Wednesday, January 4, 2012

GSM Security Features, Threats & Solutions




GSM Features:
·         Calls forwarding
·         Encrypted conservations
·         Ensuring rapid call set-up
·         Short Message Service (SMS) Ability
·         Multi calling to few different parties
·         Closed User Group
·         Dynamic connections
·         Place a call on Hold
·         Allows data and fax transmission and reception across GSM networks
·         Calls notification
·         Barring of incoming and outgoing calls
·         CLIP Allows you to see the telephone number of the incoming caller on the LCD screen of the handset
·         CLIR allows you to bar anyone from seeing your number via CLIP

GSM Threats:

·         Man-in-the-middle attack
·         Flaws in implementation of A3/A8 algorithms
·         SIM card cloning
·         Over-the-air cracking
·         Flaws in cryptographic algorithms
·         Short range of protection
·         Lack of user visibility
·         Leaking the user anonymity
·         Vulnerability to the DoS attack
·         Absence of integrity protection
·         Vulnerability to replay attacks
·         Increased redundancy due to the coding preference

GSM Solutions:

·         Using secure algorithms for A3/A8 implementations
·         Using secure ciphering algorithms
·         Securing the backbone traffic
·         End-to-end Security

10 Comments:

At January 5, 2012 at 6:41 AM , Blogger Fan Zhuo Ran said...

I notice that one of the GSM threat is the flaws in implementation of A3/A8 algorithms. However you also mentioned that one way to solve the security threat is to use secure algorithms for A3/A8 implementation.

I don't actually understand this part, I feel this is contradicting. Could you please explain?

 
At January 5, 2012 at 7:00 AM , Blogger Abdul Riyas said...

Good to see lots of pointers regarding the GSM features, threats and solutions. it would have been better if you had explained a few pointers in detail as its too straight forward and i do not understand 'Man-in-the-middle attack' threat. i would also suggest you to come up with more solutions as there seems to be too many threats.

 
At January 5, 2012 at 8:15 AM , Blogger Jolene Lee said...

A rather concise post regarding GSM.
Perhaps you can add in the description for how the solutions so that we can have a clearer picture as to how it solves the threats.

 
At January 5, 2012 at 8:19 AM , Blogger Nur Atiqah said...

HELLO!
For the GSM Security Features, you only stated the features of GSM. But what about the security features? And I think there is too many GSM threats than the solutions. But it is good that you had at least put an image here. You could have elaborate on some points as some of the points are not as straight forward as the others. Such as Over-the-air-cracking. Some of us would not know what it means, so it is better if you explain a little bit what that really means.
:)
Nur Atiqah
1001232F

 
At January 5, 2012 at 8:22 AM , Blogger Loh Jia Jun said...

hello boon,
i feel that your blog requires a lot of improvement as it does not clearly illustrates the solution as well as the threats. You could also add in pictures to describe how the solution were to actually help counter the threat that exist.
Other than the top few i feel that your post is rather helpful in providing details of most of the threats that are out there. You can also add in video to make the blog nicer and viewers are able to gain more knowledge as you have from the video you posted

Loh Jia Jun, 1002904I

 
At January 5, 2012 at 8:59 AM , Blogger Jeremy_Lim said...

For your GSM threats, I realized that in your GSM Solutions, you mentioned securing backbone traffic, do you mean securing the network traffic? If it is, perhaps it is not really a best solution. From my research, because he GSM rely on the IP technology to go Internet, the IP security can also result in not being set or used, causing data from MS to the public data network to be easily taken without any protection.

Jeremy Lim, 1005983J

 
At January 5, 2012 at 10:01 AM , Blogger chun jin said...

Hello, I think your post got too much point form, maybe you can explain one or two of the points in paragraph for better understanding. And maybe more solutions to counter the threats, as you had list quite a number of them. Other than that, I feel that your blog is quite neat and understandable.

 
At January 5, 2012 at 11:56 AM , Blogger Sam Ong said...

Hello Boon teck, maybe before you go directly into all the features, threats and solutions, you can have short introduction on what is GSM in general. I like the way that your post is written in point form, its easy to scan through all the information. And for the features, Some of them commented on my blog saying that it should be security features of GSM.

 
At January 5, 2012 at 9:37 PM , Blogger yibing said...

Hi Boon Teck, i like your blog as it is easy to read. You have done good research and mention some of the common threats like Man-in-the-middle attack, Flaws in implementation of A3/A8 algorithms etc etc.. Keep up the good work!

 
At January 5, 2012 at 11:35 PM , Blogger Ding Ruo Han said...

Hi Boon Teck!
for your solution of GSM, I will add something on yours.
Solution:
Fast and Quality Network Adjustment: Full reuse of legacy infrastructures and associated facilities help operators to reduce CAPEX and civil works. Automatic professional network planning & optimization and network adjustment tools shorten network construction dramatically.

 

Post a Comment

Subscribe to Post Comments [Atom]

<< Home