ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Evaluation of Authentication and Ciphering Algorithms in GSM?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 7)

Publication Date:

Authors : ; ;

Page : 379-392

Keywords : GSM; HSCSD; GPRS; EDGE; UMTS;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The Mobile communications has experienced a great acceptance among the human societies. It has influenced and revolutionized different aspects of the human life. With a mobile handset, anyone can be accessed anywhere. This paper briefly presents the most important security flaws of the GSM network and its transport channels. It also provides some practical solutions to improve the security of currently available GSM systems. The Mobile communications has experienced a great acceptance among the human societies. It has influenced and revolutionized different aspects of the human life. With a mobile handset, anyone can be accessed anywhere. Global System for Mobile Communications (GSM) is the most popular mobile phone system in the world, accounting for 70% of the world’s digital mobile phones. GSM service started in 1991. According to a press release by the GSM Association in May 2001; there are more than half a billion GSM mobile phones in use in over 168 countries today.

Last modified: 2014-07-19 22:10:10