Investigating vulnerabilities in GSM security

M. Pannu, Robert Bird, B. Gill, K. Patel

Research output: Contribution to conferencePaper

5 Citations (Scopus)

Abstract

The telecommunications industry uses a combination of 2G (GSM), 3G (UMTS) and 4G (LTE) systems to access communication worldwide. Concurrent with a recent rise in cyber-attacks, the requirement for a secure infrastructure is increasingly crucial. However, while each new standard offers better protection to the mobile users, currently 84% of households in the UK have access to 3G signal from the four leading providers. Users are expected to be aware of the possible security threats, however auditing of the existing systems is responsibility of administrators. This paper highlights weaknesses and issues in the Global System for Mobile communications (GSM) standard, and presents an informed approach to help audit GSM networks for vulnerabilities.
Original languageEnglish
Pages1-7
DOIs
Publication statusPublished - 2015
Event2015 International Conference and Workshop on Computing and Communication (IEMCON) - Vancouver, Canada
Duration: 15 Oct 201517 Oct 2015

Conference

Conference2015 International Conference and Workshop on Computing and Communication (IEMCON)
Abbreviated titleIEMCON
CountryCanada
CityVancouver
Period15/10/1517/10/15

Bibliographical note

The full text is currently unavailable on the repository.

Keywords

  • 3G mobile communication
  • Long Term Evolution
  • telecommunication security
  • 4G LTE systems
  • GSM security
  • UMTS
  • cyber-attacks
  • global system
  • mobile communications
  • mobile users
  • secure infrastructure
  • security threats
  • telecommunications industry
  • 2G
  • 3G
  • A5/1
  • GSM Security
  • Mobile Communication
  • Wireless Security
  • Base stations
  • Encryption
  • GSM
  • Hardware
  • Mobile communication

Fingerprint Dive into the research topics of 'Investigating vulnerabilities in GSM security'. Together they form a unique fingerprint.

  • Cite this

    Pannu, M., Bird, R., Gill, B., & Patel, K. (2015). Investigating vulnerabilities in GSM security. 1-7. Paper presented at 2015 International Conference and Workshop on Computing and Communication (IEMCON), Vancouver, Canada. https://doi.org/10.1109/IEMCON.2015.7344480