Investigating vulnerabilities in GSM security

M. Pannu, Robert Bird, B. Gill, K. Patel

    Research output: Contribution to conferencePaper

    11 Citations (Scopus)

    Abstract

    The telecommunications industry uses a combination of 2G (GSM), 3G (UMTS) and 4G (LTE) systems to access communication worldwide. Concurrent with a recent rise in cyber-attacks, the requirement for a secure infrastructure is increasingly crucial. However, while each new standard offers better protection to the mobile users, currently 84% of households in the UK have access to 3G signal from the four leading providers. Users are expected to be aware of the possible security threats, however auditing of the existing systems is responsibility of administrators. This paper highlights weaknesses and issues in the Global System for Mobile communications (GSM) standard, and presents an informed approach to help audit GSM networks for vulnerabilities.
    Original languageEnglish
    Pages1-7
    DOIs
    Publication statusPublished - 2015
    Event2015 International Conference and Workshop on Computing and Communication (IEMCON) - Vancouver, Canada
    Duration: 15 Oct 201517 Oct 2015

    Conference

    Conference2015 International Conference and Workshop on Computing and Communication (IEMCON)
    Abbreviated titleIEMCON
    Country/TerritoryCanada
    CityVancouver
    Period15/10/1517/10/15

    Bibliographical note

    The full text is currently unavailable on the repository.

    Keywords

    • 3G mobile communication
    • Long Term Evolution
    • telecommunication security
    • 4G LTE systems
    • GSM security
    • UMTS
    • cyber-attacks
    • global system
    • mobile communications
    • mobile users
    • secure infrastructure
    • security threats
    • telecommunications industry
    • 2G
    • 3G
    • A5/1
    • GSM Security
    • Mobile Communication
    • Wireless Security
    • Base stations
    • Encryption
    • GSM
    • Hardware
    • Mobile communication

    Fingerprint

    Dive into the research topics of 'Investigating vulnerabilities in GSM security'. Together they form a unique fingerprint.

    Cite this