SlideShare a Scribd company logo
1 of 9
Goals of Security features
The security features should be provided two sided i.e. from
the Operator Side as well as User Side
Operator Side: From operator’s point of view it should be
ensured that operators
• Bill the right person
• There should be mechanisms to avoid fraud
• Services should be protected
Subscriber side: The security measures need to be more promising and
precise on subscribers side. They should aim at
Maintaining privacy and anonymity of user which means that identification
and location of the subscriber should be concealed
Confidentiality of communication over air should be maintained by
providing proper encryption methods
There should be strong access control mechanisms for devices
and SIM card
Only authenticated users should be able to access the network
GSM offers several security services using confidenti
al information stored in the AuC and in
the individual SIM. The SIM stores personal, secret
data and is protected with a PIN against
unauthorized use. Three algorithms have been specifi
ed to provide security services in GSM.
Algorithm A3 is used for authentication, A5 for encry
ption, and A8 for the generation of
a cipher key.
Principles of GSM Security
GSM provides security under following mechanisms:
Access Control to SIM card: This is done by use of Personal Identificati
on Number (PIN) to get access to the SIM card
Anonymity: Hiding the identity and location of user. This is done by
using a TMSI number
Authentication of subscriber so as to ensure only registered and au
thorized users have access to network
Encryption of Data and signal to protect them against interception
Access control and authentication
Confidentiality:
New Data Services
To enhance the data transmission capabilities of GSM, two bas
ic approaches are possible. As
the basic GSM is based on connection-
oriented traffic channels, e.g., with 9.6 kbit/s each,
several channels could be combined to increase bandwidth. T
his system is called HSCSD
{high speed circuit switched data}. A more progressive step is
the introduction of packet-
oriented traffic in GSM, i.e., shifting the paradigm from conne
ctions/telephone thinking to
packets/internet thinking. The system is called GPRS {general
packet radio service}.
GPRS Architecture
Home location register (HLR)
Visitor location register (VLR):
Authentication center (AUC):
Mobile switching center (MSC):
Base station subsystem (BSS):
serving GPRS support node (SGSN)
GPRS support node (GGSN)
Packet data network PDN

More Related Content

What's hot

Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8RUpaliLohar
 
GSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaGSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaOWASP Delhi
 
Gsm security
Gsm securityGsm security
Gsm securitymaicuong8
 
Hacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudHacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudcVidya Networks
 
Gsm security
Gsm securityGsm security
Gsm securityAli Kamil
 

What's hot (6)

Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8
 
new Algorithm1
new Algorithm1new Algorithm1
new Algorithm1
 
GSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaGSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj Verma
 
Gsm security
Gsm securityGsm security
Gsm security
 
Hacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudHacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraud
 
Gsm security
Gsm securityGsm security
Gsm security
 

Similar to Security

Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communicationardhita banu adji
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
GSM Technology and security impact
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impactAhmad Sharifi
 
ppt on GSM architechture
ppt on GSM architechtureppt on GSM architechture
ppt on GSM architechtureHina Saxena
 
Hybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMSHybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMSCSCJournals
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryptionRK Nayak
 
gsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdfgsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdfsamss12
 
gsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdfgsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdfandutokicho
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM ArchitectureRubyyatAbir
 
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...IJCSES Journal
 

Similar to Security (20)

Security aspect in GSM
Security aspect in GSMSecurity aspect in GSM
Security aspect in GSM
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communication
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
GSM Technology and security impact
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impact
 
ppt on GSM architechture
ppt on GSM architechtureppt on GSM architechture
ppt on GSM architechture
 
Mobile security
Mobile securityMobile security
Mobile security
 
Hybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMSHybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMS
 
It6601 mobile computing unit 3
It6601 mobile computing unit 3It6601 mobile computing unit 3
It6601 mobile computing unit 3
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
 
B010331019
B010331019B010331019
B010331019
 
GSM WITH SATELLITE.pptx
GSM WITH SATELLITE.pptxGSM WITH SATELLITE.pptx
GSM WITH SATELLITE.pptx
 
gsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdfgsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdf
 
gsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdfgsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdf
 
Mob. comp . prst
Mob. comp . prstMob. comp . prst
Mob. comp . prst
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM Architecture
 
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
 
Gsmadvanced
GsmadvancedGsmadvanced
Gsmadvanced
 
Security issues in_mobile_payment
Security issues in_mobile_paymentSecurity issues in_mobile_payment
Security issues in_mobile_payment
 
GSM Fundamentals
GSM FundamentalsGSM Fundamentals
GSM Fundamentals
 

More from Dr. Somnath Sinha (9)

Introducing CSS Selectors.docx
Introducing CSS Selectors.docxIntroducing CSS Selectors.docx
Introducing CSS Selectors.docx
 
Difference between Servlet and JSP.docx
Difference between Servlet and JSP.docxDifference between Servlet and JSP.docx
Difference between Servlet and JSP.docx
 
Data structure design in SE
Data structure  design in SEData structure  design in SE
Data structure design in SE
 
Panel view
Panel viewPanel view
Panel view
 
C# note
C# noteC# note
C# note
 
Ppt 2
Ppt 2Ppt 2
Ppt 2
 
Mob ppt
Mob pptMob ppt
Mob ppt
 
black hole attack
black hole attackblack hole attack
black hole attack
 
File 1
File 1File 1
File 1
 

Recently uploaded

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

Security

  • 1. Goals of Security features The security features should be provided two sided i.e. from the Operator Side as well as User Side Operator Side: From operator’s point of view it should be ensured that operators • Bill the right person • There should be mechanisms to avoid fraud • Services should be protected
  • 2. Subscriber side: The security measures need to be more promising and precise on subscribers side. They should aim at Maintaining privacy and anonymity of user which means that identification and location of the subscriber should be concealed Confidentiality of communication over air should be maintained by providing proper encryption methods There should be strong access control mechanisms for devices and SIM card Only authenticated users should be able to access the network
  • 3. GSM offers several security services using confidenti al information stored in the AuC and in the individual SIM. The SIM stores personal, secret data and is protected with a PIN against unauthorized use. Three algorithms have been specifi ed to provide security services in GSM. Algorithm A3 is used for authentication, A5 for encry ption, and A8 for the generation of a cipher key.
  • 4. Principles of GSM Security GSM provides security under following mechanisms: Access Control to SIM card: This is done by use of Personal Identificati on Number (PIN) to get access to the SIM card Anonymity: Hiding the identity and location of user. This is done by using a TMSI number Authentication of subscriber so as to ensure only registered and au thorized users have access to network Encryption of Data and signal to protect them against interception
  • 5. Access control and authentication
  • 7. New Data Services To enhance the data transmission capabilities of GSM, two bas ic approaches are possible. As the basic GSM is based on connection- oriented traffic channels, e.g., with 9.6 kbit/s each, several channels could be combined to increase bandwidth. T his system is called HSCSD {high speed circuit switched data}. A more progressive step is the introduction of packet- oriented traffic in GSM, i.e., shifting the paradigm from conne ctions/telephone thinking to packets/internet thinking. The system is called GPRS {general packet radio service}.
  • 9. Home location register (HLR) Visitor location register (VLR): Authentication center (AUC): Mobile switching center (MSC): Base station subsystem (BSS): serving GPRS support node (SGSN) GPRS support node (GGSN) Packet data network PDN