Advertisement

GSM: Security, Services, and the SIM

  • Klaus Vedder
Chapter
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1528)

Abstract

Security requirements and services of a mobile communication system differ, due to the radio communication between the user and the base station, extensively from those of a fixed network. There is no physical link in the form of a (fixed) telephone line between the user and the local exchange, which could serve to “identify” the user for routing and charging purposes. Authentication by means of cryptographic procedures is thus required to stop impostors from taking on the identity of somebody else and “transferring” calls and charges. Eavesdropping on the radio path, intercepting data or tracing the whereabouts of a user by listening to signalling data are other serious threats. This paper discusses countermeasures designed into the Global System for Mobile communications, the rÔle of the Subscriber Identity Module as a security device and security aspects related to the management of the secret authentication keys.

Keywords

Mobile Station Smart Card Short Message Service Universal Mobile Telecommunication System Message Authentication Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    ANSI X3.92: 1981, Data Encryption Algorithm. American National Standards Institute.Google Scholar
  2. [2]
    C. Brookson, GSM Security: A Description of the Services, in F. Hillebrand (ed.): GSM, Digital Cellular Mobile Communications Seminar, Budapest, 1990, 4.5-1–4.5-5.Google Scholar
  3. [3]
    ETS 300 175-7, Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features, 1996 (2nd edition).Google Scholar
  4. [4]
    ETS 300 331, Digital European Cordless Telecommunications (DECT); DECT Authentication Module, 1995.Google Scholar
  5. [5]
    GSM 01.02 (ETR 099), Digital cellular telecommunications system (Phase 2); General description of a GSM Public Land Mobile Network (PLMN).Google Scholar
  6. [6]
    GSM 01.04 (ETR 100), Digital cellular telecommunications system (Phase 2); Abbreviations and acronyms.Google Scholar
  7. [7]
    GSM 02.09 (ETS 300 506), Digital cellular telecommunications system (Phase 2); Security aspects.Google Scholar
  8. [8]
    GSM 02.17 (ETS 300 509), Digital cellular telecommunications system (Phase 2); Subscriber Identity Modules (SIM), Functional characteristics.Google Scholar
  9. [9]
    GSM 03.20 (ETS 300 534), Digital cellular telecommunications system (Phase 2); Security related network functions.Google Scholar
  10. [10a]
    GSM 11.11 (ETS 300 608), Digital cellular telecommunications system (Phase 2); Specification of the Subscriber Identity Module-Mobile Equipment (SIMME) interface.Google Scholar
  11. [10b]
    GSM 11.11 (ETS 300 977), Digital cellular telecommunications system (Phase 2+); Specification of the Subscriber Identity Module-Mobile Equipment (SIMME) interface.Google Scholar
  12. [11]
    GSM 11.14, Digital cellular telecommunications system (Phase 2+); Specification of the SIM Application Toolkit for the Subscriber Identity Module-Mobile Equipment (SIM-ME) interface.Google Scholar
  13. [12]
    GSM 12.03 (ETS 300 614), Digital cellular telecommunications system (Phase 2); Security management.Google Scholar
  14. [13]
    ISO/IEC 7816, Identification cards-Integrated circuit(s) cards with contacts. Part 1: 1987, Physical characteristics. Part 2: 1988, Dimensions and location of the contacts. Part 3: 1989, Electronic signals and transmission protocols.Google Scholar
  15. [14]
    ISO/IEC 9797: 1994 (2nd edition), Information technology-Security techniques-Data integrity mechanism using a cryptographic check function employing a block cipher algorithm.Google Scholar
  16. [15]
    ISO/IEC 10116: 1997 (2nd edition), Information technology-Security techniques-Modes of operation for an n-bit block cipher algorithm.Google Scholar
  17. [16]
    M. Mouly and M.-B. Pautet, The GSM system for mobile communications, ISBN 2-9507190-0-7, Palaiseau, 1992.Google Scholar
  18. [17]
    K. Vedder and F. Weikmann, Smart Cards, this volume, pp. 311–336.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Klaus Vedder
    • 1
  1. 1.Giesecke & Devrient GmbHMünchenGermany

Personalised recommendations