Security Management System of Cellular Communication: Case Study
Cellular communication is being widely used by all
over the world. The users of handsets are increasing due to the
request from marketing sector. The important aspect that has to be
touch in this paper is about the security system of cellular
communication. It is important to provide users with a secure channel
for communication. A brief description of the new GSM cellular
network architecture will be provided. Limitations of cellular
networks, their security issues and the different types of attacks will
be discussed. The paper will go over some new security mechanisms
that have been proposed by researchers. Overall, this paper clarifies
the security system or services of cellular communication using
GSM. Three Malaysian Communication Companies were taken as
Case study in this paper.
[1] Definition of GSM, Retrieved January 2007, http://www.aboutwireless.
com/terms/gsm.htm
[2] Imai, H., et. al., Wireless communications security, Boston: Artech
House, 2006.
[3] EIA/TIA, Cellular Radio-Telecommunications Intersystem Operations,"
Tech. Rep. IS-41 Revision C, 1995.
[4] M. Mouly and M. B. Pautet, The GSM System for Mobile
Communications, M. Mouly, 49 rue Louise Bruneau, Palaiseau, France,
1992.
[5] GSM Association 2007, retrived January 2007,
http://www.gsmworld.com/index.shtml
[6] H. Granbohm and J. Wiklund, GPRS: General Packet Radio Service,
Ericsson Review, vol. 76, no. 2, pp. 82-88, 1999.
[7] J. Ebersp├ñcher and H.-J. Vögel, GSM: Switching, Services and
Protocols, John Wiley & Sons, 1998.
[8] Yang, H., et. al., Securing a Wireless World, Proceedings of the IEEE v.
94 no. 2 Feb. 2006.
[9] Fernandez, E., et. al., Some security issues of wireless systems,
Advanced Distributed Systems: 5th International School and
Symposium, ISSADS 2005, Guadalajara, Mexico, January 24-28, 2005
[10] Zhu, J., A new authentication scheme with anonymity for wireless
environments, Consumer Electronics, IEEE Transactions on Publication
Feb 2004 Volume: 50, Issue: 1 p.p.: 231- 235.
[11] Carneiro, G., Cross-Layer Design In 4G Wireless Terminals, IEEE
Wireless Communications, 2004.
[12] Lauter, K., The Advantages Of Elliptic Curve Cryptography For
Wireless Security, Wireless Communications, IEEE Feb 2004 Volume:
11, Issue:1, pp. 62-67.
[13] Akyildiz, McNair, et al. Mobility management in next-generation
wireless systems. Proceedings of the IEEE, August 1999.
[14] Brookson, C., GSM security: a description of the reasons for security
and the techniques, IEE Colloquium on Security and Cryptography
Applications to Radio Systems. June ÔÇÿ94.
[1] Definition of GSM, Retrieved January 2007, http://www.aboutwireless.
com/terms/gsm.htm
[2] Imai, H., et. al., Wireless communications security, Boston: Artech
House, 2006.
[3] EIA/TIA, Cellular Radio-Telecommunications Intersystem Operations,"
Tech. Rep. IS-41 Revision C, 1995.
[4] M. Mouly and M. B. Pautet, The GSM System for Mobile
Communications, M. Mouly, 49 rue Louise Bruneau, Palaiseau, France,
1992.
[5] GSM Association 2007, retrived January 2007,
http://www.gsmworld.com/index.shtml
[6] H. Granbohm and J. Wiklund, GPRS: General Packet Radio Service,
Ericsson Review, vol. 76, no. 2, pp. 82-88, 1999.
[7] J. Ebersp├ñcher and H.-J. Vögel, GSM: Switching, Services and
Protocols, John Wiley & Sons, 1998.
[8] Yang, H., et. al., Securing a Wireless World, Proceedings of the IEEE v.
94 no. 2 Feb. 2006.
[9] Fernandez, E., et. al., Some security issues of wireless systems,
Advanced Distributed Systems: 5th International School and
Symposium, ISSADS 2005, Guadalajara, Mexico, January 24-28, 2005
[10] Zhu, J., A new authentication scheme with anonymity for wireless
environments, Consumer Electronics, IEEE Transactions on Publication
Feb 2004 Volume: 50, Issue: 1 p.p.: 231- 235.
[11] Carneiro, G., Cross-Layer Design In 4G Wireless Terminals, IEEE
Wireless Communications, 2004.
[12] Lauter, K., The Advantages Of Elliptic Curve Cryptography For
Wireless Security, Wireless Communications, IEEE Feb 2004 Volume:
11, Issue:1, pp. 62-67.
[13] Akyildiz, McNair, et al. Mobility management in next-generation
wireless systems. Proceedings of the IEEE, August 1999.
[14] Brookson, C., GSM security: a description of the reasons for security
and the techniques, IEE Colloquium on Security and Cryptography
Applications to Radio Systems. June ÔÇÿ94.
@article{"International Journal of Information, Control and Computer Sciences:56814", author = "Othman O. Khalifa and Abdulrazzag Aburas and A. Al Bagul and Meftah Hrairi and Muhammad Shahril bin
Shahbuddin and Harman bin Mat Kasa", title = "Security Management System of Cellular Communication: Case Study", abstract = "Cellular communication is being widely used by all
over the world. The users of handsets are increasing due to the
request from marketing sector. The important aspect that has to be
touch in this paper is about the security system of cellular
communication. It is important to provide users with a secure channel
for communication. A brief description of the new GSM cellular
network architecture will be provided. Limitations of cellular
networks, their security issues and the different types of attacks will
be discussed. The paper will go over some new security mechanisms
that have been proposed by researchers. Overall, this paper clarifies
the security system or services of cellular communication using
GSM. Three Malaysian Communication Companies were taken as
Case study in this paper.", keywords = "GSM, Security systems, SIM CARD, IMSI,
Authentication.", volume = "1", number = "11", pages = "3516-5", }