
cellular ppt
cellular pptcellular ppt
cellular ppt
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Gsm signaling
Gsm signalingGsm signaling
Gsm signaling
 
Gsm
GsmGsm
Gsm
 
GSM Air Interface
GSM Air Interface GSM Air Interface
GSM Air Interface
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
 
Wireless networking_ASRao
Wireless networking_ASRaoWireless networking_ASRao
Wireless networking_ASRao
 
Wireless LAN technology
Wireless LAN technologyWireless LAN technology
Wireless LAN technology
 
Ch3
Ch3Ch3
Ch3
 
Chap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationChap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communication
 
GSM channels
GSM channelsGSM channels
GSM channels
 
Handoff parameters
Handoff parametersHandoff parameters
Handoff parameters
 

Similar to Mobile computing vani

mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc networkitsjadu
 
WCDMA Principles
WCDMA PrinciplesWCDMA Principles
WCDMA PrinciplesAli Ibrahim
 
wireless communication ppt.pptx
wireless communication ppt.pptxwireless communication ppt.pptx
wireless communication ppt.pptxNidhiChandra24
 
presentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignmentpresentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignmentFabiha Ain
 
ppt on GSM architechture
ppt on GSM architechtureppt on GSM architechture
ppt on GSM architechtureHina Saxena
 
GSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaGSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaOWASP Delhi
 
Wireless Communication - GSM Security
Wireless Communication - GSM SecurityWireless Communication - GSM Security
Wireless Communication - GSM SecurityAnkit Mulani
 
gsm-pt-130414104636-phpapp02.pdf
gsm-pt-130414104636-phpapp02.pdfgsm-pt-130414104636-phpapp02.pdf
gsm-pt-130414104636-phpapp02.pdfhazhamina
 
6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptx6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptxhazhamina
 
Vendor Location Base Services1
Vendor Location Base Services1Vendor Location Base Services1
Vendor Location Base Services1Anthony Crenshaw
 
Intelligent location tracking scheme for handling user’s mobility
Intelligent location tracking scheme for handling user’s mobilityIntelligent location tracking scheme for handling user’s mobility
Intelligent location tracking scheme for handling user’s mobilityeSAT Publishing House
 
Pppppppppttttttttttttttttttttt
PpppppppptttttttttttttttttttttPppppppppttttttttttttttttttttt
PpppppppptttttttttttttttttttttRahul kulshrestha
 
Mobility Management in Wireless Communication
Mobility Management in Wireless CommunicationMobility Management in Wireless Communication
Mobility Management in Wireless CommunicationDon Norwood
 
telecommunication system
telecommunication systemtelecommunication system
telecommunication systemTamilarasan N
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
 

Similar to Mobile computing vani (20)

mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc network
 
WCDMA Principles
WCDMA PrinciplesWCDMA Principles
WCDMA Principles
 
wireless communication ppt.pptx
wireless communication ppt.pptxwireless communication ppt.pptx
wireless communication ppt.pptx
 
Gsm1
Gsm1Gsm1
Gsm1
 
presentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignmentpresentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignment
 
Test
TestTest
Test
 
GSM
GSMGSM
GSM
 
ppt on GSM architechture
ppt on GSM architechtureppt on GSM architechture
ppt on GSM architechture
 
GSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaGSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj Verma
 
Wireless Communication - GSM Security
Wireless Communication - GSM SecurityWireless Communication - GSM Security
Wireless Communication - GSM Security
 
gsm-pt-130414104636-phpapp02.pdf
gsm-pt-130414104636-phpapp02.pdfgsm-pt-130414104636-phpapp02.pdf
gsm-pt-130414104636-phpapp02.pdf
 
6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptx6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptx
 
Gsm fundamentals
Gsm fundamentalsGsm fundamentals
Gsm fundamentals
 
Vendor Location Base Services1
Vendor Location Base Services1Vendor Location Base Services1
Vendor Location Base Services1
 
Intelligent location tracking scheme for handling user’s mobility
Intelligent location tracking scheme for handling user’s mobilityIntelligent location tracking scheme for handling user’s mobility
Intelligent location tracking scheme for handling user’s mobility
 
module-1 part a.pptx
module-1 part a.pptxmodule-1 part a.pptx
module-1 part a.pptx
 
Pppppppppttttttttttttttttttttt
PpppppppptttttttttttttttttttttPppppppppttttttttttttttttttttt
Pppppppppttttttttttttttttttttt
 
Mobility Management in Wireless Communication
Mobility Management in Wireless CommunicationMobility Management in Wireless Communication
Mobility Management in Wireless Communication
 
telecommunication system
telecommunication systemtelecommunication system
telecommunication system
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
 

More from SanSan149

Sdma fdma-tdma-fixed tdm
Sdma fdma-tdma-fixed tdmSdma fdma-tdma-fixed tdm
Sdma fdma-tdma-fixed tdmSanSan149
 
Histogram process spatial filtering
Histogram process spatial filteringHistogram process spatial filtering
Histogram process spatial filteringSanSan149
 
Telecommunication system gms mobile service
Telecommunication system gms mobile serviceTelecommunication system gms mobile service
Telecommunication system gms mobile serviceSanSan149
 
Adaptive filters and band reject filters
Adaptive filters and band reject filtersAdaptive filters and band reject filters
Adaptive filters and band reject filtersSanSan149
 
SDMA-FDMA-TDMA-fixed TDM
SDMA-FDMA-TDMA-fixed TDMSDMA-FDMA-TDMA-fixed TDM
SDMA-FDMA-TDMA-fixed TDMSanSan149
 
joins and subqueries in big data analysis
joins and subqueries in big data analysisjoins and subqueries in big data analysis
joins and subqueries in big data analysisSanSan149
 
Hadoop storage
Hadoop storageHadoop storage
Hadoop storageSanSan149
 
Normalization
NormalizationNormalization
NormalizationSanSan149
 
Manageral aspects of software maintance
Manageral aspects of software maintanceManageral aspects of software maintance
Manageral aspects of software maintanceSanSan149
 
Common language runtime clr
Common language runtime clrCommon language runtime clr
Common language runtime clrSanSan149
 

More from SanSan149 (11)

Sdma fdma-tdma-fixed tdm
Sdma fdma-tdma-fixed tdmSdma fdma-tdma-fixed tdm
Sdma fdma-tdma-fixed tdm
 
Histogram process spatial filtering
Histogram process spatial filteringHistogram process spatial filtering
Histogram process spatial filtering
 
Telecommunication system gms mobile service
Telecommunication system gms mobile serviceTelecommunication system gms mobile service
Telecommunication system gms mobile service
 
Adaptive filters and band reject filters
Adaptive filters and band reject filtersAdaptive filters and band reject filters
Adaptive filters and band reject filters
 
Hema rdbms
Hema rdbmsHema rdbms
Hema rdbms
 
SDMA-FDMA-TDMA-fixed TDM
SDMA-FDMA-TDMA-fixed TDMSDMA-FDMA-TDMA-fixed TDM
SDMA-FDMA-TDMA-fixed TDM
 
joins and subqueries in big data analysis
joins and subqueries in big data analysisjoins and subqueries in big data analysis
joins and subqueries in big data analysis
 
Hadoop storage
Hadoop storageHadoop storage
Hadoop storage
 
Normalization
NormalizationNormalization
Normalization
 
Manageral aspects of software maintance
Manageral aspects of software maintanceManageral aspects of software maintance
Manageral aspects of software maintance
 
Common language runtime clr
Common language runtime clrCommon language runtime clr
Common language runtime clr
 

Recently uploaded

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Mobile computing vani

  • 1. LOCALIZATION & CALLING, HANDOVER,SECURITY N.SURATHAVANI MSc(Information Technology) Nadar Saraswathi college of arts & science.Theni.
  • 2. LOCALIZATION & CALLING: GSM (Global System for mobile communication) provides many useful services in which, one of the most important is the automatic, worldwide localization of users. For localization of users, GSM performs periodic location updates even if a user does not use the mobile phones or some other devices but user should not be out of GSM network and is not completely switched off their devices.
  • 3. GSM USES TWO TYPES OF DATABASES: Home Location Register (HLR) Visitor Location Register (VLR)
  • 4. HOME LOCATION REGISTER (HLR): The Home Location Register is a database from a mobile network in which information from all mobile subscribers is stored.
  • 5. VISITOR LOCATION REGISTER (VLR): VLR is responsible for the MS (Mobile Station) to inform the HLR about location changes. As soon as user moves from one location to another location, the HLR sends all user data needed to the new VLR (New Location). Changing of one VLR to another VLR and their uninterrupted services is called as Roaming.
  • 6. ROAMING CAN BE TAKEN PLACE AS FOLLOWS: Within the network of one provider. Between two providers in one country (National Roaming). Different providers in different countries (International Roaming)
  • 7. TO LOCATE AN MS NEEDED: Mobile station international ISDN number (MSISDN). International mobile subscriber identity (IMSI). Temporary mobile subscriber identity (TMSI). Mobile station roaming number (MSRN)
  • 8.
  • 9. HANDOVER: A handover is a process in telecommunications and mobile communications in which a connected cellular call or a data session is transferred from one cell site to another without disconnecting the session. Cellular services are based on mobility and handover, allowing the user to be moved from one cell site range to another or to be switched to the nearest cell site for better performance.
  • 10. Handovers are a core element in planning and deploying cellular networks. It allows users to create data sessions or connect phone calls on the move. This process keeps the calls and data sessions connected even if a user moves from one cell site to another
  • 11. TYPES OF HANDOVERS: Hard Handover Soft Handover
  • 12. HARD HANDOVER: An instantaneous handover in which the existing connection is terminated and the connection to the destination channel is made. It is also known as a break-before- make handover. The process is so instantaneous that the user does not hear any noticeable interruption.
  • 13. SECURITY: The authentication protocols used in GSM are described in a number of places, such as (which also describes the mechanisms in an incompatible U.S. system). But the industry tried to keep secret the cryptographic and other protection mechanisms that form the core of the GSM security system.
  • 14. There’s a personal identification number, which you use to unlock the card. In theory, this stops stolen mobiles being used. In practice, many networks set an initial PIN of 0000, and most users never change it. There’s an international mobile subscriber identification (IMSI), a unique number that maps on to your mobile phone number.
  • 15. Finally there is a subscriber authentication key Ki, a 128-bit number that serves to authenticate that IMSI and is known to your home network. Telecom System Security: