Open Access Open Access  Restricted Access Subscription Access

A Security Analysis of GSM Security Using ECC Technique


Affiliations
1 Department of Computer Science and Information Technology, Radha Govind Engineering College, Anuyogipuram, Meerut - 250 004, India
 

GSM (Group Special Mobile or System for Mobile Communications) is the PAN-EUROPEAN standard for digital cellular communication. GSM provides enhanced features when compared with the older analog-based wireless systems. A GSM network is more vulnerable to unauthorized access and eavesdropping when compared with the traditional fixed wired networks due to the mobility of users, the transmission of signals through open-air and the requirement of low power consumption by a mobile user. This paper focuses on the security techniques used within the GSM standard as well as current GSM security system vulnerabilities. In this paper, we proposed two new security protocols for GSM using Elliptic Curve Public Key Cryptography (ECC) technique and a security analysis of the proposed protocol.

Keywords

GSM Security, Wireless Security, Elliptic Curve Cryptology.
User
Notifications
Font Size

Abstract Views: 240

PDF Views: 2




  • A Security Analysis of GSM Security Using ECC Technique

Abstract Views: 240  |  PDF Views: 2

Authors

Tarun Kumar
Department of Computer Science and Information Technology, Radha Govind Engineering College, Anuyogipuram, Meerut - 250 004, India

Abstract


GSM (Group Special Mobile or System for Mobile Communications) is the PAN-EUROPEAN standard for digital cellular communication. GSM provides enhanced features when compared with the older analog-based wireless systems. A GSM network is more vulnerable to unauthorized access and eavesdropping when compared with the traditional fixed wired networks due to the mobility of users, the transmission of signals through open-air and the requirement of low power consumption by a mobile user. This paper focuses on the security techniques used within the GSM standard as well as current GSM security system vulnerabilities. In this paper, we proposed two new security protocols for GSM using Elliptic Curve Public Key Cryptography (ECC) technique and a security analysis of the proposed protocol.

Keywords


GSM Security, Wireless Security, Elliptic Curve Cryptology.