Evaluation of Authentication and Ciphering Algorithms in GSM?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 7)Publication Date: 2014-07-30
Authors : Payal; Vikram Nandal;
Page : 379-392
Keywords : GSM; HSCSD; GPRS; EDGE; UMTS;
Abstract
The Mobile communications has experienced a great acceptance among the human societies. It has influenced and revolutionized different aspects of the human life. With a mobile handset, anyone can be accessed anywhere. This paper briefly presents the most important security flaws of the GSM network and its transport channels. It also provides some practical solutions to improve the security of currently available GSM systems. The Mobile communications has experienced a great acceptance among the human societies. It has influenced and revolutionized different aspects of the human life. With a mobile handset, anyone can be accessed anywhere. Global System for Mobile Communications (GSM) is the most popular mobile phone system in the world, accounting for 70% of the world’s digital mobile phones. GSM service started in 1991. According to a press release by the GSM Association in May 2001; there are more than half a billion GSM mobile phones in use in over 168 countries today.
Other Latest Articles
- UTILISATION OF MOBILE COMMUNICATION IN OPENCAST MINES?
- Recommended Screening-Checks for Placed Orders in Industry Internal Tool- OMS
- IMPLEMENTATION OF CELLULAR NETWORKS WITH LEASING CAPABILITIES FOR LARGE QUERY PROCESS
- EFFICIENT ALGORITHMS SYSTOLIC TREE WITH ABC BASED PATTERN MINING ALGORITHM FOR HIGH UTILITY ITEMSETS FROM TRANSACTIONAL DATABASES
- Research Study on Internal Order Cancellation in Online Shopping Industry?
Last modified: 2014-07-19 22:10:10