We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Check Writers' Offers

What's Your Topic?

Hire a Professional Writer Now

The input space is limited by 250 symbols

What's Your Deadline?

Choose 3 Hours or More.
Back
2/4 steps

How Many Pages?

Back
3/4 steps

Sign Up and Get Writers' Offers

"You must agree to out terms of services and privacy policy"
Back
Get Offer

Authentication In Gsm Network Computer Science Essay

Paper type: Essay
Pages: 6 (1337 words)
Categories: Computer, Essay, Network, Science
Downloads: 30
Views: 2

The Global System for Mobile Communication ( GSM ) is the largest bing 2nd coevals web. Basically, 2nd coevals web is based on digital nomadic wireless signal architecture which provide services and protocol by agencies of digital wireless signals in contrast to first coevals systems where based on parallel signals used in the system.

For the intent of this paper, the GSM webs are treated in footings of security issues and exclusively hallmark of users. Since fundamentally radio webs are by nature more susceptible to be eavesdropped and to be deceitful in usage and can be entree by anyone, hallmark of users became a really of import challenge in nomadic webs security.

Hence, the relevant constituents involved in the hallmark procedure of GSM webs are illustrated ( figure 1 ) . Then some developments which have been done to better this procedure are discussed.

Figure 1: GSM Network Architecture [ 1 ]

Basically, the GSM web comprises some functional subsystems, viz. the Radio Subsystem ( RSS ) , the Network and Switching Subsystem ( NSS ) and the Operation Subsystem ( OSS ) .

The RSS is responsible for all the wireless maps and facets of the web such as: the nomadic station ( MS ) consisting of the nomadic device a user uses to do calls and other services and, the endorser individuality faculty ( SIM ) which contains individuality of GSM subscriber and hallmark specific informations for designation to the web via IMSI and cardinal coevals intents. Here, the security mechanism implemented for the SIM and considered for hallmark intents is fundamentally based on challenge and response mechanism. [ 1 ] Besides Base Station Subsystem comprises BTS which deals with communicating operations with the nomadic station ( MS ) and furthermore, BSC takes attention of the shift between bing BTSs and wireless channels by supplying indispensable control maps and physical connexions between Network Subsystem ( NSS ) supplied by nomadic exchanging centre and BTS. [ 1 ]

The NSS comprises of Mobile Switching Center ( MSC ) and Home Location Registrar ( HLR ) which provide exchanging services among GSM and external webs. The NSS contains all informations related to nomadic endorsers including endorser ‘s individualities which are besides stored in SIM card and service specific informations and location information, and besides the Visitor Location Registrar ( VLR ) which is distributed in the web harmonizing to geographical locations enhances managing nomadic endorsers linking countries outside their local web. [ 1 ]

Authentication process

Upon depicting involved constituents of GSM webs in hallmark procedure, the whole hallmark scenario is describes and illustrated here as shown in figure 2.

Figure 2: Authentication in GSM Networks [ 1 ]

As mentioned before hallmark is GSM web is fundamentally in challenge-response footing. As it is show in figure 2, Me as the nomadic endorser has a SIM card incorporating information about the endorser and besides necessary keys for hallmark intents. Basically, when a endorser is added to a place web, an assigned secret and alone 128-bit key ( Ki ) would be stored to the SIM card of the endorser. Correspondingly, this secret key ( Ki ) would be assigned to the IMSI for confirmation of the endorser individuality and besides, would be stored in AuC in the HLR at the web side of the nomadic operator but, it ne’er transmitted from AuC or SIM card. In other words, harmonizing to challenge-response hallmark, it is required to turn out the secret key stored in SIM card of MS is the same key stored in AuC. [ 2 ]

The nomadic station ( MS ) initiates the process by subscribing into the web or in other words, issues a sign-on petition entree to the web in which the nomadic device sends it out as an hallmark petition to BTS. Then the BTS sends out the IMSI petition to the MSC, which in bend forwards this information to the HLR in the place web to make up one’s mind to allow or deny the entree requested by ME-SIM to the place web. [ 3, p.132 ] In order to do this determination, after that AuC associated with the HLR received the IMSI, a 128-bit random figure ( RAND ) would be generated utilizing the IMSI and the stored secret key ( Ki ) in AuC. [ 1 ] The procedure of authenticating a endorser ( Fig.3 ) is fundamentally based on the A3 algorithm and the A8 algorithm for cardinal coevals contained in SIM and AuC and is performed at the web side every bit good as at the subscriber side. [ 2 ]

Figure 3: Principle of subscriber hallmark [ 2 ]

The Mobile Services Switching Center ( MSC ) asks the Home Location Register ( HLR ) to supply it with five sets of security threes. The security threes consist of three Numberss: RAND ( 128-bit random figure ) , SRES ( a 32-bit signed response to the RAND generated utilizing the pre-shared secret key Ki ) and a session key Kc generated utilizing Ki. Besides, the threes are generated and stored in the VLR for each endorser. So, the HLR supplies these threes to MSC by utilizing the Ki from AuC as an hallmark response. [ 3, p.133 ] [ 1, p.26 ] Then, the MSC via the BSC and the BTS forwards the RAND figure of the generated threes as a challenge to the nomadic station to do it bring forth the same response generated by AuC. The ME-SIM is now supposed to bring forth a RES as a response to this RAND figure utilizing the A3 algorithm and Ki stored in SIM and direct it back to MSC utilizing BTS. [ 3, p.133 ] Next, the MSC/VLR compares the RES received from ME-SIM and the SRES from the three it received from the HLR. If both responses lucifer, the MSC can safely infer that the ME has the SIM incorporating a valid Ki and the hallmark process is successful and MSC allow the ME entree to the web otherwise, the MSC would deny the ME entree petition to the web.

Discussion and Decision

Obviously, the described procedure authenticates the GSM Mobile Station ( MS ) to the GSM web. So, one of the security restrictions of GSM a web is that the GSM web is ne’er authenticated by the GSM Mobile Station ( MS ) . This one-way hallmark may do it possible for an aggressor to feign to be a GSM web supplier. Hence, there has been offered some proposed protocols to better the former 1s and cut down the security restrictions to heighten the whole procedure every bit much as possible. Therefore, beside some other improved strong hallmark protocols, there have been done some attempts to accomplish common hallmark between MS and VLR alternatively of the HLR, even if the VLR does non cognize the endorser ‘s secret key Ki and A3 algorithm to exclude the mentioned security drawbacks. [ 2 ] Besides, another security drawback in mentioned process could be that, GSM web authenticates the SIM card and non the endorser of the SIM card. Since, the hallmark procedure relies on pre-shared secret key between SIM and AuC, so if a ME is stolen it could be used for doing calls and utilizing other GSM services. Hence, there are still assorted drawbacks which are targeted for some countermeasures to protect against.

[ 1 ] – Asma Alazeib, An Ontology for Generic Wireless Authentication, Stuttgart, 07.October.2005

[ 2 ] Young Jae Choi and Soon Ja Kim, An Improvement on Privacy and Authentication in GSM, School of Electrical Engineering and Computer Science, Kyungpook National University, 1370 Sangyuk-dong Buk-gu Daegu, Republic of Korea

[ 3 ] Praphul Chandra, Bulletproof wireless security: GSM, UMTS, 802.11 and ad hoc security

[ 4 ] -zer Aydemir, A Strong User Authentication Protocol for GSM, T & A ; Uuml ; B & A ; oslash ; TAK UEKAE & A ; oslash ; LTAREN Research Center

06100 Ankara TURKEY, Ali AydA±n Sel & A ; ccedil ; uk Dept. of Computer Engineering, Bilkent University 06800 Bilkent Ankara TURKEY

Cite this essay

Authentication In Gsm Network Computer Science Essay. (2020, Jun 01). Retrieved from https://studymoose.com/authentication-in-gsm-network-computer-science-new-essay

How to Avoid Plagiarism
  • Use multiple resourses when assembling your essay
  • Use Plagiarism Checker to double check your essay
  • Get help from professional writers when not sure you can do it yourself
  • Do not copy and paste free to download essays
Get plagiarism free essay

Not Finding What You Need?

Search for essay samples now

image

Your Answer is very helpful for Us
Thank you a lot!