Gsm network information and communications technology. In second and third generation wireless communication a. The first tier consists of the a3 algorithm that uses the challenge and response method for user authentication. Since we focus on the security on the radio access link, we assume the links between the serving network and home environment are adequately secure. Plmn public land mobile network oss operation subsystem. The global system for mobile communications gsm occupy almost 70% of the wireless market and is used by millions of subscribers in the world 1. Registration of a public user identity shall not affect the status of already registered public user identitys when multiple ues share the same public identitys, each ue shall be able to register its contact addresses with ims.
The coverage area of each cell varies according to the implementation environment. Research article evaluation of authentication and ciphering. Jul 18, 2017 in this video our four focus areas are. Gsm architecture, gsm network identities, network cases, cell planning, and compound charging prepared by. Gsm is a cellular network, which means that cell phones connect to it by searching for cells in the immediate vicinity. The gsm architecture is divided into radio subsystem, network and switching subsystem and the operation subsystem. The gsm network with the greatest worldwide number of users succumbs to several security vulnerabilities. A huge number of telco capabilities can be exposed to sps by a manageable way. Gsm the network switching subsystem nss the network switching system nss, the main part of which is the mobile switching center msc, performs the switching of calls between the mobile and other fixed or mobile network users, as well as the management of mobile services such as authentication. Gsm global system for mobile communications implemented in 90% of cell phones worldwide. Although gsm or 2g communication network is still the preferred network for many subscribers, especially in developing countries like india, owing to its availability and it being economic, yet different communication technologies like universal mobile telecommunications system umts and long. Year, month, day, hour, minute, second, timezone and dst. Whether as enablers of third party identity solutions, or providers of their own, operators possess a unique array of tools and capabilities which allow them.
Finally, information about weakness and attacks on gsm network are stated. Gsm the network switching subsystem nss the network switching system nss, the main part of which is the mobile switching center msc, performs the switching of calls between the mobile and other fi. The network delivers a tmsi temporary mobile subscriber identity. The equipment identity register eir using the imsi, the.
Establishing trust in the digital space remains a crucial challenge. We therefore consider the serving network and home environment as a single party, which we call \the network. Gsm the network switching subsystem nss tutorialspoint. Since the introduction of mobile cellular services by the obasanjo regime in 1993, the nigerian global system for mobile communication gsm market has witnessed accelerated growth abiodun, 2014. Scribd is the worlds largest social reading and publishing site. Although some of its security problems are addressed in its upper generations, there are. The international mobile subscriber identity is used to uniquely identifier a subscriber in a gsm gprs network. The purpose of oss is to offer the customer costeffective support for centralized, regional, and local operational and maintenance activities that are required for a gsm network. It is the interest of both, the customers and the service providers. Cellular network organization use multiple lowpower transmitters 100 w or less areas divided into cells oeach served by its own antenna oserved by base station consisting of transmitter, receiver, and control unit oband of frequencies allocated ocells set up such that antennas of all neighbors are equidistant hexagonal pattern.
Insert subscriber data ack the sgsn responds back to the hlr. A closer look reveals that a modern telecommunications system, like the global system for mobile communication gsm, is nothing more than a network of computers. Network id is designed to ensure the security of a network and related resources. Internet of things iot and its applications in electrical power industry. Due to the mobility of the subscribers, the organisational structure must be. Private user identity home network domain name ue ip address instance identifier.
Global system for mobile communications gsm is the most popular mobile phone system in the world, accounting for 70% of the worlds digital mobile phones. This gts defines the interface between the subscriber identity module sim and the mobile equipment me for use during the network operation phase of gsm as well as those aspects of the internal organization of the sim which are related to the network operation phase, within the digital cellular. Several btss together are con trolled by one base station controller bsc. Network identity network id is a portion of the tcpip address that is used to identify individuals or devices on a network such as a local area network or the internet. By standard the gsm network is divided into four 4 subsystems 1. A literature survey on gsm network identities international. Themereferstothephysicalphone itself, and it is uniquely identi. The main elements of a gsm network see figure 1, as described in wikipedia2012,are. As a network option, it shall be possible to send universal time ut by the network. The mobile station is generally the mobile phone which consists of a transceiver, display and a processor. Both ms and the gsm network has a copy of a key ki that was established upon the devices registration to the network. Cellular networks gsm security architecture and protocols counters umts aka and session protocols. Gsm provides terminal mobility, with personal mobility provided through the insertion of a subscriber identity module sim into the gsm net work mobile station. Gsm often described as a true intelligence network, gsm is called the first true wireless network because.
Concentrating on three mobile communication technologies, gsm, 3gwcdma, and ltewhile majorly focusing on radio access network ran technologythis book describes principles of mobile radio technologies that are used in mobile. Itismadeupofthemobileequipmentmeandof thesubscriberidentitymodulesim. The mobile industry has a leading role to play in digital identity, and the commercial opportunities for operators are considerable. Pdf appraisal of global system for mobile communication. Some of these identifiers are already existing in gsm networks to identify subscribers and or elements and their use will be kept up in gprs networks. Nitz the feature network identity and timezone as described in the present document. Gsm is a globally accepted standard for digital cellular communications. As the msisdn is the actual telephone number of the mobile subscriber, it is the only network identity that subscrib ers are aware of. The present document describes the feature network identity and timezone nitz. It is owned and deployed by mobile phone operators and allows mobile devices to communicate with each other and telephones in the wider public switched telephone network pstn. Gprs attach and pdp context activation for a class b terminal.
In the gsm network, the sim card identifies the user just like a traveller uses a passport to identify himself. L over 400 gsm network operators l over 550 million people were subscribers to gsm. Geographical structures in a mobile communication network gsm is a worldwide standard for mobile communication with an extensive coverage. A gsm network provides land based mobile communica tion. International mobile subscriber identity imsi, the secret key and. Each cell is given a cell global identity cgi, a number that uniquely identifies the cell. It contains encoded network identification details. The architecture of gsm the gsm network can be divided into three parts. There were four main elements to the overall gsm network architecture and these could often be further split. The gsm network is divided into three major systems.
Overview of the gsm system and protocol architecture. Some connection is attempted between the phone and the network. The network that i am going to build will provide a similar functionality as a 2g network. An important function of oss is to provide a network overview and support the. Global system for mobile communication technology mobile device investigations program technical operations division. Gsm the network switching subsystem nss the network switching system nss, the main part of which is the mobile switching center msc, performs the. It is a smart card that contains the international mobile subscriber identity imsi number. Gsm network areas in a gsm network, the following areas are defined. Gsm network free download as powerpoint presentation. Gsm global system for mobile communications is a 2g cellular network. According to a press release by the gsm association in may 2001.
International mobile subscriber identity to find the subscription settings in the hlr host location register. International mobile station equipment identity and software version number. A gsm operators service network and the subscribers identity ayd. Architecture of the gsm system gsm is a plmn public land mobile network several providers setup mobile networks following the gsm standard within each country gsm system comprises 3 subsystems rss radio subsystem. Forensic identification of gsm mobile phones cryptome. L equipment identity register eir contains a list of all valid mobile equipment on the. Depending on the application, a language has to be developed for such a communications network. Furthermore, it has been found that in practice national identity cards are rarely used. Local area identity or lai networks are divided into local areas with a unique number.
The gsm network architecture provided a simple and yet effective architecture to provide the services needed for a 2g cellular or mobile communications system. This marks the borderline between the gsm operators network and. Most of their users are connected to this network 24h a day but not many knows anything abut gsm security, how it works and how good it is. Oct 28, 2012 network identity network id is a portion of the tcpip address that is used to identify individuals or devices on a network such as a local area network or the internet. The hlrs database contains different types of information 1. A cell is formed by the radio area coverage of a base transceiver station bts. The typical architecture of gsm network was shown in figure 1. All potential messages used at the start of a connection contain an identity field. Even though the architecture of the openbts network is very different from the gsm. Most people blindly trust gsm security and send by the network not only theirs very. Roaming is the ability to use your gsm phone number in another gsm network. The radio sub system consists of the mobile station and base station subsystem.
Security in the global system for mobile communications gsm. White paper a gsm operators service network and the. Anonymity guarantees of the umtslte authentication and. This paper investigates the security measures used in gsm networks which include authentication, encryption, equipment identification and subscriber identity. However the change of network identity need not force immediate transfer of information to the ms.
This feature provides the means for serving plmns to transfer current identity, time and the local timezone to mobile stations mss, and for the mss to store and use this information. History of cellular mobile radio and gsmglobal systems for mobile. The main elements of a gsm network see figure 1, as described in. Global system for mobile gsm david tipper associate professor graduate program of telecommunications and networking university of pittsburgh telcom 2720 slides 8 based largely on material from jochen schiller, mobile communications 2nd edition telcom 2720 2 second generation cellular systems motivation for 2g digital cellular. It has an open, distributed architecture the separation of switching and service control functions full use of ss7 as the signaling infrastructure its clearly defined and specified interfaces the nature of its in structure.
Summarizes and surveys current lte technical specifications and implementation options for engineers and newly qualified support staff. Gsm architecture, gsm network identities, network cases, cell planning, and compound charging 1. The bts and bsc together form the base station subsystem bss. Gsm architecture, gsm network identities, network cases. This type of sim card mobility is analogous to terminal mobility, but provides a personalmobilitylike service within the gsm mobile network refer to chapter 11 for more details. Concentrating on three mobile communication technologies, gsm, 3gwcdma, and ltewhile majorly focusing on radio access network ran technologythis book describes principles of mobile radio technologies that are used in mobile phones and service. International mobile station equipment identity imei. There are five different cell sizes in a gsm networkmacro, micro, pico, femto, and umbrella cells. Mobile network code mnc consisting of two digits for gsm applications.
Gsm security architecture home location register hlr keeps track of the mobiles location visitor location register vlr keeps track of roaming mobiles at each network shared key ki between sim and authentication center hrlauc at the home network vlr of the visited network obtains authentication. These two technologies differ in the way calls and data travel over the mobile phone networks. An ms has a number of identities including the international mobile. Authentication and secure communication in gsm, gprs, and. It allows users to send and receive calls and receive other subscriber services. The reflection of a culture in its language also applies to the area of com puters. Difference between gsm and cdma the worlds renowned mobile phone network technologies are gsm global system for mobile communication and cdma code division multiple access.
346 1215 625 777 176 100 744 262 1510 486 1092 393 180 1036 165 726 295 963 565 1025 1456 507 1341 103 993 521 938 1448 753 718 1077 1132 789 1494 841 512 1027 1369 345 233 1204 747 1496 178