Mobilo sakaru drošība
Loading...
Date
Authors
Advisor
Journal Title
Journal ISSN
Volume Title
Publisher
Latvijas Universitāte
Language
N/A
Abstract
Mobilie sakari balstās uz balss un datu pārraidi radio viļņos, kurus pārtvert ir viegli,
tādēļ liela uzmanība jāpievērš drošībai. GSM tīklā tiek lietoti sekojoši drošības mehānismi:
abonenta autorizācija, abonenta identitātes konfidencialitāte un datu konfidencialitāte radio
kanālā.
Darbs tiek taisīts ar mērķi objektīvi izvērtēt drošības līmeni, kā arī, balstoties uz iegūto
informāciju, izstrādāt algoritmu, ar kura palīdzību būtu iespējams pierādīt SIM kartes
klonēšanas faktu.
Darbs ir organizēts piecās nodaļās, kur pirmās divas apraksta tīkla uzbūvi un tā
funkcionēšanas principus. Nākamās divas nodaļas pievēršas drošības mehānismu analīzei.
Piektā nodaļa apraksta teorētiski algoritmu identitātes atslēgas nolasīšanai.
A mobile communications are based on data transfer via radio channel, which are easy to intercept therefore security is very important. There are following security aspects in the GSM network: subscriber authentication, confidentiality of subscriber’s identity and data confidentiality on radio path. The aim of this paper is to give an objective estimation of efficiency of security provided by the GSM, also, based on acquired information, to develop an algorithm that can be used to affirm a SIM cloning case. The paper is organized in five chapters. First two are discussing architecture of a GSM network and how it’s operating. Next two chapters focus on security features. The fifth chapter theoretically describes an algorithm for Ki extraction.
A mobile communications are based on data transfer via radio channel, which are easy to intercept therefore security is very important. There are following security aspects in the GSM network: subscriber authentication, confidentiality of subscriber’s identity and data confidentiality on radio path. The aim of this paper is to give an objective estimation of efficiency of security provided by the GSM, also, based on acquired information, to develop an algorithm that can be used to affirm a SIM cloning case. The paper is organized in five chapters. First two are discussing architecture of a GSM network and how it’s operating. Next two chapters focus on security features. The fifth chapter theoretically describes an algorithm for Ki extraction.