Vous êtes sur la page 1sur 1

SECURITY CHALLENGES IN MOBILE SYSTEMS

T.Karthikeyan Assistant Professor Department of computer science Sri Balaji Chockalingam Engineering College,Arni

Abstract
This work explains the authentication and encryption scheme used in GSM. It explains the A3, A5 and A8 protocols used in the security mechanism in GSM. It explains the different possible attacks on cellular systems, which include SIM cloning, eavesdropping, location tracking, SMS ping, SMS denial of service, authentication denial of service and SMS spam. It classifies these attacks on the basis of target of the attack, type of attack, motivation and severity. It points out the vulnerabilities that are exploited by attacks on cellular systems. It shows that the existing security schemes do not provide adequate security and that there is a need to develop new mechanisms that are better suited to the wireless environment.

The study also looks into how risk analysis, risk modeling and fuzzy logic can be applied to security in mobile systems. It proposes a fuzzy logic based risk model to secure Short Message Service in GSM based cellular networks. The proposed model uses a hybrid approach towards risk modeling. The user begins use of the system with a mature and well-evolved model that has been constructed by using all the information that could be gathered at that stage. However, even after the system is operational, the model continues to evolve with constant feedback from the user. This approach puts the user in control and allows the model to be refined with time to better match the existing circumstances. The model is simple, encourages experimentation and puts the user in an active role.

Vous aimerez peut-être aussi