Vulnerabilities in Existing GSM Technology that causes Exploitation
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 5
Abstract
Global System for Mobile communications (GSM system) has become the most popular standard for digital cellular communication for day to day communication in the world. Cellular phones have become a ubiquitous means of communications with over 6 billion users worldwide in 2013, of which 80% are GSM subscribers. It has been over 20 years since GSM was designed, and during this time several security problems have been found. However practical exploits of these weaknesses are complicated because of all the signal processing involved and have not been seen much outside of their use by law enforcement agencies.
Authors and Affiliations
Madhav M. Ajwalia , Prof. (Dr. ) Nilesh K. Modi
Survey on Data Sharing In the Cloud Using Distributed Accountability
In cloud computing, resources are share among multiple clients and it is important for cloud service provider to allocate these resources for such clients. Cloud computing is an infrastructure that provides on demand net...
COMPREHENSIVE STUDY AND COMPARISON OF INFORMATION DISPERSAL TECHNIQUES FOR CLOUD COMPUTING
Cloud systems refer to the collection of interconnected servers that are provisioned dynamically on demand, for execution of applications, to the customer like electricity grid. Cloud computing has gained great attention...
Comparative Study of Reactive/On Demand Routing Protocols for Mobile Adhoc Network
In an ad hoc network, mobile nodes communicate with each other using multi-hop wireless links. There is no stationary infrastructure such as base stations. The routing protocol must be able to keep up with the high degre...
Empirically Investigating the Effect Of Design Metrics On Fault Proneness in Object Oriented Systems
In the era of software metrics demand for quality software has undergone with rapid growth during the last few years. This is leading to an increase in the development of metrics for measuring the properties of software...
Review on Coverage and Connectivity in Underwater Wireless Sensor Networks
One of the current trends of the wireless communication is the underwater communication .The two most fundamental problems in underwater sensor network are sensing coverage and network connectivity. The coverage problem...