What is GSM?
Global System for Mobile Communications or widely known as GSM, is a digital mobile telephony system. GSM alters and compresses data. It will then be sent down to a channel with two other streams of user data, each in its own time slot. It operates at either the 900Mhz or 1800Mhz frequency band.
Security Features:
- Authentication - The user is identified by the network operator. This information along with the user's authentication key, includes sensitive identification credentials. The design of the GSM authentication and encryption schemes is such that, this sensitive information would never be transmitted over the radio channel. The network operator uses a challenge-response mechanism to confirm the user is not a fake.
- Signaling and Data Confidentiality - This protects voice, data and sensitive signaling information against eavsdropping on the radio path.
- Anonymity - This protects against someone tracking the location of the user. It also protects against someone identifying calls made to or from the user by eavesdropping on the radio path.
However, there are some problems with GSM security. Some examples are that, it only provides access security. This means that communications and signaling traffic in the fixed networks are not protected. Another example of the problem with GSM security is that is has a lack of user visibility. This means that for example, the user would not know if the authentication is encrypted or not.
GSM Threats:
- Eavesdropping
- Impersonation of a User
- Impersonation of the Network
- Man-In-The-Middle (MITM)
- Network Authentication Compromise
GSM Solutions:
- Securing the backbone traffic - Encrypting the traffic between the networks can prevent the attacker to eavesdrop or modify the transmitted data.
- Using secure algorithms - The network operators could perform improvement on themselves, without any need for the hardware and software manufacturers.
- Change to a more secured platform.
References:
Hi Atiqah,
ReplyDeleteGlad to see most of the important points of the GSM system stated clearly in this post. I find this post very understandable. Are there anymore solutions to the possible threats in the GSM system? (Even I have difficulties looking out for more solutions haha) Can you elaborate more on the last point of the solution section? Like how can it be changed to a different and more secured platform?
Very informative by the way!
Kasper K
1000457J