written 8.4 years ago by | • modified 8.4 years ago |
Mumbai University > Computer Engineering > Sem6 > Mobile Communication and Computing
Marks: 10M
Year: May 2015
written 8.4 years ago by | • modified 8.4 years ago |
Mumbai University > Computer Engineering > Sem6 > Mobile Communication and Computing
Marks: 10M
Year: May 2015
written 8.4 years ago by | • modified 8.4 years ago |
The data being transmitted via GSM is in digital form and hence is much easier to carry out digital transformation, data encryption, scrambling and other known methods of protection against unauthorized access to transmitted information. i.e. Privacy
We system needs to verify before connecting two terminals if the connection has been tapped or compromised and that the authorized user is at both the ends of connection i.e. Authentication.
Various security measures are implemented in GSM transmission like:
Provide access to the network only after user authenticity’s verification.
Encrypt the transmitted data.
Usage of temporary mobile user identity number (e.g. TMSI)
Three algorithms have been specified for security services in GSM networks.
Subscriber Identity Module (SIM):
NVM is used for storing individual user’s parameters and data. The various parameter’s and data in NVM are :
Authentication Process:
Encryption Process: