
GSM FLAWS IN CONCERN WITH IOT
Publication year - 2020
Publication title -
gap indian journal of forensics and behavioural sciences
Language(s) - English
Resource type - Journals
ISSN - 2582-8177
DOI - 10.47968/gapijfbs.12003
Subject(s) - gsm , roaming , customised applications for mobile networks enhanced logic , computer security , computer science , telecommunications , mobile telephony , umts frequency bands , field (mathematics) , hazard , work (physics) , service data point , cellular network , gsm services , engineering , mobile radio , mechanical engineering , chemistry , mathematics , organic chemistry , pure mathematics
The Global Systems for Mobile Communication(GSM) is really the most boundless versatile Communicationinnovation existing these days. Its acquaintance goes back to the last part of the eighties, it experiences a fewsecurity weaknesses, which have been focused by numerous attacks intended to break the fundamentalcorrespondence convention. A large portion of these attacks related to the A5/1 algorithm used to ensure overthe-air correspondence between the two gatherings of a call. Notwithstanding, it is as yet being used in the GSMnetworks as a fall-back alternative, in this manner actually putting at hazard the security of the GSM. Thisstandard provides worldwide roaming & Interconnection with any available GSM network including the onesimplemented in IOT so that users need to be aware of the possible security issues. The goal of this work is to surveythe absolute most applicable outcomes in this field and examine their reasonable possibility