By Topic

Solutions to security issues with legacy integration of GSM into UMTS

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Eric Southern ; Department of Electrical and Computer Engineering, Faculty of Engineering, University of Western Ontario, London, CANADA ; Abdelkader Ouda ; Abdallah Shami

Mobile networks are constantly changing and adapting to the needs of users and providers. The legacy global system for mobile communications (GSM) step in the evolution of mobile networks has by far the largest installed user-base. The very large user-base has made it a requirement for providers to modify their future systems to interoperate with the legacy GSM system. The security problems brought about by this legacy integration have a major impact on the security improvements developed for the universal mobile telecommunications systems (UMTS). This paper proposes simple and effective solutions to reduce the possible attacks on the UMTS systems due to the above integration. First we propose a subtle modification to the GSM security protocols as a standalone solution, and then a modification to the UMTS security protocols is proposed as a second solution.

Published in:

Internet Technology and Secured Transactions (ICITST), 2011 International Conference for

Date of Conference:

11-14 Dec. 2011