Solutions to the GSM Security Weaknesses

Recently, the mobile industry has experienced an extreme increment in number of its users. The GSM network with the greatest worldwide number of users succumbs to several security vulnerabilities. Although some of its security problems are addressed in its upper generations, there are still many operators using 2G systems. This paper briefly presents the most important security flaws of the GSM network and its transport channels. It also provides some practical solutions to improve the security of currently available 2G systems.

[1]  Chi-Chun Lo,et al.  Secure communication mechanisms for GSM networks , 1999, IEEE Trans. Consumer Electron..

[2]  Vladimir Cretu,et al.  Mitigating denial of service threats in GSM networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[3]  Valtteri Niemi,et al.  UMTS security , 2003 .

[4]  Praphul Chandra BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering) , 2005 .

[5]  Pankaj Rohatgi,et al.  Partitioning attacks: or how to rapidly clone some GSM cards , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[6]  Wolfgang Rankl,et al.  Smart Card Handbook , 1997 .

[7]  A.B. Rekha,et al.  End-to-end security for GSM users [speech coding method] , 2005, 2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005..

[8]  Ahmet Kondoz,et al.  Real time data transmission over GSM voice channel for secure voice and data applications , 2004 .

[9]  Ahmet M. Kondoz,et al.  Real-time end-to-end secure voice communications over GSM voice channel , 2005, 2005 13th European Signal Processing Conference.

[10]  Tyler Moore,et al.  Securing SS7 Telecommunications Networks , 2001 .

[11]  S.M. Siddique,et al.  Notice of Violation of IEEE Publication PrinciplesGSM Security Issues and Challenges , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).

[12]  Francisco Javier González-Castaño,et al.  Real-time interception systems for the GSM protocol , 2002, IEEE Trans. Veh. Technol..

[13]  Eli Biham,et al.  Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication , 2003, Journal of Cryptology.

[14]  Alex Biryukov,et al.  Real Time Cryptanalysis of A5/1 on a PC , 2000, FSE.