To search, Click below search items.


All Published Papers Search Service


Security Challenges in 3G Systems


Mohammad Islam, Vineet Kumar Verma


Vol. 12  No. 10  pp. 130-138


This study explains the authentication and encryption scheme used in GSM. It explains the different possible attacks on cellular systems, which include SIM cloning, eavesdropping, location tracking, SMS ping, SMS denial of service, authentication denial of service and SMS spam. It classifies these attacks on the basis of target of the attack, type of attack, motivation and severity. It points out the vulnerabilities that are exploited by attacks on cellular systems. It shows that the existing security schemes do not provide adequate security and that there is a need to develop new mechanisms that are better suited to the wireless environment. The study also looks into how risk analysis, risk modeling and fuzzy logic can be applied to security in 3G systems. It proposes a fuzzy logic based risk model to secure Short Message Service in GSM based cellular networks. The proposed model uses a hybrid approach towards risk modeling.


3G, GSM, Fuzzy Logic, Cellualr System, SMS, Mobile Network.