Security,GSM,System,Priyanka,A communication Security of GSM System


But when we talk about the handsets, undoubtedly, Nokia is the King of mobile phone market and LG stood at the third position. In this article we are concentrating on Nokia E5 from the house of Nokia and LG GM360 Viewty Snap by LG Mobile Com The Nokia Mobile Company is the undisputed leader in mobile world, they have latest technology and capability to deliver world class handsets at no extra costs. The N series, E series and C series phones have already rocked the world with th


By Priyanka Agarwalhttp://M6.netIntroductionEvery day millions of people use cellular phones over radio links. With the increasing features, the mobile phone is gradually becoming a handheld computer. In the early 1980’s, when most of the mobile telephone system was analog, the inefficiency in managing the growing demands in a cost-effective manner led to the opening of the door for digital technology (Huynh & Nguyen, 2003). According to Margrave (n.d), “With the older analog-based cellular telephone systems such as the Advanced Mobile Phone System (AMPS) and the Total Access Communication System (TACS)”, cellular fraud is extensive. It’s very simple for a radio hobbyist to tune in and hear cellular telephone conversations since without encryption, the voice and user data of the subscriber is sent to the network (Peng, 2000). Margrave (n.d) states that apart from this, cellular fraud can be committed by using complex equipment to receive the Electronic Serial Number so as to clone another mobile phone and place calls with that. To counteract the aforementioned cellular fraud and to make mobile phone traffic secure to a certain extent, GSM (Global System for Mobile communication or Group Special Mobile) is one of the many solutions now out there. According to GSM-tutorials, formed in 1982, GSM is a worldwide accepted standard for digital cellular communication. GSM operates in the 900MHz, 1800MHz, or 1900Mhz frequency bands by “digitizing and compressing data and then sending it down a channel with two other streams of user data, each in its own time slot.” GSM provides a secure and confidential method of communication Security provided by GSMThe limitation of security in cellular communication is a result of the fact that all cellular communication is sent over the air, which then gives rise to threats from eavesdroppers with suitable receivers. Keeping this in account, security controls were integrated into GSM to make the system as secure as public switched telephone networks. The security functions are:1. Anonymity: It implies that it is not simple and easy to track the user of the system. According to Srinivas (2001), when a new GSM subscriber switches on his/her phone for the first time, its International Mobile Subscriber Identity (IMSI), i.e. real identity is used and a Temporary Mobile Subscriber Identity (TMSI) is issued to the subscriber, which from that time forward is always used. Use of this TMSI, prevents the recognition of a GSM user by the potential eavesdropper.2. Authentication: It checks the identity of the holder of the smart card and then decides whether the mobile station is allowed on a particular network. The authentication by the network is done by a response and challenge method. A random 128-bit number (RAND) is generated by the network and sent to the mobile. The mobile uses this RAND as an input and through A3 algorithm using a secret key Ki (128 bits) assigned to that mobile, encrypts the RAND and sends the signed response (SRES-32 bits) back. Network performs the same SRES process and compares its value with the response it has received from the mobile so as to check whether the mobile really has the secret key (Margrave, n.d). Authentication becomes successful when the two values of SRES matches which enables the subscriber to join the network. Since every time a new random number is generated, eavesdroppers don’t get any relevant information by listening to the channel. (Srinivas, 2001)3. User Data and Signalling Protection:Srinivas (2001) states that to protect both user data and signalling, GSM uses a cipher key. After the authentication of the user, the A8 ciphering key generating algorithm (stored in the SIM card) is used. Taking the RAND and Ki as inputs, it results in the ciphering key Kc which is sent through. To encipher or decipher the data, this Kc (54 bits) is used with the A5 ciphering algorithm. This algorithm is contained within the hardware of the mobile phone so as to encrypt and decrypt the data while roaming.Algorithms used to make mobile traffic secureAuthentication Algorithm A3: One way function, A3 is an operator-dependent stream cipher. To compute the output SRES by using A3 is easy but it is very difficult to discover the input (RAND and Ki) from the output. To cover the issue of international roaming, it was mandatory that each operator may choose to use A3 independently. The basis of GSM’s security is to keep Ki secret (Srinivas, 2001)Ciphering Algorithm A5: In recent times, many series of A5 exists but the most common ones are A5/0(unencrypted), A5/1 and A5/2. Because of the export regulations of encryption technologies there is the existence of a series of A5 algorithms (Brookson, 1994).A8 (Ciphering Key Generating Algorithm): Like A3, it is also operator-dependent. Most providers combine A3 and A8 algorithms into a single hash function known as COMP128. The COMP128 creates KC and SRES, in a single instance (Huynh & Nguyen, 2003). GSM security flaws·Security by obscurity. According to (Li, Chen & Ma) some people asserts that since the GSM algorithms are not publicized so it is not a secure system. “Most security analysts believe any system that is not subject to the scrutiny of the world’s best minds can’t be as secure.” For instance, A5 was never made public, only its description is divulged as part of the GSM specification.·Another limitation of GSM is that although all communication between the Mobile station and the Base transceiver station are encrypted, in the fixed network all the communication and signalling is not protected as it is transmitted in plain text most of the time (Li, Chen & Ma).·One more problem is that it is hard to upgrade the cryptographic mechanisms timely.·Flaws are present within the GSM algorithms. According to Quirke (2004) “ A5/2 is a deliberately weakened version of A5/1, since A5/2 can be cracked on the order of about 216”.Security breachesTime to time, people have tried to decode GSM algorithms. For instance, according to Issac press release (1998) in April 1998, the SDA (Smartcard Developer Association) along with two U.C Berkeley researchers alleged that they have cracked the COMP128 algorithm, which is stored on the SIM. They claimed that within several hours they were able to deduce the Ki by sending immense numbers of challenges to the authorization module. They also said that out of 64 bits, Kc uses only 54 bits with zeros padding out the other 10, which makes the cipher key purposefully weaker. They felt government interference might be the reason behind this, as this would allow them to monitor conversations. However, they were unable to confirm their assertion since it is illegal to use equipment to carry out such an attack in the US. In reply to this assertion, the GSM alliance stated that since the GSM network allows only one call from any phone number at any one time it is of no relevant use even if a SIM could be cloned. GSM has the ability to detect and shut down duplicate SIM codes found on multiple phones (Business press release, 1998).According to Srinivas (2001), one of the other claims was made by the ISAAC security research group. They asserted that a fake base station could be built for around $10,000, which would allow a “man-in-the-middle” attack. As a result of this, the real base station can get deluged which would compel a mobile station to connect to the fake station. Consequently, the base station could eavesdrop on the conversation by informing the phone to use A5/0, which is without encryption. One of the other possible scenarios is of insider attack. In the GSM system, communication is encrypted only between the Mobile station and the Base Transceiver station but within the provider’s network, all signals are transmitted in plain text, which could give a chance for a hacker to step inside (Li, Chen & Ma).Measures taken to tackle these flawsAccording to Quirke (2004), since the emergence of these, attacks, GSM have been revising its standard to add newer technologies to patch up the possible security holes, e.g. GSM1800, HSCSD, GPRS and EDGE. In the last year, two significant patches have been implemented. Firstly, patches for COMP 128-2 and COMP128-3 hash function have been developed to address the security hole with COMP 128 function. COMP128-3 fixes the issue where the remaining 10 bits of the Session Key (Kc) were replaced by zeroes. Secondly, it has been decided that a new A5/3 algorithm, which is created as part of the 3rd Generation Partnership Project (3GPP) will replace the old and weak A5/2. But this replacement would result in releasing new versions of the software and hardware in order to implement this new algorithm and it requires the co-operation of the hardware and software manufacturers.GSM is coming out of their “security by obscurity” ideology, which is actually a flaw by making their 3GPP algorithms available to security researchers and scientists (Srinivas, 2001). ConclusionTo provide security for mobile phone traffic is one the goals described in GSM 02.09 specification, GSM has failed in achieving it in past (Quirke, 2004). Until a certain point GSM did provide strong subscriber authentication and over-the-air transmission encryption but different parts of an operator’s network became vulnerable to attacks (Li, Chen, Ma). The reason behind this was the secrecy of designing algorithms and use of weakened algorithms like A5/2 and COMP 128. One of other vulnerability is that of inside attack. In order to achieve its stated goals, GSM is revising its standards and it is bringing in new technologies so as to counteract these security holes. While no human-made technology is perfect, GSM is the most secure, globally accepted, wireless, public standard to date and it can be made more secure by taking appropriate security measures in certain areas. BibliographyBusiness Wire Press release (1998). GSM Alliance Clarifies False & Misleading Reports of Digital Phone Cloning. Retrieved October 26th, 2004 Web site: http://jya.com/gsm042098.txtBrookson (1994). Gsmdoc Retrieved October 24th, 2004 from gsm Web site:http://www.brookson.com/gsm/gsmdoc.pdfChengyuan Peng (2000). GSM and GPRS security. Retrieved October 24th, 2004 from Telecommunications Software and Multimedia Laboratory Helsinki University of Technology Web site: http://www.tml.hut.fi/Opinnot/Tik-110.501/2000/papers/peng.pdfEpoker Retrieved October 27th, 2004 from Department of MathematicsBoise State University, Mathematics 124,Fall 2004 Web site:http://math.boisestate.edu/~marion/teaching/m124f04/epoker.htmHuynh & Nguyen (2003). Overview of GSM and GSM security. Retrieved October 25th, 2004 from Oregon State university, project Web site: http://islab.oregonstate.edu/koc/ece478/project/2003RP/huynh_nguyen_gsm.docLi, Chen & Ma (n.d). Security in gsm. Retrieved October 24th, 2004 from gsm-security Web site: http://www.gsm-security.net/papers/securityingsm.pdfQuirke (2004). Security in the GSM system. Retrieved October 25th, 2004 from SecurityWebsite:http://www.ausmobile.com/downloads/technical/Security in the GSM system 01052004.pdfMargrave (n.d). GSM system and Encryption. Retrieved October 25th, 2004 from gsm-secur Web site: http://www.hackcanada.com/blackcrawl/cell/gsm/gsm-secur/gsm-secur.html Press release (1998). Smartcard Developer Association Clones Digital GSM1998). Retrieved October 26th, 2004 from is sac Web site: http://www.isaac.cs.berkeley.edu/isaac/gsm.htmlSrinivas (2001). The GSM Standard (An overview of its security) Retrieved October 25th, 2004 from papers Web site:http://www.sans.org/rr/papers/index.php?id=317Stallings (2003). Cryptography and Network Security: Principles and practices. USA: Prentice Hall.

Security,GSM,System,Priyanka,A

communication

A beginners guide to networking

You will not have worked on the internet for long before you start to read about networking.To be successful in business it seems you must participate in the art of networkingif only you knew how or what it meant.NetworkingIs the proactive m ...

communication

Captivating An Audience

Learning proper singing technique is of course vital to your success as a performer. However, more important than this is the sense of your core, and your empathy with others -- in short, your humanity. Without these traits, a performer cann ...

communication

Internet in the car

Web im Wagen - Der CarPC fürs Internet im AutoDer CarPC und die multimediale Aufrüstung in PKWs und LKWs geistert schon seit Jahren in den Köpfen der Hersteller und vieler Anwender herum. Dabei sind die Hintergründe vielfältig und in vi ...

communication

Linguaphone Language Learning Solutions

Language Training is integral to success in the International setting. It is increasingly recognized as a key element in assignment success. The ability to communicate in the local language of International colleagues and clients facilitates ...

communication

Blogging for Dollars

Blogging for dollars might sound like the latest game show or some new drinking game, but it's the latest craze to hit the Internet. Bloggers began blogging for a number of reasons, but as the blog movement has increased in popularity, they ...

communication

How Mobile Phones have shaped the lives?

Today, mobile phones have become an integral part of our lives and its shaping everything at fundamental levels. With mobile phones, everything is just a click away at any time, irrespective of place. Newspapers and news channels are not the ...

communication

Raw Material Influence on ERW Steel Pipe

1. In the production process of ERW steel pipe, how to ensure that the product quality meets the requirements of technical standards and the needs of customers? An analysis of the factors that affect the product quality during the productio ...

communication

Movement of Old Car By Interm get

Home additions and upgrades will be costly and though they do assist improve house worth, you can not take your granite counter tops with you while you transfer. If you might be on the lookout for a house improve you could take with you whil ...

communication

Everything About Mobile Signal Boosters

Over the years, mobile signal boosters have been strengthening their position in the market. Designed to boost signal, there is a lot to know about these boosters. How do they work? What are the reasons for weak signals? And how to buy the p ...

communication

Camels and Jackals

lived in a forest. There was a melon field near that forest but a river used to fall between the fields and the forest. One day both of them thought that today they go across the river to eat melons in the field. The two got advice from each ...

communication

HOSTED IVR - Be at Work - Even When you're not

Using intelligently, you can improve the overall experience of your consumers while also enhancing your workplace productivity.  When it comes to Hosted IVR, all have an understanding of the basics, but are there more?You can access your te ...

communication

Internet speed in Asia region

Internet speed is the speed with which online content is transferred from  World Wide Web  to your P.C tablet or smart phone or is uploaded to  the internet. In simple words ,Internet speed  is the browsing capacity/speed of your interne ...