KEYWORDS: Global system for mobile communications, Standards development, Networks, Cell phones, Network security, Receivers, Algorithm development, Mobile communications, Telecommunications
The rapid development of the telecommunication standards, which are getting close to the implementation of the 5th generation now (5G) leads to us to neglect the GSM standard, where there are still vulnerabilities that can be exploited by attackers. The purpose of this paper is to demonstrate step by step the authentication in GSM, of mobile subscribers, technical parameters and vulnerabilities identified in this process, with practical measurements. In Romania, GSM is used by the Operators as a backup network, or to cover with signal long areas (in the mountains) where there is no specific (high data rate transfer) demands from the users. Based on the results obtained a number of interesting conclusions are drawn.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.