Documente Academic
Documente Profesional
Documente Cultură
18
International Journal of Computer Applications (0975 – 8887)
Volume 108 – No. 1, December 2014
19
International Journal of Computer Applications (0975 – 8887)
Volume 108 – No. 1, December 2014
The above flow chart (Fig 4) is the flow chart of the proposed 6. REFERENCES
scheme. This ensures a better security in the GSM. [1] Musheer Ahmad and Izharuddin, Security
Enhancements in GSM Cellular Standard, 978-1-4244-
4. CONCLUSION 3328-5/08/$25.00 ©2008 IEEE.
In this paper we presented an enhanced version of the
authentication algorithm used in GSM cellular standard. The [2] Asoke K. Talukder and Rupa R. Yavagal, Mobile
additional encryption is done during the authentication phase Computing – Technology, Applications and Service
to improve the security so that only the authenticated users Creation, 137-165.
can be subscribed. The implementation is done in C#.NET in
Microsoft Visual Studio 2012. The security analysis is carried [3] Jochen Schiller, Mobile Communications Second
out by this proposed scheme. It can be concluded that the Edition, 96-122.
addition of the encryption in the authentication during the A3 [4] Yong Ll, Yin Chen, Tie-Jun Ma, Security in GSM.
algorithm increases the security in the GSM network. This is
because the original A3 algorithm that is being implemented [5] Prof. Noureddine Boudriga, Security of Mobile
currently in the GSM is not very strong. Hence enhancements Communications, 2007 IEEE International Conference
of the security algorithms are very much required for better on Signaling Processing and Communications (ICSPC
mobile security and for the protection of data over the 2007), 24-27 November, Dubai, United Arab Emirates.
wireless communication network. As the security in mobile [6] A. Jaganath Swamy and D. Dinesh Reddy, WAP
communication is very fragile, these kinds of enhancements Collaboration and Security Issues in Mobile
are required. Still the security is not at the level that is Communication, 0-9785699-1-1/07/$25.00 ©2007
required but it is just a step forward to reach that level. In IEEE.
future, further enhancements can be done or new algorithms
can be proposed and mobile communications can be made [7] Billy Brumley, Special Course on Cryptology, A3/A8
more secure. & COMP128.
IJCATM : www.ijcaonline.org 20