Security Management System of Cellular Communication: Case Study

Cellular communication is being widely used by all over the world. The users of handsets are increasing due to the request from marketing sector. The important aspect that has to be touch in this paper is about the security system of cellular communication. It is important to provide users with a secure channel for communication. A brief description of the new GSM cellular network architecture will be provided. Limitations of cellular networks, their security issues and the different types of attacks will be discussed. The paper will go over some new security mechanisms that have been proposed by researchers. Overall, this paper clarifies the security system or services of cellular communication using GSM. Three Malaysian Communication Companies were taken as Case study in this paper.




References:
[1] Definition of GSM, Retrieved January 2007, http://www.aboutwireless.
com/terms/gsm.htm
[2] Imai, H., et. al., Wireless communications security, Boston: Artech
House, 2006.
[3] EIA/TIA, Cellular Radio-Telecommunications Intersystem Operations,"
Tech. Rep. IS-41 Revision C, 1995.
[4] M. Mouly and M. B. Pautet, The GSM System for Mobile
Communications, M. Mouly, 49 rue Louise Bruneau, Palaiseau, France,
1992.
[5] GSM Association 2007, retrived January 2007,
http://www.gsmworld.com/index.shtml
[6] H. Granbohm and J. Wiklund, GPRS: General Packet Radio Service,
Ericsson Review, vol. 76, no. 2, pp. 82-88, 1999.
[7] J. Ebersp├ñcher and H.-J. Vögel, GSM: Switching, Services and
Protocols, John Wiley & Sons, 1998.
[8] Yang, H., et. al., Securing a Wireless World, Proceedings of the IEEE v.
94 no. 2 Feb. 2006.
[9] Fernandez, E., et. al., Some security issues of wireless systems,
Advanced Distributed Systems: 5th International School and
Symposium, ISSADS 2005, Guadalajara, Mexico, January 24-28, 2005
[10] Zhu, J., A new authentication scheme with anonymity for wireless
environments, Consumer Electronics, IEEE Transactions on Publication
Feb 2004 Volume: 50, Issue: 1 p.p.: 231- 235.
[11] Carneiro, G., Cross-Layer Design In 4G Wireless Terminals, IEEE
Wireless Communications, 2004.
[12] Lauter, K., The Advantages Of Elliptic Curve Cryptography For
Wireless Security, Wireless Communications, IEEE Feb 2004 Volume:
11, Issue:1, pp. 62-67.
[13] Akyildiz, McNair, et al. Mobility management in next-generation
wireless systems. Proceedings of the IEEE, August 1999.
[14] Brookson, C., GSM security: a description of the reasons for security
and the techniques, IEE Colloquium on Security and Cryptography
Applications to Radio Systems. June ÔÇÿ94.