Security in mobile phone systems

نویسندگان

  • Alexandre Lung-Yut-Fong
  • Boris Granovskiy
چکیده

In this paper, we discuss security issues associated with mobile telephone networks and focus on the unique issues that appear due to the mobility of the user. We provide an overview of how some of these issues are addressed in the second-generation mobile network GSM and consider some of the possible shortcomings of that network. We then compare security features in GSM with those implemented in UMTS, a third-generation mobile telephone network, whose security measures aimed to build on the success of GSM and provide protection against actual and perceived vulnerabilities of GSM, as well as against new attacks that have appeared in more recent years. Introduction and history When the so-called first generation of mobile telephone systems became popular starting in the mid 1980’s, mobile fraud and abuse followed very shortly after. The most common abuses of the early mobile systems included eavesdropping on the analogue radio signal, thus listening to other people’s calls, as well as cloning, an example of identity theft where the attacker reprogrammed the identity of a mobile phone so that the calls made on it were charged to another customer. It was mainly with an eye on these flaws that research began into creating a mobile network that provided a certain level of security. The second generation mobile network GSM (Global System for Mobile communications) was designed and released in the early 1990’s and was the first widely used mobile system to provide security features ensuring some levels of authentication, confidentiality, and anonymity. GMS proved to be very successful and has become widespread throughout the world in the 1990’s. Over the course of that decade, work began on the third generation of mobile phone systems, the best known of which is the Universal Mobile Telecommunications System, or UMTS. The first UMTS specifications were released in 1999, and showed that UMTS security built on the success of GSM and provided new security features to protect against new types of attack or to address certain weaknesses of GSM, specifically its lack of protection against so-called ”false base station attacks”, where an attacked pretends to be a GSM network. In this paper, we will talk about various security features implemented in GSM and then compare them with the new and improved security provided by UMTS.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Measurement of Low Frequency Magnetic Field of Two Kinds of GSM900 Mobile Phone

Introduction:  The  use  of  mobile  communication  systems  has  dramatically  increased  over  the  past  decade. Although many studies have been performed to determine the effect of radio frequency (RF) but  less attention has been paid to the possible biological impact of exposure to extremely low frequency  (ELF) components.   The objective of this study is two folds. One is to design the ...

متن کامل

فرصت ها و چالشهای تکنولوژی تلفن همراه در پیشگیری و درمان ایدز

Aim: mobile Health Technology is rapidly advancing and becoming a cost effective option for intervention delivery particularly for isolated and hard to reach populations, such as people living with HIV/AIDS. We conducted a literature review to evaluate mobile phone technology utilize for HIV prevention and care. Methods: We conducted a literature review using the search Terms from the MESH s...

متن کامل

The Pattern of Mobile Phone Use and Prevalence of Self-Reported Symptoms in Elementary and Junior High School Students in Shiraz, Iran

Background: The use of mobile phone by children is increasing drastically. Children are likely to accumulate many years of exposure during their lives. Furthermore, as nervous systems in children are developing, children may be at a greater risk compared to adults. In this light, some scientists have suggested that the use of mobile phones should be restricted in high-risk groups such as childr...

متن کامل

Influence of Socioeconomic Characteristics on Purposes for which Mobile Phone was used by Small Scale Farmers in the Gezira State, Sudan

The objective of this study was to assess the influence of some socioeconomic characteristics on purposes for which mobile phone was used by small scale farmers in the Gezira State, Sudan. The total number of small- scale farmers in the State for 2013-2014 growing season was estimated to be 5000. Ten percent of the population was used using the simple random sampling technique. The collected da...

متن کامل

Sustainable Information Exchange and Market Access: Use of Mobile Phone in the Marketing of Food Crops by Farming Households in Rural South East Nigeria

The place of information in addressing market access and participation limitation, which hinders farmer’s welfare and poverty reduction efforts in many developing countries, cannot be over-emphasized. This study therefore examined the use of mobile phone in the marketing of food crops among farming households in rural south east, Nigeria. A multi stage sampling procedures was used in the select...

متن کامل

سیستم پیشنهاد دهنده زمینه‌آگاه برای انتخاب گوشی تلفن همراه با ترکیب روش‌های تصمیم‌گیری جبرانی و غیرجبرانی

Recommender systems suggest proper items to customers based on their preferences and needs. Needed time to search is reduced and the quality of customer’s choice is increased using recommender systems. The context information like time, location and user behaviors can enhance the quality of recommendations and customer satisfication in such systems. In this paper a context aware recommender sys...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006