Abstract | ||
---|---|---|
Mobile networks are constantly changing and adapting to the needs of users and providers. The legacy global system for mobile communications (GSM) step in the evolution of mobile networks has by far the largest installed user-base. The very large user-base has made it a requirement for providers to modify their future systems to interoperate with the legacy GSM system. The security problems brought about by this legacy integration have a major impact on the security improvements developed for the universal mobile telecommunications systems (UMTS). This paper proposes simple and effective solutions to reduce the possible attacks on the UMTS systems due to the above integration. First we propose a subtle modification to the GSM security protocols as a standalone solution, and then a modification to the UMTS security protocols is proposed as a second solution. |
Year | Venue | Keywords |
---|---|---|
2011 | Internet Technology and Secured Transactions | 3G mobile communication,cellular radio,cryptographic protocols,telecommunication security,GSM security protocols,UMTS security protocols,Universal Mobile Telecommunications Systems,global system for mobile communications,legacy integration,mobile networks,security issues,Authentication and Integrity protocols,GSM,Legacy Integration,Mobile Networks,UMTS |
Field | DocType | ISBN |
Cell Broadcast,GSM,Authentication,Telecommunications,Cryptographic protocol,UMTS frequency bands,Interoperability,Computer security,Computer science,Computer network,Customised Applications for Mobile networks Enhanced Logic,Mobile telephony | Conference | 978-1-4577-0884-8 |
Citations | PageRank | References |
2 | 0.43 | 10 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Eric Southern | 1 | 2 | 0.43 |
Abdelkader H. Ouda | 2 | 93 | 9.26 |
Abdallah Shami | 3 | 845 | 88.93 |