SlideShare une entreprise Scribd logo
1  sur  13
Resume of :
Security
Management
System of Cellular
Communication
Ardhita Banu Adji (1201120493)
Wibisono Juhdi (1201120484)
1. Overview
• Cellular communication widely used by all over the world.
The users of handsets are increasing due to the request
from marketing sector. The important aspect that has to be
touch in this paper is about the security system of cellular
communication. It is important to provide users with a
secure channel for communication.
2. Introduction
Some of the cellular communication nowadays are using GSM where it is a
common world wide standard. Since many GSM network operators have
roaming agreements with foreign operators, users can often continue to use
their mobile phones when they travel to other countries. For instance, we can
contact our friends outside
The objective of the security system is to make the system as secure as the
public switched telephone network. The use of radio at the transmissions
medium allows a number of potential threats from eavesdropping the
transmissions
3. GSM Security Measures
Four security measures in GSM :
1. PIN code (Local)
2. Authentication of SIM CARD (Local)
3. User authentication performed by network, encrypting of information sent
over radio interface
4. Usage of TMSI instead of IMSI over radio interface
The objective of the security system is to make the system as secure as
the public switched telephone network. The use of radio at the
transmissions medium allows a number of potential threats from
eavesdropping the transmissions
4. DESCRIPTION OF THE FUNCTIONS OF
THE SECURITY SYSTEMS
The four security services :
1. Anonymity: Make not easy to identify the user of the system
2. Authentication: The Operator will knows who is using the system for
billing purposes
3. Signaling protection: protect sensitive information on the signaling
channel, such as telephone numbers, is protected the radio path
4. User Data Protection: user data passing over the radio path is protected
4.1 Authentication process
The mobile encrypts the challenge using the authentication algorithm (A3)
and the key assigned to the mobile and sends a response back. The
operator can check that, given the key of the mobile, the response to the
challenge is correct. Eavesdropping the radio channel reveals no useful
information, as the next time a new random challenge will be used. As
mentioned before, eavesdropping refers to an intruder being able to interact
with the communication channel so that information can be extracted from
the channel, possibly without the knowledge of any of the communicating
parties.
4.2 GSM Security
Implementation
• In theory, A3 implemented within a Smart Card. It is
“Tamper proof” smart card containing the key. Furthermore,
A5 is in the data path and must be fast (in the phone
hardware). The difference between A5/1 and A5/2 are A5/1
is “strong” encryption and A5/2 for “export”-level encryption
5. Implementation
clarify about the implementation and roaming of the GSM network
• The authentication algorithm A3 is an operator option,
and is implemented within the smart card (known as the
Subscriber Interface Module or SIM). So that the
operators may interwork without revealing the
authentication algorithms and mobile keys (Ki) to each
other, GSM allows triplets of challengers (R), responses
(SRES) and communications keys (Kc) to be sent
between operators over the connecting networks. The A
series algorithms are contained within the mobile
equipment, as they have to be sufficiently fast and
therefore hardware. There are two defined algorithms
used in GSM known as A5/1 and A5/2
These algorithms can all be built using a
few thousand transistors, an usually takes
small area of a chip within the mobile.
5.1 TECHNIQUES FOR PRIVACY AND
AUTHENTICATION IN
PERSONAL COMMUNICATION SYSTEMS
The figure shows the user’s handset on
the
upper left and the service provider’s
network in the upper right corner. The
three part security model that connects
this endpoint provides the logical steps
necessary to accomplish this process.
The first part of the general security
model is provisioning. This is means by
which the user’s handset acquires the
bona fide that will enable the network to
subsequently recognize him as a
legitimate user. Part two of the model is
the means by which a handset
establishes credibility when the user
registers with a local service provider
such as Maxis and Celcom
5.2 P&A provisioning of secret key systems
6. SimulationSimulate the real security
system of cellular
communication is
functioning by using Visual
Basic application.
By using this
application first of all the
box will display as =>>>>>
The important of this message box is to make sure that we can use the server
or not. There are two conditions. Connection available or registration fails. If
registration is fail we cannot connect to the server and transmission will stop
and vice versa. If connection is available, then the user can continue the
transmission with dialing the number of the person that he wants to speak. As
the result, the box will appear with the registration number and the dial number
7. LIMITATION OF GSM SECURITY
Each system in this world has a limit. It happens in GSM security
system or requirements, where there are a number of potential weaknesses
:
The security for GSM has to be Appropriate for the System Operator and
Customer
The Countermeasures : To protect against an intruder and to have a strong
authentication
The Security Process Prohibition : Mustn’t increase bandwidth, allow error
rate.
The Design of Operator’s GSM System : Run the procedures.
8. Conclusion
• Security system is extremely important
nowadays because most of the
components that we use today are
basically deal with electronics
component e.g. cellular, computer, car,
door, weapons, machines, and many
others The reason why we had chosen
GSM because more than one in ten of
the world's population and over 179
countries including Malaysia are using
this system. As we had explained, the
General Packet Radio Service is a new
bearer service for GSM that greatly
improves and simplifies wireless
access to packet data networks, e.g.,
to the Internet. Also, it applies a packet
radio principle to transfer user data
packets in an efficient way between
mobile stations and external packet
data networks.
The GSM network in term of security
had 4 important aspects: Anonymity,
Authentication, Signaling protection
and User Data Protection. The
security system of GSM starting from
the user’s handset to the service of
GSM network was implemented. The
whole security has started from
Subscriber Interface Module or SIM
and goes through the network. Also,
GSM provides a basic range of
security features to ensure adequate
protection for both the operator and
customer. Over the lifetime of a
system threat and technology change,
and so the security is periodically
reviewed and changed. The technical
security features must be properly
supported by procedures to make sure
complete security. The security
provided by GSM is well in advance of
similar mobile or cellular radio systems

Contenu connexe

Tendances

Gsm anti theft system
Gsm anti theft systemGsm anti theft system
Gsm anti theft system
Ashu0711
 
Iirdem implementation of smart homes and industrial automation system with se...
Iirdem implementation of smart homes and industrial automation system with se...Iirdem implementation of smart homes and industrial automation system with se...
Iirdem implementation of smart homes and industrial automation system with se...
Iaetsd Iaetsd
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless Networks
William Chipman
 
Gsm security
Gsm securityGsm security
Gsm security
Ali Kamil
 
Gsm fundamentals
Gsm fundamentalsGsm fundamentals
Gsm fundamentals
michaelugo
 
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Siddharth Rao
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umts
Ankit Gupta
 

Tendances (19)

GSM & UMTS Security
GSM & UMTS SecurityGSM & UMTS Security
GSM & UMTS Security
 
Security in GSM
Security in GSMSecurity in GSM
Security in GSM
 
Gsm anti theft system
Gsm anti theft systemGsm anti theft system
Gsm anti theft system
 
IRJET- Mobile Detector
IRJET-  	  Mobile DetectorIRJET-  	  Mobile Detector
IRJET- Mobile Detector
 
Moblie technology
Moblie technologyMoblie technology
Moblie technology
 
Security aspect in GSM
Security aspect in GSMSecurity aspect in GSM
Security aspect in GSM
 
Iirdem implementation of smart homes and industrial automation system with se...
Iirdem implementation of smart homes and industrial automation system with se...Iirdem implementation of smart homes and industrial automation system with se...
Iirdem implementation of smart homes and industrial automation system with se...
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless Networks
 
Gsm security
Gsm securityGsm security
Gsm security
 
Vehicle Theft Intimation Using GSM
Vehicle Theft Intimation Using GSMVehicle Theft Intimation Using GSM
Vehicle Theft Intimation Using GSM
 
Design of concealed alarm system based on gsm
Design of concealed alarm system based on gsmDesign of concealed alarm system based on gsm
Design of concealed alarm system based on gsm
 
What is GSM meaning
What is GSM meaningWhat is GSM meaning
What is GSM meaning
 
Gsm fundamentals
Gsm fundamentalsGsm fundamentals
Gsm fundamentals
 
IRJET- Mobile Communication Security using Encryption and Decryption
IRJET- Mobile Communication Security using Encryption and DecryptionIRJET- Mobile Communication Security using Encryption and Decryption
IRJET- Mobile Communication Security using Encryption and Decryption
 
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
 
Pir and gsm based house security system
Pir and gsm based house security systemPir and gsm based house security system
Pir and gsm based house security system
 
Keypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm TechnologyKeypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm Technology
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umts
 
GSM BASED DEVICES CONTROL SYSTEM PROJECT REPORT
GSM BASED DEVICES CONTROL SYSTEM PROJECT REPORTGSM BASED DEVICES CONTROL SYSTEM PROJECT REPORT
GSM BASED DEVICES CONTROL SYSTEM PROJECT REPORT
 

Similaire à Security management systemofcellular_communication

Wireless electronic notice board using gsm technolgy
Wireless electronic notice board using gsm technolgyWireless electronic notice board using gsm technolgy
Wireless electronic notice board using gsm technolgy
dhanshri_deshmukh
 
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseJ.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
Droidcon Berlin
 

Similaire à Security management systemofcellular_communication (20)

GSM Technology and security impact
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impact
 
B010331019
B010331019B010331019
B010331019
 
Security issues in_mobile_payment
Security issues in_mobile_paymentSecurity issues in_mobile_payment
Security issues in_mobile_payment
 
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMEVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
 
Project ppt
Project pptProject ppt
Project ppt
 
Report on gsm vodafone
Report on gsm vodafoneReport on gsm vodafone
Report on gsm vodafone
 
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSPROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
 
Providing end to-end secure
Providing end to-end secureProviding end to-end secure
Providing end to-end secure
 
Project gsm
Project gsmProject gsm
Project gsm
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Anti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 finalAnti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 final
 
Security model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentationSecurity model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentation
 
Wireless electronic notice board using gsm technolgy
Wireless electronic notice board using gsm technolgyWireless electronic notice board using gsm technolgy
Wireless electronic notice board using gsm technolgy
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
A survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsA survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systems
 
01362503
0136250301362503
01362503
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseJ.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
 
7215nsa05
7215nsa057215nsa05
7215nsa05
 

Dernier

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Cara Menggugurkan Kandungan 087776558899
 

Dernier (6)

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 
Leading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdfLeading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdf
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 

Security management systemofcellular_communication

  • 1. Resume of : Security Management System of Cellular Communication Ardhita Banu Adji (1201120493) Wibisono Juhdi (1201120484)
  • 2. 1. Overview • Cellular communication widely used by all over the world. The users of handsets are increasing due to the request from marketing sector. The important aspect that has to be touch in this paper is about the security system of cellular communication. It is important to provide users with a secure channel for communication.
  • 3. 2. Introduction Some of the cellular communication nowadays are using GSM where it is a common world wide standard. Since many GSM network operators have roaming agreements with foreign operators, users can often continue to use their mobile phones when they travel to other countries. For instance, we can contact our friends outside The objective of the security system is to make the system as secure as the public switched telephone network. The use of radio at the transmissions medium allows a number of potential threats from eavesdropping the transmissions
  • 4. 3. GSM Security Measures Four security measures in GSM : 1. PIN code (Local) 2. Authentication of SIM CARD (Local) 3. User authentication performed by network, encrypting of information sent over radio interface 4. Usage of TMSI instead of IMSI over radio interface The objective of the security system is to make the system as secure as the public switched telephone network. The use of radio at the transmissions medium allows a number of potential threats from eavesdropping the transmissions
  • 5. 4. DESCRIPTION OF THE FUNCTIONS OF THE SECURITY SYSTEMS The four security services : 1. Anonymity: Make not easy to identify the user of the system 2. Authentication: The Operator will knows who is using the system for billing purposes 3. Signaling protection: protect sensitive information on the signaling channel, such as telephone numbers, is protected the radio path 4. User Data Protection: user data passing over the radio path is protected
  • 6. 4.1 Authentication process The mobile encrypts the challenge using the authentication algorithm (A3) and the key assigned to the mobile and sends a response back. The operator can check that, given the key of the mobile, the response to the challenge is correct. Eavesdropping the radio channel reveals no useful information, as the next time a new random challenge will be used. As mentioned before, eavesdropping refers to an intruder being able to interact with the communication channel so that information can be extracted from the channel, possibly without the knowledge of any of the communicating parties.
  • 7. 4.2 GSM Security Implementation • In theory, A3 implemented within a Smart Card. It is “Tamper proof” smart card containing the key. Furthermore, A5 is in the data path and must be fast (in the phone hardware). The difference between A5/1 and A5/2 are A5/1 is “strong” encryption and A5/2 for “export”-level encryption
  • 8. 5. Implementation clarify about the implementation and roaming of the GSM network • The authentication algorithm A3 is an operator option, and is implemented within the smart card (known as the Subscriber Interface Module or SIM). So that the operators may interwork without revealing the authentication algorithms and mobile keys (Ki) to each other, GSM allows triplets of challengers (R), responses (SRES) and communications keys (Kc) to be sent between operators over the connecting networks. The A series algorithms are contained within the mobile equipment, as they have to be sufficiently fast and therefore hardware. There are two defined algorithms used in GSM known as A5/1 and A5/2 These algorithms can all be built using a few thousand transistors, an usually takes small area of a chip within the mobile.
  • 9. 5.1 TECHNIQUES FOR PRIVACY AND AUTHENTICATION IN PERSONAL COMMUNICATION SYSTEMS The figure shows the user’s handset on the upper left and the service provider’s network in the upper right corner. The three part security model that connects this endpoint provides the logical steps necessary to accomplish this process. The first part of the general security model is provisioning. This is means by which the user’s handset acquires the bona fide that will enable the network to subsequently recognize him as a legitimate user. Part two of the model is the means by which a handset establishes credibility when the user registers with a local service provider such as Maxis and Celcom
  • 10. 5.2 P&A provisioning of secret key systems
  • 11. 6. SimulationSimulate the real security system of cellular communication is functioning by using Visual Basic application. By using this application first of all the box will display as =>>>>> The important of this message box is to make sure that we can use the server or not. There are two conditions. Connection available or registration fails. If registration is fail we cannot connect to the server and transmission will stop and vice versa. If connection is available, then the user can continue the transmission with dialing the number of the person that he wants to speak. As the result, the box will appear with the registration number and the dial number
  • 12. 7. LIMITATION OF GSM SECURITY Each system in this world has a limit. It happens in GSM security system or requirements, where there are a number of potential weaknesses : The security for GSM has to be Appropriate for the System Operator and Customer The Countermeasures : To protect against an intruder and to have a strong authentication The Security Process Prohibition : Mustn’t increase bandwidth, allow error rate. The Design of Operator’s GSM System : Run the procedures.
  • 13. 8. Conclusion • Security system is extremely important nowadays because most of the components that we use today are basically deal with electronics component e.g. cellular, computer, car, door, weapons, machines, and many others The reason why we had chosen GSM because more than one in ten of the world's population and over 179 countries including Malaysia are using this system. As we had explained, the General Packet Radio Service is a new bearer service for GSM that greatly improves and simplifies wireless access to packet data networks, e.g., to the Internet. Also, it applies a packet radio principle to transfer user data packets in an efficient way between mobile stations and external packet data networks. The GSM network in term of security had 4 important aspects: Anonymity, Authentication, Signaling protection and User Data Protection. The security system of GSM starting from the user’s handset to the service of GSM network was implemented. The whole security has started from Subscriber Interface Module or SIM and goes through the network. Also, GSM provides a basic range of security features to ensure adequate protection for both the operator and customer. Over the lifetime of a system threat and technology change, and so the security is periodically reviewed and changed. The technical security features must be properly supported by procedures to make sure complete security. The security provided by GSM is well in advance of similar mobile or cellular radio systems