Vulnerabilities in Existing GSM Technology that causes Exploitation

Abstract

Global System for Mobile communications (GSM system) has become the most popular standard for digital cellular communication for day to day communication in the world. Cellular phones have become a ubiquitous means of communications with over 6 billion users worldwide in 2013, of which 80% are GSM subscribers. It has been over 20 years since GSM was designed, and during this time several security problems have been found. However practical exploits of these weaknesses are complicated because of all the signal processing involved and have not been seen much outside of their use by law enforcement agencies.

Authors and Affiliations

Madhav M. Ajwalia , Prof. (Dr. ) Nilesh K. Modi

Keywords

Related Articles

EFS: Enhanced FACES Protocol for Secure Routing In MANET

Mobile Ad-hoc Network (MANET) is an autonomous system of mobile hosts equipped with wireless communication devices. These mobile nodes can form a network anywhere and at anytime. But the topology of the network thereby f...

Web Banking: A Security Management and Communications Approach

The paper provides a survey research report on the information security and communication management disciplines within the scope of Web Banking. The benefits and uses of information and communication approaches were exa...

Trust Worthy Framework for Wireless Sensor Networks

A Wireless Sensor Network (WSN) consists of spatially scattered self-directed sensors to agreeably monitor physical or ecological conditions, such as temperature, sound, vibration, pressure, motion or pollutants. Trust i...

IMPLEMENTATION OF IMAGE PROCESSING ALGORITHMS ON THE PARALLEL PLATFORM USING MATLAB

Application with sequential algorithm can no longer rely on technology scaling to improve performance. Image processing applications exhibits high degree of parallelism and are excellent source for multicore platform. Ma...

Cephalometric analysis for finding facial growth abnormalities

Cephalometric analysis of lateral radiographs of the head is an important diagnosis tool in orthodontics. Based on physically locating specific landmarks, it is a boring, lengthy and error prone task. The objective of th...

Download PDF file
  • EP ID EP161768
  • DOI -
  • Views 86
  • Downloads 0

How To Cite

Madhav M. Ajwalia, Prof. (Dr. ) Nilesh K. Modi (2013). Vulnerabilities in Existing GSM Technology that causes Exploitation. International Journal of Computer Science & Engineering Technology, 4(5), 513-518. https://europub.co.uk/articles/-A-161768