Global System for Mobile Communications (GSM) security features include authentication, confidentiality and anonymity. Authentication means that the network operator can validate the identity of the subscriber and find out who is the person that is using the system for purposes like billing. The network authenticates the SIM to prevent against duplicate. Confidentiality prevents eavesdropping and loss of information on the radio path while protecting data, voice and signaling information that are sensitive such as dialed digits. Anonymity helps to identify the calls made to or from the user by wiretapping on the radio path or protects the users from being tracked down.
Some of the GSM threats include the system operator hopes to issue the bills to the correct person and the services cannot be compromised. In addition the customer needs some privacy in prevention of traffic being overheard. Hence, the solutions are to make the radio path secure which denotes confidentiality and anonymity to prevent information from being leaked out. In order to prevent the operator against billing fraud, it needs to have strong authentication. Man-in-the-middle is potential whereby the intruder sits itself in the middle of both the target user and a real network which has the capability of eavesdropping, delete, re-order, modify, replay and spoof signaling and between the two parties there is a user data messages exchange. The equipment that is required is to modify the BTS in conjunction with a modified MS.
References
www.cs.huji.ac.il/~sans/students_lectures/GSM%20Security.ppt
www.jazi.staff.ugm.ac.id/IC3-Royal%20Holloway/IC30304pt7.ppt
www.blackhat.com/presentations/bh-asia-01/gadiax.ppt
http://www.ee.iastate.edu/~russell/cpre537xf00/Projects/weizhang.pdf
http://www.brookson.com/gsm/gsmdoc.htm
http://t2.gstatic.com/imagesq=tbn:ANd9GcTekc5WSp1P8vZ1Cj2YwjP2Ve6pevTphBiLHdDUusSAVinZyYuB
Hello Bee Ying! After reading your post on the GSM security features, threats and solutions, your content is rather accurate.
ReplyDeleteAlthough your content is accurate, I feel that it can be further improved adding more research on the GSM network!
Hi Bee Ying. Your post is good as i'm able to understand what you are trying to explain on GSM. Moreover you added an image to explain GSM architecture which is easier for other readers to understand how GSM works.
ReplyDeleteYou have displayed good understanding of GSM in this entry and it is not too wordy where the readers would not be bored after reading the first paragraph and would consider continuing it. However perhaps you could talk more about the solutions for GSM threats!
Overall I find this entry beneficial and job well done!
hi bee ying,your post was good as it contain a lot of useful information that is exactly what the readers are searching for,this definitely benefits them a lot.Your elaboration and explanation of the main points was also good due to the fact that you had even put in effort by placing an image.You have greatly displayed good understanding of GSM security,threats,solutions and features of this network.However you did not wrote much about the solutions,hence there is room for improvements ongoing for you.
ReplyDeleteHello Bee Ying! The GSM security post is very detailed! It is easy to understand and the security features, threats and solutions are all listed. However, not much was written on the threats as you have only listed only one threat. It will be better to list down more threats to update the readers on more attacks and be more aware of them. For the GPRS aspect, a lot were written for pertaining to the security threats but not much were written for the features and solutions. It will be better to include the security features as they are part of the topic. Also, by adding the features and linking them to the threats and solutions of the GPRS security context, it will give readers a clearer picture on how the whole security thing falls together and how they work. In general, good work! :D
ReplyDeleteHi Bee Ying. Nice article on GSM Security. Has pictures and well-written due to the simple English used in the article. It allow readers to understand and have a better view on GSM Security. It's a nice piece of work! Keep it up! (:
ReplyDeleteJoanne
hi bee, nicely done research. i think you can security feature and do some spacing after each point.
ReplyDeleteHi Bee Ying,
ReplyDeleteHave read through your post, found out that you never talk abit of what is GSM at the start and you straight away jump to telling your reader what are the security feature, threats and solution. You should first talk about what GSM is give a brief idea of what is it like this reader will understand better when your talk about the rest of the stuffs.
But still your information on the rest of the topic was great, you clearly explain to your reader what reach is talking about.
you have detailed infomation in your post that inludes features, threats and solutions. You should separate your contents on security threats from solutions so that the readers will have a better understanding.
ReplyDelete