نویسندگان
1 دانشکدهی مهندسی برق، دانشگاه صنعتی شریف
2 پژوهشکدهی الکترونیک، دانشگاه صنعتی شریف
چکیده
کلیدواژهها
عنوان مقاله [English]
نویسندگان [English]
The number of subscribers to mobile phone systems during its 25 year life time has passed the number of subscribers of fixed phone systems with a life time of 120 years. This shows that over the last 10-15 years, mobile telecommunication has grown from a being a small niche technology to a massive industry. A considerable amount of financial resources in our country has been invested for providing mobile phone services to the public. However, this system could not be customized and tailored to fit the operator's requirements and had to be implemented and used as it was. Against this background, security has always been an issue for mobile phones. GSM was designed to prevent cloning and to be no more vulnerable to eavesdropping than fixed phones. It has addressed, to a large extent, the needs of the operators and aspirations of users, but, new methods for analyzing algorithms and security protocols revealed weak points in its security features regarding privacy, authenticity and integrity. In this paper, the security architecture of the GSM mobile phone has been described in detail and its vulnerabilities and shortcomings are extracted, in order to reduce the risks involved using this system.
کلیدواژهها [English]