GSM SECURITY AND ENCRYPTION

Slides:



Advertisements
Similar presentations
ARSITEKTUR DASAR SISTEM SELULER
Advertisements

GSM Security and Encryption
Islamic University-Gaza Faculty of Engineering Electrical & Computer Engineering Department Global System for Mobile Communication GSM Group Alaa Al-ZatmaHosam.
ECE Department Florida Institute of Technology Wireless Data Communication Networks Lecture 19: Introduction to GSM.
GSM Network. GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications Contents.
GSM Adapted from Acoe 422. History of GSM  During the 80s, analog cellular systems experienced rapid growth in Europe, yet they were incompatible.
By Neha choudhary Asst.Professor CSE/IT LHST-A.  GSM-Introduction  Architecture  Technical Specifications  Characteristics and features  Applications.
GSM System Architecture
GSM standard (continued)
GSM Security Overview (Part 1)
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
GSM – GLOBAL SYSTEM FOR MOBILE COMMUNICATION Debby Nahl Fall 2004.
Mobile Handset Cellular Network Basics + GSM. Cellular Network Basics There are many types of cellular services; before delving into details, focus on.
MOBILE PHONE ARCHITECTURE & TECHNOLOGY. HISTORY  The idea of the first cellular network was brainstormed in 1947  Disadvantages  All the analogue system.
TEL 355: Communication and Information Systems in Organizations
 The GSM network is divided into two systems. each of these systems are comprised of a number of functional units which are individual components of the.
Evolution from GMS to UMTS
GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications.
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
 Global System for Mobile Communications (GSM) is a second generation (2G) cellular standard developed to cater voice services and data delivery using.
GSM: The European Standard for Mobile Telephony Presented by Rattan Muradia Requirement for course CSI 5171 Presented by Rattan Muradia Requirement for.
Members of our Presentation  (Bsts09-08) Hafiz Umer Ejaz  (Bsts09-09) Rai-Habib Ullah  (Bsts09-31) M.Arsalan Qureshi  (Bsts09-32) Shoaib Ansari 
GSM TOWARDS LTE NETWORKS Lecture # 2. CELLULAR GENERATIONS First Generation Wireless : Analog Second Generation Wireless (2G): Digital Second Generation.
Network components of the Switching Subsystem The switching Subsystem comprises the following subsystems. MSC (Mobile Switching Centre) HLR (Home location.
Cellular Mobile Communication Systems Lecture 8
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
GSM NETWORK ARCHITECTURE CH 2. In this chapter we will see : In this chapter we will see : 1.GSM NETWORK ARCHITECTURE 2.The Radio Subsystem 3.The Network.
4.1 Security in GSM Security services – access control/authentication user  SIM (Subscriber Identity Module): secret PIN (personal identification number)
GSM Network Architecture
A SEMINAR REPORT ON CELLULAR SYSTEM Introduction to cellular system The cellular concept was developed and introduce by the bell laboratories in the.
Overview of cellular system
(Global System for Mobile Communication)
WIRELESS FRAUD Detection & Prevention. Method of Fraud CLONING of SIM Card.
Cellular Networks 1. Overview 1G Analog Cellular 2G TDMA - GSM 2G CDMA - IS G 3G 4G and Beyond Cellular Engineering Issues 2.
1 Wireless Networks Lecture 16 GSM: Global System for Mobile Communication Dr. Ghalib A. Shah.
1 Lecture 19 EEE 441 Wireless And Mobile Communications.
Presentation on GSM Network. By. P. Victer Paul Dear, We planned to share our eBooks and project/seminar contents for free to all needed friends like.
Cellular Network Base stations transmit to and receive from mobiles at the assigned spectrum Multiple base stations use the same spectrum The service area.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
Mobile Communications: Wireless Telecommunication Systems  Market  GSM  Overview  Services  Sub-systems  Components.
Bitwali1 Wireless Communication Introduction to Mobile Communication and Cellular System Lecture 3-4.
Overview of the GSM for Cellular System
GSM Network GLOBAL SYSTEM FOR MOBILE COMMUNICATION
Communication Security Lecture 4: Introduction To GSM
Wireless Network PMIT- By-
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
GSM Training for Professionals
Third Generation (3G) Cellular Network 3G System
GPS.
GSM.
Global System for Mobile Communications
GSM,GPRS & CDMA Technology
GSM.
3G Security Principles Build on GSM security
Wireless Communications MOBILE COMMUNICATIONS Lecture:7
GSM location updating procedure
Name:Shivalila A H,Shima
GSM (GLOBAL SYSTEM FOR MOBILE COMMUNICATION). It all started like this First telephone (photophone) – Alexander Bell, 1880 First telephone (photophone)
GSM – GLOBAL SYSTEM FOR MOBILE COMMUNICATION
Subject Name: GSM Subject Code: 10EC843
GPRS GPRS stands for General Packet Radio System. GPRS provides packet radio access for mobile Global System for Mobile Communications (GSM) and time-division.
Global system for Mobile Communications
GLOBAL SYSTEM FOR MOBILE COMMUNICATION (GSM) ARCHITECTURE Vivek E.B.
GSM location updating procedure
GSM – GLOBAL SYSTEM FOR MOBILE COMMUNICATION
GSM By Saumya Chaturvedi.
Dept. of Business Administration
Special Topic: Wireless Security
LM 7. Cellular Network Security
Security in Wide Area Networks
Presentation transcript:

GSM SECURITY AND ENCRYPTION

What is GSM? GSM stands for Global System for Mobile communication The GSM emerged in the early 1970’s The GSM is a circuit switched system that divides each 200KHZ channel into eight 25KHZ timeslots The GSM owns a market share of more than 70 % of the digital cellulor subscribers.

Why GSM? International roaming Low-cost mobile sets and base stations High quality speech Compatability with integrated services digital network(ISDN) and other telephone company services Support for new services.

GSM Brief history 1982 CEPT establishes a GSM group inorder to develop the standerds for a pan european cellulor mobile system 1987 Time Division Multiple Access (TDMA) is choosen as the access method 1988 GSM system is validated

GSM-Architecture

GSM-User services Telephony services Data services Supplementary services

GSM security model The purpose of GSM security: The access to the mobile services. Any relavent item from being disclosed at the radio path,mainly inorder to ensure that. Privacy of user- related information.

Security features of GSM Authentication of registered subscribers only. Secure data transfer through the use of encryption. Subscriber identity protection. Mobile phones are inoperable without a SIM. Duplicate SIM or not allowed in the network.

The Authentication Procedure The mobile station send IMSI to the network. The network received IMSI and found corresponding KI of that IMSI. The network generated a 128 bit random number(RAND) and sent it to the mobile station over the air interface. The MS calculates a SRES with A3 algorithm using the given challenge(RAND) and KI residing in the SIM.At the same time networks calculates the SERS using the same algorithm and same inputs The MS sends SERS to the network The network test the SERS for the validity

Authentication process

Encryption of the data Encrypted communication is initiated by a ciphering mode request command for the GSM network A5 algorithm used for encrypt the data The MS authentication is an optional procedure in the beginning of the call,but it is usually not performed

Base Station Subsystem Encryption process Mobile Stations Base Station Subsystem Network Management BTS OMC Exchange System BTS VLR MSC BSC HLR AUC BTS EIR

Other security features Subscribers identity protection Smart card

Overview of cryptography Symmetric algorithms Block ciphers Stream ciphers

A3 – MS Authentication Algorithm Goal Generation of SRES response to MSC’s random challenge RAND

Applications 1. Mobile telephony 2. GSM-R 3. Telemetry system -fleet management -automatic meter reading -toll collection 4.Value added services

FUTURE SCOPE The range of applications offered, with home banking and electronic trading emerging. The development of interworking between different wireless networks with different cellular technologies, cordless and GSM, and satellite and GSM The development of advanced new broadband wireless technology offering at least 144Kbit/s transmission rates by 2000. The development of new types of terminals with data only facilities over GSM on offer without the need for a cellular phone.

Conclusion The security mechanisms specified in the GSM standard make it the most secure cellular telecommunications system available. The use of authentication, encryption, and temporary identification numbers ensures the privacy and anonymity of the system's users, as well as safeguarding the system against fraudulent use. Even GSM systems with the A5/2 encryption algorithm, or even with no encryption are inherently more secure than analog systems due to their use of speech coding, digital modulation, and TDMA channel access

THANK YOU