Loading

GSM Security
Anshu Anand Jethi1, Ajay Rana2
1Anshu Anand Jethi, Department of Computer Science and Engineering, Amity University, Noida (U.P) India.
2Ajay Rana, Department of Computer Science and Engineering, Amity University, Noida (U.P) India.
Manuscript received on April 05, 2014. | Revised Manuscript received on April 11, 2014. | Manuscript published on April 15, 2014. | PP: 41-43 | Volume-2 Issue-5, April 2014. | Retrieval Number: E0644042514/2014©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper demonstrates the secure communication in GSM. Global System for Mobile Communication (GSM) is a second generation cellular standard developed to provide voice services and data delivery using digital modulation. With its great features like providing access to users at anytime and anywhere, mobile communication is very attractive among the users as well as operators and service providers. But, in spite of of several advantages, mobile communication also has been facing many security problems. In 2G and 3G technologies viz GSM, GPRS and UMTS, the architecture comprises of mainly three nodes; the mobile station (MS), Visitor Location Register/Serving GPRS Support Node (VLR/SGSN), and Home Location Register /Authentication Center (HLR/AuC). These nodes are involved to encrypt/decrypt the data and authenticate the user (MS) in GSM, GPRS and UMTS.
Keywords: GSM, GPRS and UMTS, (VLR/SGSN), (HLR/AuC)