Javascript must be enabled to continue!
Security in 2.5G Mobile Systems
View through CrossRef
The global system for mobile communications (GSM) is the most popular standard that implements second generation (2G) cellular systems. 2G systems combined with general packet radio services (GPRS) are often described as 2.5G, that is, a technology between the 2G and third generation (3G) of mobile systems. GPRS is a service that provides packet radio access for GSM users. This chapter presents the security architecture employed in 2.5G mobile systems focusing on GPRS. More specifically, the security measures applied to protect the mobile users, the radio access network, the fixed part of the network, and the related data of GPRS are presented and analyzed in detail. This analysis reveals the security weaknesses of the applied measures that may lead to the realization of security attacks by adversaries. These attacks threaten network operation and data transfer through it, compromising end users and network security. To defeat the identified risks, current research activities on the GPRS security propose a set of security improvements to the existing GPRS security architecture.
Title: Security in 2.5G Mobile Systems
Description:
The global system for mobile communications (GSM) is the most popular standard that implements second generation (2G) cellular systems.
2G systems combined with general packet radio services (GPRS) are often described as 2.
5G, that is, a technology between the 2G and third generation (3G) of mobile systems.
GPRS is a service that provides packet radio access for GSM users.
This chapter presents the security architecture employed in 2.
5G mobile systems focusing on GPRS.
More specifically, the security measures applied to protect the mobile users, the radio access network, the fixed part of the network, and the related data of GPRS are presented and analyzed in detail.
This analysis reveals the security weaknesses of the applied measures that may lead to the realization of security attacks by adversaries.
These attacks threaten network operation and data transfer through it, compromising end users and network security.
To defeat the identified risks, current research activities on the GPRS security propose a set of security improvements to the existing GPRS security architecture.
Related Results
SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
Security requirements are important to increase the confidence of mobile users to perform many online transactions, such as banking, booking and payment via mobile devices. Object...
Parent's Perception Regarding the Effects of Excessive Use of Mobile Phone on Children's Health: A Sociological Study in City Dera Ghazi Khan
Parent's Perception Regarding the Effects of Excessive Use of Mobile Phone on Children's Health: A Sociological Study in City Dera Ghazi Khan
The use of mobile phones among children has major effects on their health. Excessive and unrestricted use of mobile phones can contribute to various physical and psychological prob...
A NOVEL APPROACH FOR MOBILE WALLET SECURITY AND MONEY ASSOCIATE’S SECURITY
A NOVEL APPROACH FOR MOBILE WALLET SECURITY AND MONEY ASSOCIATE’S SECURITY
Mobile money refers to performing monetary transactions using telecommunications networks. This activity is intended to be referred to as "mobile money." The rapid use of mobile m...
Everyday Life in the "Tourist Zone"
Everyday Life in the "Tourist Zone"
This article makes a case for the everyday while on tour and argues that the ability to continue with everyday routines and social relationships, while at the same time moving thro...
Analisis SWOT Mobile Dictionary Pleco dan Hanping Lite
Analisis SWOT Mobile Dictionary Pleco dan Hanping Lite
Penelitian berjudul “Analisis SWOT Mobile Dictionary Pleco dan Hanping Lite†dirancang sebagai pedoman pengguna untuk menentukan Mobile Dictionary yang sesuai dengan kebutuhan ...
Video tutorial pendaftaran mobile JKN dapat meningkatkan pemahaman pasien BPJS kesehatan
Video tutorial pendaftaran mobile JKN dapat meningkatkan pemahaman pasien BPJS kesehatan
Background: The national health insurance mobile application is used for registration of social security administrator patients who want to seek treatment at health service facilit...
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...
Cashless Mobile Financial Services: Rapid growing financial sector in Bangladesh's Financial Industry
Cashless Mobile Financial Services: Rapid growing financial sector in Bangladesh's Financial Industry
Purpose: Mobile finance services have grown in Bangladesh, reaching a large population without access to traditional banks. This research investigates how mobile banking affects Ba...

