CFP last date
20 May 2024
Reseach Article

Security Enhancement in GSM using A3 algorithm

by Arpita Gupta, Prateek Singh Chandel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 108 - Number 1
Year of Publication: 2014
Authors: Arpita Gupta, Prateek Singh Chandel
10.5120/18875-0138

Arpita Gupta, Prateek Singh Chandel . Security Enhancement in GSM using A3 algorithm. International Journal of Computer Applications. 108, 1 ( December 2014), 18-20. DOI=10.5120/18875-0138

@article{ 10.5120/18875-0138,
author = { Arpita Gupta, Prateek Singh Chandel },
title = { Security Enhancement in GSM using A3 algorithm },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 108 },
number = { 1 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 18-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume108/number1/18875-0138/ },
doi = { 10.5120/18875-0138 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:41:51.743664+05:30
%A Arpita Gupta
%A Prateek Singh Chandel
%T Security Enhancement in GSM using A3 algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 108
%N 1
%P 18-20
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The GSM (Global System for Mobile Communications) is widely used cellular standard in the world. Recently, the mobile industry has experienced an extreme increase in the number of its users. Thus the GSM network with the greatest worldwide number of users succumbs to several security vulnerabilities. Security is a burning and intelligent issue. GSM security flaws have been identified several years ago. Many algorithms are used for making the GSM secure. The algorithms mainly used are A3, A5 and A8 algorithms. Algorithm A3 is used for authentication, A5 is used for encryption, and A8 is used for the generation of a cipher key. This paper presents an enhanced scheme of A3 algorithm to improve the level of security provided by the GSM. Proposed scheme is implemented at some level and analyzed thoroughly to show that the proposed scheme provides better security in the GSM. The above said algorithm is implemented using C#. NET in Microsoft Visual Studio 2012 with the help of socket programming. In this paper, encryption is introduced in the Authentication phase during the A3 algorithm of the GSM security.

References
  1. Musheer Ahmad and Izharuddin, Security Enhancements in GSM Cellular Standard, 978-1-4244-3328-5/08/$25. 00 ©2008 IEEE.
  2. Asoke K. Talukder and Rupa R. Yavagal, Mobile Computing – Technology, Applications and Service Creation, 137-165.
  3. Jochen Schiller, Mobile Communications Second Edition, 96-122.
  4. Yong Ll, Yin Chen, Tie-Jun Ma, Security in GSM.
  5. Prof. Noureddine Boudriga, Security of Mobile Communications, 2007 IEEE International Conference on Signaling Processing and Communications (ICSPC 2007), 24-27 November, Dubai, United Arab Emirates.
  6. A. Jaganath Swamy and D. Dinesh Reddy, WAP Collaboration and Security Issues in Mobile Communication, 0-9785699-1-1/07/$25. 00 ©2007 IEEE.
  7. Billy Brumley, Special Course on Cryptology, A3/A8 & COMP128.
  8. M Walker, Security Issues in Future Mobile Communications, © Vodafone Printed and published by the lEE, Michael Faraday House, Six Hills Way, Stevenage. Herts SG12AY, UK.
  9. Bo Sun, Xing Jin, Yang Xiao, Ruhai Wang, Enhancing Security using Mobility Profile for Cellular Mobile Networks, 1-4244-0357-X/06/$20. 00 © 2006 IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

GSM Security A3 algorithm SRES VLR HLR