Security in GSM Networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GSM Security

Mobile wireless networks are more vulnerable to unauthorised access and eavesdropping when compared with the traditional fixed wired networks due to the mobility of users, the transmission of signals through open-air and the requirement of low power consumption by a mobile user. This paper focuses on the security techniques used within the GSM standard. First, current GSM security system vulner...

متن کامل

Security in GSM

1. A BRIEF INTRODUCTION TO GSM .............................................................................................................2 1.1 MOBILE STATION................................................................................................................................................3 1.2 BASE STATION SUBSYSTEM ...................................................................

متن کامل

Security and Denial of Service Threats in GSM Networks

Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of service (DoS) attacks will evolve into a critical danger as the availability of mobile networks becomes more and more important for the modern information society. This paper outlines a series of flaws in such networks, partic...

متن کامل

GSM Security II

Mobility of users, transmission of signals through open-air, the requirement of low power consumption by mobile users and smaller data storage area limitation in mobile equipment make mobile wireless networks more vulnerable to security threats like eavesdropping and unauthorized access. This paper proposes a new set of security protocols to enhance the access and data security features of GSM ...

متن کامل

Security Testing of GSM Implementations

Right after its introduction, GSM security was reviewed in a mostly theoretical way, uncovering some major security issues. However, the costs and complexity of the required hardware prohibited most people from exploiting these weaknesses in practice and GSM became one of the most successful technologies ever introduced. However, there is an enormous amount of mobile enabled equipment out there...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2020

ISSN: 0975-8887

DOI: 10.5120/ijca2020919774