Vulnerabilities in Existing GSM Technology that causes Exploitation

Abstract

Global System for Mobile communications (GSM system) has become the most popular standard for digital cellular communication for day to day communication in the world. Cellular phones have become a ubiquitous means of communications with over 6 billion users worldwide in 2013, of which 80% are GSM subscribers. It has been over 20 years since GSM was designed, and during this time several security problems have been found. However practical exploits of these weaknesses are complicated because of all the signal processing involved and have not been seen much outside of their use by law enforcement agencies.

Authors and Affiliations

Madhav M. Ajwalia , Prof. (Dr. ) Nilesh K. Modi

Keywords

Related Articles

ATTACKS ON SECURITY PROTOCOLS USING AVISPA

Now a days, Use of Internet is increased day by day. Both Technical and non technical people use the Internet very frequently but only technical user can understand the aspects working behind Internet. There are differen...

Progressive Analysis on Twitter-Social Data Using Cloud

As the rise of social networking, people started share information through different kinds of social media. Among all of them, twitter is an important resource. Twitter is a micro-blogging service that enables its users...

Z-U-T-S SHAPED STRUCTURES IN AN INTEGRATED CPW FED PRINTED MONOPOLE ANTENNA

A dual band co-planar waveguide fed Z-U-T-S shaped monopole antenna is proposed. The antenna is fabricated on an h = 1.6mm FR4 epoxy substrate with dielectric constant εr = 4.3 and loss tangent tan δ = 0.008. The size of...

A KEY MANAGEMENT PROTOCOL FOR HIERACHICAL WIRELESS SENSOR NETWORKS

Wireless sensor networks (WSNs) are deployed in hostile environments in many applications. In order to resist security threats, sensor nodes of WSNs often use pre-shared secret keys to encrypt and exchange confidential d...

Survey on Improving Frequent Pattern mining in Spatial Database

spatial database system as a database system that offers spatial data types in its data model and query language and supports spatial data types in its implementation, providing at least spatial indexing and spatial join...

Download PDF file
  • EP ID EP161768
  • DOI -
  • Views 134
  • Downloads 0

How To Cite

Madhav M. Ajwalia, Prof. (Dr. ) Nilesh K. Modi (2013). Vulnerabilities in Existing GSM Technology that causes Exploitation. International Journal of Computer Science & Engineering Technology, 4(5), 513-518. https://www.europub.co.uk/articles/-A-161768