Abstract
The telecommunications industry uses a combination of 2G (GSM), 3G (UMTS) and 4G (LTE) systems to access communication worldwide. Concurrent with a recent rise in cyber-attacks, the requirement for a secure infrastructure is increasingly crucial. However, while each new standard offers better protection to the mobile users, currently 84% of households in the UK have access to 3G signal from the four leading providers. Users are expected to be aware of the possible security threats, however auditing of the existing systems is responsibility of administrators. This paper highlights weaknesses and issues in the Global System for Mobile communications (GSM) standard, and presents an informed approach to help audit GSM networks for vulnerabilities.
| Original language | English |
|---|---|
| Pages | 1-7 |
| DOIs | |
| Publication status | Published - 2015 |
| Event | 2015 International Conference and Workshop on Computing and Communication (IEMCON) - Vancouver, Canada Duration: 15 Oct 2015 → 17 Oct 2015 |
Conference
| Conference | 2015 International Conference and Workshop on Computing and Communication (IEMCON) |
|---|---|
| Abbreviated title | IEMCON |
| Country/Territory | Canada |
| City | Vancouver |
| Period | 15/10/15 → 17/10/15 |
Bibliographical note
The full text is currently unavailable on the repository.Keywords
- 3G mobile communication
- Long Term Evolution
- telecommunication security
- 4G LTE systems
- GSM security
- UMTS
- cyber-attacks
- global system
- mobile communications
- mobile users
- secure infrastructure
- security threats
- telecommunications industry
- 2G
- 3G
- A5/1
- GSM Security
- Mobile Communication
- Wireless Security
- Base stations
- Encryption
- GSM
- Hardware
- Mobile communication