Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao YÖK Açık Bilim - CoH...arrow_drop_down
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
versions View all 2 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

GSM and GPRS security

Authors: Güven, Yusuf;

GSM and GPRS security

Abstract

ÖZET GSM ve GPRS Güvenliği Güven, Yusuf Bu tez çalışmasında günümüzün popüler mobil ses (GSM) ve bilgi (GPRS) iletişim teknolojilerine giriş ve bunların güvenliği konulan incelenmiştir. GSM yapısı, GSM'i oluşturan temel bileşimler, güvenlik fonksiyonları ve GSM sisteminin güvenliği sorgulanmıştır. GSM altyapısını oluşturan temel öğeler ve bunların sistem içerisindeki ilişkileri incelenmiştir. GSM güvenliğini ilgilendiren elemanlar tanıtılmıştır. GSM güvenlik fonksiyonları mobil kullanıcının kimliğinin gizli kalmasını, kimlik doğrulama ve yetkilendirme işlemlerinin yapılmasını sağlar. Tüm bu işlemler için A3 (kimlik doğrulama), A5 (şifreleme) ve A8 (güvenlik anahtarı üretimi) olmak üzere üç adet güvenlik algoritması kullanılır. Kullanıcı bilgisinin başkaları tarafından gizlice izlenmesini engellemek için sinyal ve trafik kanallarının şifrelenmesi gereklidir. GPRS sistemi GSM altyapısını kullandığından dolayı iki sistemi birlikte incelemek anlamlıdır. GPRS altyapısı, GPRS 'i oluşturan bileşenler, güvenlik riskleri ve çözümleri incelenmiştir. GSM sistemine GPRS ile birlikte gelen yeni elemanlar olan GGSN ve SGSN güvenlik fonksiyonlarının yerine getirilmesini, mobil kullanıcının izlenmesini, kimlik doğrulama ve yetkilendirme işlemlerinin yapılmasını sağlar. Bununla birlikte diğer ağlar ile olan bağlantılar yeni riskleri de beraberinde getirir. Tüm bu problemlerin çözümü için kriptolama, kimlik doğrulama ve özet alma algoritmaları kullanılır. Anahtar kelimeler: GSM ve GPRS güvenliği, şifreleme, özet alma, kriptolama.

ABSTRACT GSM AND GPRS SECURITY Güven, Yusuf In this thesis study, today's popular mobile voice (GSM) and data (GPRS) communication technologies (as an intorduction) and their security were studied. GSM architecture, key components of the GSM, security fonctions, and confidentialy of the GSM was discussed. The main parts that composed the GSM infrastructure and their relationships in the system was examined. Some identities related to GSM security were introduced. GSM security functions provide to keep secret the identity of the subscriber, authenticate and authorize the subscriber. Three security algorithms are used to provide authentication, confidentially, and key generation that are A3, A5, and A8 respectively. To prevent the eavesdropping on the user data it is necessary to encrypt the signaling and traffic channel. Because GPRS system uses GSM' s infrastructure, it is meaningful to examine the both systems together. GPRS infrastructure, the elements that composed the GPRS, security risks and their solutions were examined. GPRS introduced new elements to GSM system, which are GGSN and SGSN. These elements provide main security issues, handles the security functions, keeps track of the location of the mobile and authenticates it. Nevertheless interconnection with the other networks and systems cause other security risks. To address these issues encryption, authentication and hashing algorithms are used. Key words: GSM&GPRS security, ciphering, hashing, cryptography.

74

Country
Turkey
Related Organizations
Keywords

Ciphering, GSM ve GPRS güvenliği, Elektrik ve Elektronik Mühendisliği, GSM&GPRS security, 303, Wireless communication systems -- Security measures, Özet alma, Wireless communication systems -- Security measures., Şifreleme, TK5102.85 .G88 2004, Kriptolama, Hashing, Mobile communication systems -- Security measures., Mobile communication systems -- Security measures, Cryptography, Electrical and Electronics Engineering

  • BIP!
    Impact byBIP!
    citations
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
citations
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Upload OA version
Are you the author? Do you have the OA version of this publication?