Please use this identifier to cite or link to this item:
http://localhost:80/xmlui/handle/123456789/1013
Title: | Improvement in the Interception Vulnerability Level of Encryption Mechanism in GSM |
Authors: | Reshail |
Keywords: | Engineering and Technology Interception Vulnerability Level Encryption Mechanism GSM |
Issue Date: | 1-Jan-2018 |
Publisher: | Department of Electrical Engineering, Capital University of Science and Technology, Islamabad |
Abstract: | Due to day-to-day advancements in the technology, cellular mobile operators around the world are facing higher data-rate demands and novel security issues. The emerging issues are basically the result of the evolving features of technology advancement. Therefore, there is an urgent need for specific modifications in the existing security mechanisms used in cellular communication systems, in order to enable them to face evolving security challenges. This thesis focuses on analysis the existing security mechanisms used in GSM (Global system for mobile) and proposes necessary modifications in them in order to enhance security. In GSM generally three linear feedback shift registers are used to fragment key in data encryption mechanism. In the dissertation, it is proposed that in order to improve the security, the number of registers is increased, then the number of combinations also increases. As combinations increase, the vulnerability of intercepting the encryption key decreases that enhances the security of the system. Moreover, a closed-form formula is developed to calculate the number of combinations of the session key if it is fragmented into a number of registers. The results are plotted to show the trends of the number of combinations and the vulnerability level of interception with respect to the number of registers. It is observed from the simulations that when the number of registers is increased, the number of combinations also increases; on the other hand the vulnerability level of interception decreases. In this way, personal data or information is protected and hacking of data becomes difficult. The derived formula can be used for the analysis of security mechanism in GSM, wireless sensor networks and internet of things (IOT). |
URI: | http://142.54.178.187:9060/xmlui/handle/123456789/1013 |
Appears in Collections: | Thesis |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Engineering_(Main_File)(final%20thesis).htm | 155 B | HTML | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.