By Topic

Mobility and security management in the GSM system and some proposed future improvements

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Mehrotra, A. ; Hughes Network Syst. Inc., Germantown, MD, USA ; Golding, L.

Important aspects of mobility and security in the Global System for Mobile communications (GSM) system are discussed in this paper. Mobility management functions are broadly categorized into three groups: a) mobile turned on, b) mobile turned off, and c) mobile in conversation. The paper first outlines the mobile synchronization sequence followed by its mobility functions: mobile identification, authentication, international mobile station identity attach/detach, and its location update. The important role of security in the GSM system is fully explored, including authentication, encryption, and positive identification of mobile equipment before the user is provided with the service. The future of mobility management with respect to subscriber identification module roaming, intersystem roaming, advancement in mobile service, and its impact on data base requirements, is covered

Published in:

Proceedings of the IEEE  (Volume:86 ,  Issue: 7 )