Short Message Service (sms) security solution for mobile devices



Download 1,13 Mb.
Pdf ko'rish
bet16/51
Sana09.06.2022
Hajmi1,13 Mb.
#647072
1   ...   12   13   14   15   16   17   18   19   ...   51
Bog'liq
06Dec Ng Yu

5. Subscriber 
Identity 
Confidentiality 
The confidentiality of the subscriber identity (IMSI) is achieved through the 
use of the Temporary Mobile Subscriber Identity (TMSI). When the ME is first 
switched on in a new MSC/VLR area, the real identity (IMSI) is used and a TMSI 
is assigned by the network to the ME. Thereafter, the TMSI is used for all 
subsequent communications between the ME and the GSM network. Both the 
IMSI and TMSI are stored in the SIM. Figure 5 shows the TMSI allocation 
process.


 12
BSC
BTS
MSC
HLR
VLR
AuC
SIM
ME
TMSI Reallocation 
Confirmation
Decrypt 
Request
TMSI Reallocation Request
Encrypt 
Request
Decrypt 
Confirmation
Encrypt 
Confirmation
Figure 5. TMSI Reallocation 
After the authentication and encryption process is complete, the TMSI is 
sent to the MS. The MS responds by confirming reception of the TMSI. The TMSI 
is valid in the location area in which it was issued. To support roaming of 
subscribers to other networks, the Location Area Identification (LAI) is used in 
addition to the TMSI to determine the location and identity of the subscriber.
6. SIM 
Security 
Although the Subscriber Identity Module (SIM) physically resides with the 
Mobile Equipment (ME), it is regarded as an important part of the GSM 
infrastructure because it is the piece of hardware that represents the subscriber. 
As described in the previous sections, the SIM houses many of the security 
components for the GSM Network. All authentication operations take place within 
the SIM and none of the keys or ciphers leaves the SIM. The SIM may also be 
protected with a Personal Identification Number (PIN). SMS messages are also 
stored in the SIM. Generally, the SIM is considered a piece of tamper-proof 
hardware. Although hacks against smart cards are available, extraction of 


 13
information directly from the card is generally difficult and it requires physical 
access to the card and specialized equipment. It is easier to make a clone of the 
card by making use of information on the key generating algorithm. The following 
Section describes this vulnerability in greater detail. 

Download 1,13 Mb.

Do'stlaringiz bilan baham:
1   ...   12   13   14   15   16   17   18   19   ...   51




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish