By Topic

Security between base stations in cellular communication system

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Nusrat Sharmin ; Dept. of Comput. Sci. & Eng., Int. Islamic Univ. Chittagong, Chittagong, Bangladesh ; Farhana Haider

Cellular communication is the most important technology in modern digital communication system. Cellular wireless networks are more vulnerable to unauthorized access and eavesdropping. The traditional security algorithms ensure the security of voice signals between the mobile station and base station and authentication of users while the transmission of the voice signals in between base stations are not protected. That means the traffic is transmitted in plain text in the core network. This paper focuses on the security techniques between the base stations in cellular communication system. The paper consists of some successive steps to ensure security against the vulnerabilities of the current GSM architecture by measures taken for base stations using private and public key cryptography. Finally, a comparative analysis is given considering factors like cost, efficiency and performance in comparison with the existing security techniques.

Published in:

Informatics, Electronics & Vision (ICIEV), 2012 International Conference on

Date of Conference:

18-19 May 2012