Skip to Content
From GSM to LTE: An Introduction to Mobile Networks and Mobile Broadband
book

From GSM to LTE: An Introduction to Mobile Networks and Mobile Broadband

by Martin Sauter
March 2011
Intermediate to advanced
450 pages
18h 25m
English
Wiley
Content preview from From GSM to LTE: An Introduction to Mobile Networks and Mobile Broadband

3.9 UMTS Security

Like GSM, UMTS has strong security measures to prevent unauthorized use and eavesdropping on user data traffic and conversations. UMTS also includes enhancements to overcome a number of weaknesses that have been found, over the years, in the way GSM protects networks and users. The following are the main weaknesses:

  • The GSM circuit-switched part does not protect the link between the base station and the BSC. In many cases microwave links are used, which are vulnerable to third party monitoring.
  • GSM allows man-in-the-middle attacks with equipment that masquerades as a GSM base station.
  • The CK length used in GSM is 64 bits. Although secure when GSM was first developed in the early 1990s, the length is considered insufficient today.
  • A number of weaknesses with the A5/1 stream cipher have been detected, as described in Chapter 1, which allow decryption of a voice conversation with the appropriate equipment.

UMTS addresses these weaknesses in a number of ways. Like in GSM, a one-pass authentication and key agreement (AKA) procedure is used with immediate activation of ciphering after successful authentication. The general principle is described in Chapter 1. When a mobile device attaches to the network after power-up, it tries to register with the network by initiating location and routing area update procedures. At the beginning of the message exchange the mobile device transmits its identity (IMSI or TMSI and PTMSI), which it retrieved from the SIM. If the subscriber ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

LTE, LTE-Advanced and WiMAX: Towards IMT-Advanced Networks

LTE, LTE-Advanced and WiMAX: Towards IMT-Advanced Networks

Abd-Elhamid M. Taha, Hossam S. Hassanein, Najah Abu Ali
4G: LTE/LTE-Advanced for Mobile Broadband, 2nd Edition

4G: LTE/LTE-Advanced for Mobile Broadband, 2nd Edition

Erik Dahlman, Stefan Parkvall, Johan Skold

Publisher Resources

ISBN: 9780470978221Purchase book