scholarly journals GSM FLAWS IN CONCERN WITH IOT

2020 ◽  
Vol 1 (2) ◽  
pp. 12-16

The Global Systems for Mobile Communication(GSM) is really the most boundless versatile Communication innovation existing these days. Its acquaintance goes back to the last part of the eighties, it experiences a few security weaknesses, which have been focused by numerous attacks intended to break the fundamental correspondence convention. A large portion of these attacks related to the A5/1 algorithm used to ensure overthe-air correspondence between the two gatherings of a call. Notwithstanding, it is as yet being used in the GSM networks as a fall-back alternative, in this manner actually putting at hazard the security of the GSM. This standard provides worldwide roaming & Interconnection with any available GSM network including the ones implemented in IOT so that users need to be aware of the possible security issues. The goal of this work is to survey the absolute most applicable outcomes in this field and examine their reasonable possibility

Author(s):  
Kartik Khurana ◽  
Harpreet Kaur ◽  
Ritu Chauhan ◽  
Shalu Chauhan ◽  
Shaveta Bhatia ◽  
...  

Now a day’s mobile communication has become a serious business tool for the users. Mobile devices are mainly used for the applications like banking, e-commerce, internet access, entertainment, etc. for communication. This has become common for the user to exchange and transfer the data. However people are still facing problems to use mobile devices because of its security issue. This paper deals with various security issues in mobile computing. It also covers all the basic points which are useful in mobile security issues such as categorisation of security issues, methods or tactics for success in security issues in mobile computing, security frameworks.


2021 ◽  
Author(s):  
Maphuthego Etu Maditsi ◽  
Thulani Phakathi ◽  
Francis Lugayizi ◽  
Michael Esiefarienrhe

Global System for Mobile Communications (GSM) is a cellular network that is popular and has been growing in recent years. It was developed to solve fragmentation issues of the first cellular system, and it addresses digital modulation methods, level of the network structure, and services. It is fundamental for organizations to become learning organizations to keep up with the technology changes for network services to be at a competitive level. A simulation analysisusing the NetSim tool in this paper is presented for comparing different cellular network codecsfor GSM network performance. Theseparameters such as throughput, delay, and jitter are analyzed for the quality of service provided by each network codec. Unicast application for the cellular network is modeled for different network scenarios. Depending on the evaluation and simulation, it was discovered that G.711, GSM_FR, and GSM-EFR performed better than the other codecs, and they are considered to be the best codecs for cellular networks.These codecs will be of best use to better the performance of the network in the near future.


2019 ◽  
Vol 38 (1) ◽  
pp. 177
Author(s):  
F.O. Ehiagwina ◽  
A.S. Afolabi ◽  
N.T. Surajudeen-Bakinde ◽  
O.A. Fakolujo

2019 ◽  
Vol 1299 ◽  
pp. 012048
Author(s):  
M. R. Usikalu ◽  
G. Nwosu ◽  
C. A. Onumejor ◽  
A. Akinpelu ◽  
M. L. Akinyemi

2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Ruijin Zhu ◽  
Baofeng Zhang ◽  
Yu-an Tan ◽  
Jinmiao Wang ◽  
Yueliang Wan

The authorization mechanism of smart devices is mainly implemented by firmware, yet many smart devices have security issues about their firmware. Limited research has focused on securing the firmware of smart devices, although increasingly more smart devices are used to deal with the very sensitive applications, activities, and data of users. Thus, research on smart device firmware security is of growing importance. Disassembly is a common method for evaluating the security of authorization mechanisms. When disassembling firmware, the processor type of the running environment and the image base of the firmware should first be determined. In general, the processor type can be obtained by tearing down the device or consulting the product manual. However, it is not easy to determine the image base of firmware. Since the processors of many smart devices are ARM architectures, in this paper, we focus on firmware under the ARM architecture and propose an automated method for determining the image base. By studying the storage law of the jump table in the firmware of ARM-based smart devices, we propose an algorithm, named determining the image base by searching jump tables (DBJT), to determine the image base. The experimental results indicate that the proposed method can successfully determine the image base of firmware, which stores the absolute address in the jump table.


Author(s):  
Mandakinee Bandopadhyay ◽  
Subrata Chattopadhyay

With the development of mobile communication technologies and the popularity of relating devices, GSM network-based intelligent systems have been used more and more widely. Most existing intelligent systems have built on mobile platforms, but those systems don't provide any facility that could save time and energy. But people suffer from lack of time and energy to buy essential needs like medicine, etc. and they like to communicate to the supplier to get confirmation instantly before leaving home or office to collect the same. So, in society, it needs to give alignment without going on field. This chapter copes this problem using wireless database searching scheme using GSM technology, which is very useful in smart cities, where cell phone is an essential part of living. The system receives information from outsiders and customers through GSM modem database searches of all the suppliers connected in a common server and sends the result through short messages independently to the customer showing the availability.


Sign in / Sign up

Export Citation Format

Share Document