BY, ARITRA GAUTAM (05-275) & G.PAVANI (05-272).. OVERVIEW OF GSM GSM (group special mobile or general system for mobile communications) is the Pan-European.

Slides:



Advertisements
Similar presentations
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Advertisements

GSM network and its privacy Thomas Stockinger. Overview Why privacy and security? GSM network‘s fundamentals Basic communication Authentication Key generation.
GSM Security and Encryption
PAPER PRESENTATION BY V.Priyanka CSE-A Roll no. 13K41A0548.
GSM Network. GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications Contents.
Myagmar, Gupta UIUC G Security Principles Build on GSM security Correct problems with GSM security Add new security features Source: 3GPP.
Chapter 1 – Introduction
GSM standard (continued)
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
SMUCSE 5349/7349 GSM Security. SMUCSE 5349/7349 GSM Security Provisions Anonymity Authentication Signaling protection User data protection.
G53SEC 1 Mobile Security GSM, UTMS, Wi-Fi and some Bluetooth.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Information Security of Embedded Systems : Communication, wireless remote access Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
GSM – GLOBAL SYSTEM FOR MOBILE COMMUNICATION Debby Nahl Fall 2004.
MOBILE PHONE ARCHITECTURE & TECHNOLOGY. HISTORY  The idea of the first cellular network was brainstormed in 1947  Disadvantages  All the analogue system.
ELECTRONIC COMMUNICATIONS A SYSTEMS APPROACH CHAPTER Copyright © 2014 by Pearson Education, Inc. All Rights Reserved Electronic Communications: A Systems.
SWAMI Threats, vulnerabilities & safeguards in a World of Ambient Intelligence David Wright Trilateral Research & Consulting 21 March 2006.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
 Global System for Mobile Communications (GSM) is a second generation (2G) cellular standard developed to cater voice services and data delivery using.
GSM: The European Standard for Mobile Telephony Presented by Rattan Muradia Requirement for course CSI 5171 Presented by Rattan Muradia Requirement for.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Privacy, Security and Confidentiality for Calls, Texts and Contact Lists Secure Mobile Communications.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Challenges in the Migration to 4G Mobile Systems Suk Yu Hui and Kai Hau Yeung City university of Hong Kong Presenter: Shuai Peng
MOBILE COMMUNICATION G.S.M. & G.P.R.S.. Evolution of mobile telephone systems Cellular subscriber growth worldwide Currently more than 45 million cellular.
An Analysis of 3G Phone Security Emily Maples & Evan Nakano CMPE 209.
Chapter 4 Application Level Security in Cellular Networks.
Cryptography and Network Security (CS435) Part One (Introduction)
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
4.1 Security in GSM Security services – access control/authentication user  SIM (Subscriber Identity Module): secret PIN (personal identification number)
Digital Cellular Techniques ENGR 475 – Telecommunications October 26, 2006 Harding University Jonathan White.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
 No mobility  Security problem  High call failure rate (line disconnection)  Delay in getting new connections  Limited value added services.
Wireless Networking Nandakumar.P. Web Resource
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Overview of cellular system
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Update on ETSI Security work Charles Brookson OCG Security Chairman DOCUMENT #:GSC13-PLEN-57 FOR:Information SOURCE:Charles Brookson AGENDA ITEM:6.3
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
SECURITY REQUIREMENTS AND MANAGEMENT: Presentation By: Guillermo Dijk.
WIRELESS FRAUD Detection & Prevention. Method of Fraud CLONING of SIM Card.
GPRS General Packet Radio Service Shay Toder – Ori Matalon The Department of Communication System Engineering Ben-Gurion University June 19, 2002.
Sniffer for Detecting Lost Mobiles
Wireless Data Security Peter Michel CSC 8560 February 24, 2004.
1 Lecture 19 EEE 441 Wireless And Mobile Communications.
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
Wireless Network PMIT- By-
GSM, UTMS, Wi-Fi and some Bluetooth
GSM SECURITY AND ENCRYPTION
3G Security Principles Build on GSM security
GSM – GLOBAL SYSTEM FOR MOBILE COMMUNICATION
GSM – GLOBAL SYSTEM FOR MOBILE COMMUNICATION
Dept. of Business Administration
Special Topic: Wireless Security
LM 7. Cellular Network Security
Security in Wide Area Networks
Presentation transcript:

BY, ARITRA GAUTAM (05-275) & G.PAVANI (05-272).

OVERVIEW OF GSM GSM (group special mobile or general system for mobile communications) is the Pan-European standard for digital cellular communications. GSM provides enhanced features over older analog-based systems: Total Mobility High Capacity and Optimal Spectrum Allocation

GSM NETWORK

The purpose of GSM Security: Since all cases of GSM fraud against a specific wireless carrier will result in a substantial loss to the operator. This substantial loss may include the following: increase in use of the system with no revenue. Direct financial loss Potential embarrassment Failure to meet legal and regulatory requirements

The security services provided by GSM are: 1. Anonymity : Anonymity is provided by using temporary identifiers.

2. Authentication

3. Signaling and Data Confidentiality

4. Subscriber Identity Confidentiality

There are now three different for GSM, unencrypted, and use possibilities of the A5/1 algorithm or the A5/2 algorithm to secure the data. The uses of the algorithms in the network operator's infrastructure are controlled by the GSM Memorandum of Understanding Group (MoU). World-wide use of the algorithms

GSM Encryption Algorithms A3: The GSM authentication algorithm "placeholders" used in the GSM system. A5: The A5 algorithm used for encrypting the over-the-air transmission channel is vulnerable against known-plain-text and divide-and-conquer attacks and the intentionally reduced key space is small enough to make a brute-force attack feasible as well.

ALGORITHMS CONTT. COMP 128: one-way function that is currently used in most GSM networks for A3 and A8. COMP 128-2: COMP128-2 algorithm out (revised A3/A8 reference algorithm)

Key Encryptions:

Loss areas: Technical fraud: IT is where a weakness of the system is exploited to make free calls. Procedural fraud: IT results from the exploitation of business processes, where a flaw or weakness can be used to gain money.

OTHER GSM SECURITY MECHANISMS: SIM Card: There is always a possibility that the SIM card can be compromised. IMEI: to prevent mobile theft the GSM has specified an International Mobile Equipment Identifier(IMEI). Roaming problems are mininised by the use of EDI.

Recent Trends: A Session Border Controller

Summary: GSM provides basic range of security features to ensure adequate protection for both the operator and the customer. The security mechanisms specified in the GSM standard make it the most secure cellular telecommunications system available.

References: European Telecommunications Standards Institute, Recommendation GSM 03.20, "Security Related Network Functions". Biala, J., "Mobilfunk und Intelligente Netze," Friedr., Vieweg & Sohn Verlagsgesellschaft, European Telecommunications Standards Institute, Recommendation GSM 02.09, "Security Aspects".