Investigating vulnerabilities in GSM security

M. Pannu, Robert Bird, B. Gill, K. Patel

Research output: Contribution to conferencePaper

7 Citations (Scopus)


The telecommunications industry uses a combination of 2G (GSM), 3G (UMTS) and 4G (LTE) systems to access communication worldwide. Concurrent with a recent rise in cyber-attacks, the requirement for a secure infrastructure is increasingly crucial. However, while each new standard offers better protection to the mobile users, currently 84% of households in the UK have access to 3G signal from the four leading providers. Users are expected to be aware of the possible security threats, however auditing of the existing systems is responsibility of administrators. This paper highlights weaknesses and issues in the Global System for Mobile communications (GSM) standard, and presents an informed approach to help audit GSM networks for vulnerabilities.
Original languageEnglish
Publication statusPublished - 2015
Event2015 International Conference and Workshop on Computing and Communication (IEMCON) - Vancouver, Canada
Duration: 15 Oct 201517 Oct 2015


Conference2015 International Conference and Workshop on Computing and Communication (IEMCON)
Abbreviated titleIEMCON

Bibliographical note

The full text is currently unavailable on the repository.


  • 3G mobile communication
  • Long Term Evolution
  • telecommunication security
  • 4G LTE systems
  • GSM security
  • UMTS
  • cyber-attacks
  • global system
  • mobile communications
  • mobile users
  • secure infrastructure
  • security threats
  • telecommunications industry
  • 2G
  • 3G
  • A5/1
  • GSM Security
  • Mobile Communication
  • Wireless Security
  • Base stations
  • Encryption
  • GSM
  • Hardware
  • Mobile communication


Dive into the research topics of 'Investigating vulnerabilities in GSM security'. Together they form a unique fingerprint.

Cite this