By Topic

End-to-end security for GSM users [speech coding method]

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
A. B. Rekha ; Central Res. Lab., Bharat Electron., Bangalore, India ; B. Urnadevi ; Y. Solanke ; S. R. Kolli

Mobile telecommunications such as GSM are now well established globally and users rely heavily on the convenient communications it provides. The level of security provided by GSM is superior to its predecessors and is more than adequate for the majority of users. However, some users in the areas of government, defence or business require additional security over and above that provided by the GSM standards and by standard GSM equipment. In a GSM network, only the radio channels between the mobile station (MS) and the base transceiver station (BTS) are encrypted. This paper presents the feasible methodology for implementation of end-to-end security over the available GSM infrastructure.

Published in:

2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005.

Date of Conference:

23-25 Jan. 2005