SYSTEMATIZATION OF SECURITY OF MOBILE NETWORKS

Authors

  • Fozilov Firdavs Dilshod o’gli Student of Tashkent University of Information Technologies named after Muhammad Khwarizmi
  • Beknazarova Saida Safibullayevna Doctor of Technical Sciences, prof. Tashkent University of Information Technologies named after Muhammad Khwarizmi

Keywords:

GSM security, (SDR), fictitious radio stations controlled by an attacker,, fraudulent base stations

Abstract

Although the cryptographic algorithm is the most noticeable weakness of second-generation systems, the GSM security flaws are not limited to this. In particular, it does not provide mutual authentication. In GSM systems, the user was required to authenticate before being allowed access to the network; however, the reverse is not true – the user is not given the option to authenticate the radio station. The technological revolution that took place in the late 90s with the advent of software-defined radio (SDR), made not only possible, but even quite cheap attacks based on "fraudulent base stations", that is, fictitious radio stations controlled by an attacker, who, thus, was able to intercept and interfere with the messages of end users

Downloads

Published

2021-06-13

Issue

Section

Articles

How to Cite

Most read articles by the same author(s)