Authors:
Rehab K. El Nemr
1
;
Imane Aly Saroit Ismail
2
and
S. H. Ahmed
2
Affiliations:
1
Faculty of Media Engineering, German University in Cairo, Egypt
;
2
Faculty of Computers and information, Cairo University, Egypt
Keyword(s):
GSM, Authentication, Ciphering, A3/5/8, RSA, Public key and Digital Certificate.
Related
Ontology
Subjects/Areas/Topics:
Data and Systems Security
;
Information and Systems Security
;
Methodologies and Technologies
;
Mobile System Security
;
Network Security
;
Operational Research
;
Security
Abstract:
Security is a burning issue with intelligent security pausing as the most relevant as it is important in all types of applications which suffer from security related concerns. Accordingly, Security has become a need rather than a luxury. GSM Security flaws have been identified several years ago. Some of these flaws have been mended by the 3GPP but others are left to discussion. In this paper we will integrate a well known technique in the system;
Public-key technique. Yet, we will introduce the solutions in a different point of view; they are Action-Triggered, meaning; it will work only if the flaw occurs. The original system will work in normal cases. We will also discuss
End-to-End security and propose a mechanism of Key management to provide the subscribers with private calls’ option. Phone-Dependent technique is conducted to consider Service provider attacks.