Prasenjit Das(0710434) Student, Dept. of Computer Sc. & Engineering
National Institute of Technology Agartala, Agartala, Tripura (w), India dprasenjit83@yahoo.in Debapriya Banik(0710411)
Student, Dept. of Computer Sc. & Engineering
National Institute of Technology Agartala, Agartala, Tripura (w), India debu_nita@yahoo.com Abstract. With the advent of 2G & 3G technologies we have stepped into an era of social globalization. The GSM (also called second generation or 2G) mobile phone system uses digital signaling and speech channels. Yet several security concerns are associated with it regarding both operator & customer side. The security model designed of 2G network offers confidentiality and authentication. Authentication of the subscriber is achieved using a pre-shared key and challenge-response, whereas confidentiality is applied by encrypting the communication between the subscriber and base-station using A5/1 and A5/2 stream ciphers. However, the broadcast nature of the wireless communication and increased popularity of wireless devices introduce serious security vulnerabilities in 3G. Mobile users and providers must be assured of the correct identity of the communicating party. Encryption and Authentication are the two main security mechanisms in 3G network access securities The paper focuses on discussing all the mechanisms.
Keywords: GSM, 3G, UMTS, TMSI, A5/1, A5/2, A3, A8, KASUMI, Rijndael’s algorithm.
Introduction
Wireless communications are advancing rapidly. We are currently at the verge of a new revolutionary advancement in wireless data communications. The Universal Mobile Telecommunication system (UMTS) is a realization of third generation (3G) networks, which intend to establish a single integrated and secure network. Wireless data, multimedia applications and integrated services will be among the major driving forces behind 3G. While wireless