نویسندگان
1 دانشکدهی مهندسی برق، دانشگاه صنعتی شریف
2 پژوهشکدهی الکترونیک، دانشگاه صنعتی شریف
چکیده
کلیدواژهها
عنوان مقاله [English]
نویسندگان [English]
The number of subscribers to mobile phone systems during its 25 year life time has passed the number of subscribers of fixed
phone systems with a life time of 120 years. This shows that over the last 10-15 years, mobile telecommunication has grown
from a being a small niche technology to a massive industry. A considerable amount of financial resources in our country has
been invested for providing mobile phone services to the public. However, this system could not be customized and tailored to
fit the operator's requirements and had to be implemented and used as it was. Against this background, security has always been an issue for mobile phones. GSM was designed to prevent cloning and to be no more vulnerable to eavesdropping than fixed
phones. It has addressed, to a large extent, the needs of the operators and aspirations of users, but, new methods for analyzing
algorithms and security protocols revealed weak points in its security features regarding privacy, authenticity and integrity.
In this paper, the security architecture of the GSM mobile phone has been described in detail and its vulnerabilities and shortcomings are extracted, in order to reduce the risks involved using this system.
کلیدواژهها [English]