Divya Gsm Ppt

30
G.Divya

Transcript of Divya Gsm Ppt

Page 1: Divya Gsm Ppt

G.Divya

Page 2: Divya Gsm Ppt

History of GSM

In 1982, the European Conference of Postal and Telecommunications Administrations (CEPT)created the Group Special Mobile (GSM) to develop a standard for a mobile telephone system that could be used across Europe. In 1987, a memorandum of understanding was signed by 13 countries to develop a common cellular telephone system across Europe.

Page 3: Divya Gsm Ppt

 In 1989, GSM responsibility was transferred to the European Telecommunications Standards Institute (ETSI) and phase I of the GSM specifications were published in 1990.The first GSM network was launched in 1991 by Radiolinja in Finland with network infrastructure provided by Telenokia and Siemens Networks which later on merged as Nokia Siemens Networks.By the end of 1993, over a million subscribers were using GSM phone networks being operated by 70 carriers across 48 countries. 

Page 4: Divya Gsm Ppt

WHY GSM??? Improved spectrum efficiency.

International roaming.

Low-cost mobile sets and base stations (BSs)

High-quality speech

Compatibility with Integrated Services Digital Network (ISDN) and other telephone company services.

Support for new services.

Page 5: Divya Gsm Ppt

WHAT IS GSM??? GSM stands for Global System for Mobile Communication and is an open, digital

cellular technology used for transmitting mobile voice and data services.

The GSM emerged from the idea of cell-based mobile radio systems at Bell Laboratories in the early 1970s.

The GSM is the name of a standardization group established in 1982 to create a common European mobile telephone standard.

The GSM standard is the most widely accepted standard and is implemented globally.

The GSM is a circuit-switched system that divides each 200kHz channel into eight 25kHz time-slots. GSM operates in the 900MHz and 1.8GHz bands in Europe and the 1.9GHz and 850MHz bands in the US.

The GSM is owning a market share of more than 70 percent of the world's digital cellular subscribers.

The GSM makes use of narrowband Time Division Multiple Access (TDMA) technique for transmitting signals.

Page 6: Divya Gsm Ppt

GSM ARCHITECTURE

Page 7: Divya Gsm Ppt
Page 8: Divya Gsm Ppt

ELEMENTS OF GSM

Base Transceiver Station (BTS)

Base Station Controller (BSC)

Mobile Switching Centre (MSC)

Page 9: Divya Gsm Ppt

GSM DATABASE Home Location Register(HLR) Visitor Location Register(VLR) Authentication Centre(AUC) Equipment Identify Register(EIR)

Page 10: Divya Gsm Ppt

Importance of GSM Database NSS carries out call switching and mobility

management functions for mobile phones roaming on the network of base stations.

It is owned and deployed by mobile phone operators and allows mobile devices to communicate with each other and telephones in the wider Public Switched Telephone Network or (PSTN)

Page 11: Divya Gsm Ppt

 Home Location Register (HLR)o Key component of mobile networks such as

GSM,TDMA, and CDMA networks.

o It stores details of every SIM card issued by the mobile phone operator.

o It contains user information such as account information, account status, user preferences, features subscribed to by the user,user’s current location, etc.

o They are used by the Mobile Switching Centers (MSCs) to originate and deliver arriving mobile calls.

o Data is stored as long as a subscriber remains with the mobile phone operator.

Page 12: Divya Gsm Ppt

Examples of other data stored in the HLR against

an IMSI record is:

GSM services that the subscriber has requested

or been given.

GPRS settings to allow the subscriber to access

packet services.

Current location of subscriber (VLR and serving

GPRS support node/SGSN).

Call divert settings applicable for each

associated MSISDN

Page 13: Divya Gsm Ppt

The HLR connects to the following elements:

The G-MSC for handling incoming calls

The VLR for handling requests from mobile

phones to attach to the network

The SMSC for handling incoming SMs

The voice mail system for delivering

notifications to the mobile phone that a

message is waiting

The AUC for authentication and ciphering and

exchange of data (triplets)

Page 14: Divya Gsm Ppt

The following procedures are implemented:Manage the mobility of subscribers by means of

updating their position in administrative areas called 'location areas', which are identified with a LAC. The action of a user of moving from one LA to another is followed by the HLR with a Location area update procedure.

Send the subscriber data to a VLR or SGSN when a subscriber first roams there.

Broker between the G-MSC or SMSC and the subscriber's current VLR in order to allow incoming calls or text messages to be delivered.

Remove subscriber data from the previous VLR when a subscriber has roamed away from it.

Page 15: Divya Gsm Ppt

VISITOR LOCATION REGISTER(VLR) The visitor location register is a database of the

subscribers who have roamed into the jurisdiction of the

MSC which it serves.

The VLR contains all the subscriber data, both permanent

and temporary, which are necessary to control a MS in the

MSCs coverage area. The VLR is commonly realised as an

integral part of the MSC, rather than a separate entity.

The data stored in the VLR has either been received from

the HLR, or collected from the MS (Mobile station).

Page 16: Divya Gsm Ppt

Data stored include:

IMSI (the subscriber's identity number).

Authentication data.

MSISDN (the subscriber's phone number).

GSM services that the subscriber is allowed

to access.

access point (GPRS) subscribed.

The HLR address of the subscriber.

Page 17: Divya Gsm Ppt

The VLR connects to the following elements:

The V-MSC to pass required data for its

procedures; e.g., authentication or call setup.

The HLR to request data for mobile phones

attached to its serving area.

Other VLRs to transfer temporary data

concerning the mobile when they roam into new

VLR areas. For example, the temporal mobile

subscriber identity (TMSI).

Page 18: Divya Gsm Ppt

The primary functions of the VLR are:

To inform the HLR that a subscriber has arrived in the particular area

covered by the VLR.

To track where the subscriber is within the VLR area (location area)

when no call is ongoing.

To allow or disallow which services the subscriber may use.

To allocate roaming numbers during the processing of incoming

calls.

To purge the subscriber record if a subscriber becomes inactive

whilst in the area of a VLR. The VLR deletes the subscriber's data

after a fixed time period of inactivity and informs the HLR (e.g.,

when the phone has been switched off and left off or when the

subscriber has moved to an area with no coverage for a long time).

To delete the subscriber record when a subscriber explicitly moves

to another, as instructed by the HLR.

Page 19: Divya Gsm Ppt

AUTHENTICATION CENTRE The authentication centre (AUC) is a function

to authenticate each SIM card that attempts to connect to the GSM core network (typically when the phone is powered on). Once the authentication is successful, the HLR is allowed to manage the SIM and services described above.

An encryption key is also generated that is subsequently used to encrypt all wireless communications (voice, SMS, etc.) between the mobile phone and the GSM core network.

Proper implementation of security in and around the AUC is a key part of an operator's strategy to avoid SIM cloning.

Page 20: Divya Gsm Ppt

The AUC does not engage directly in the authentication

process, but instead generates data known as triplets for the

MSC to use during the procedure. The security of the process

depends upon ashared secret between the AUC and the SIM

called the Ki.

The Ki is securely burned into the SIM during manufacture

and is also securely replicated onto the AUC. This Ki is never

transmitted between the AUC and SIM, but is combined with

the IMSI to produce a challenge/response for identification

purposes and an encryption key called Kc for use in over the

air communications.

Page 21: Divya Gsm Ppt

The AUC connects to the following

elements:

The MSC which requests a new batch of

triplet data for an IMSI after the previous

data have been used. This ensures that

same keys and challenge responses are

not used twice for a particular mobile.

Page 22: Divya Gsm Ppt

The AUC stores the following data for each

IMSI:

the Ki

Algorithm id. (the standard algorithms are

called

A3 or A8).

Page 23: Divya Gsm Ppt

When the MSC asks the AUC for a new set of

triplets for a particular IMSI, the AUC first

generates a random number known as RAND.

This RAND is then combined with the Ki to

produce two numbers as follows:

The Ki and RAND are fed into the A3 algorithm

and the signed response (SRES) is calculated.

The Ki and RAND are fed into the A8 algorithm

and a session key called Kc is calculated.

Page 24: Divya Gsm Ppt

• The numbers (RAND, SRES, Kc) form the triplet sent back

to the MSC.

• When a particular IMSI requests access to the GSM core

network, the MSC sends the RAND part of the triplet to

the SIM.

• The SIM then feeds this number and the Ki (which is

burned onto the SIM) into the A3 algorithm as appropriate

and an SRES is calculated and sent back to the MSC.

• If this SRES matches with the SRES in the triplet (which it

should if it is a valid SIM), then the mobile is allowed to

attach and proceed with GSM services.

Page 25: Divya Gsm Ppt

After successful authentication, the MSC sends the

encryption key Kc to the base station controller (BSC) so

that all communications can be encrypted and

decrypted.

The mobile phone can generate the Kc itself by feeding

the same RAND supplied during authentication and

the Ki into the A8 algorithm.

The AUC is usually collocated with the HLR, although this

is not necessary. Whilst the procedure is secure for most

everyday use, it is by no means crack proof.

Therefore a new set of security methods was designed

for 3G phones.

Page 26: Divya Gsm Ppt

EQUIPMENT IDENTITY REGISTER(EIR)

The EIR ensures that all Mobile Equipment's are valid and authorized to function on the PLMN.

Three categories exist on the EIR, a white list, a grey list and a black list.

The white list comprises the IMEI ranges of all the Mobile Equipment's that have been approved by any one of the three European, GSM approval centers.

Page 27: Divya Gsm Ppt

Any Mobile Equipment that appears on the grey list will be allowed to function but will trigger an alert to the network operator. This facility allows the network operator to identify any subscriber that is using a lost or stolen Mobile Equipment.

Mobiles that are lost or stolen can be blacklisted which will prevent them from functioning on the home PLMN or on other PLMNs around the world.

Page 28: Divya Gsm Ppt

GSM SECURITY

GSM provides three levels of security.

Security System One

* The GSM subscription is recorded on the SIM card

* The SIM card may be inserted into any GSM

terminal

* The owner of the SIM card is billed

* GSM checks the validity of the subscriber

Page 29: Divya Gsm Ppt

 Security System Two

* The GSM system identifies the location of the caller

* Stolen phones cannot be easily used as they can be

traced and in some cases barred.

* The receiver of a call can identify the caller before

accepting the call.

 Security System Three

* Full digital encryption is used to make it impossible

for other parties to listen to a conversation.

Page 30: Divya Gsm Ppt

THANK YOU…