Sie sind auf Seite 1von 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.


GSM Technology: Architecture, Security and Future Challenges

Article · February 2017

0 6,477

1 author:

Zia Ur Rahman


Some of the authors of this publication are also working on these related projects:

A Survey of Fourth Generation Technologies in Cellular Networks View project

All content following this page was uploaded by Zia Ur Rahman on 22 February 2017.

The user has requested enhancement of the downloaded file.

International Journal of Science Engineering and Advance Technology, ISSN 2321-6905
IJSEAT, Vol. 5, Issue 1 January -2017

GSM Technology: Architecture, Security and Future Challenges

Ihtesham ul Haq*1, Zia Ur Rahman 2,Shahid Ali3, Engr. Muhammad Faisal4
Department of Computer Science, Bacha Khan University, Charsadda, KPK, Pakistan

Abstract convey 64 kbps to 120 Mbps of information rates. By

GSM means Global System for mobile communication. and by GSM underpins more than one billion versatile
GSM is generally utilized mobile correspondence endorsers in more than 210 nations all through the
framework on the planet. GSM framework was world. GSM gives fundamental to cutting edge voice
produced as an advanced framework utilizing time and information administrations including wandering
division multiple access (TDMA) method for administration. Wandering is the capacity to utilize your
correspondence reason. In this paper we have introduced GSM telephone number in another GSM organize.
a concise review of GSM system. GSM arrange
otherwise called 2G network. The possibility of GSM II. Architecture of GSM
was produced at Bell Laboratories in 1970. It is
generally utilized portable correspondence framework The GSM specialized determinations characterize the
on the planet. GSM is an open and advanced cell distinctive components inside the GSM organize design.
innovation utilized for transmitting versatile voice and It characterizes the distinctive components and the
information service works at the 850MHz, 900MHz, routes in which they communicate to empower the
1800MHz and 1900MHz frequency bands. general framework operation to be kept up [2].The GSM
organize design is presently entrenched and with the
Keywords- GSM, 2.5G, TDMA, Cellular Networks other later cell frameworks now settled and other new
ones being sent, the essential GSM arrange engineering
I. Introduction has been overhauled to interface to the system
GSM is an all inclusive acknowledged standard for components required by these frameworks.
computerized cell communication. GSM utilizes In spite of the advancements of the more up to date
narrowband Time Division Multiple Access (TDMA) frameworks, the fundamental GSM framework design
for giving voice and content based administrations over has been kept up, and the system components depicted
cell phone systems. It is an advanced cell innovation underneath play out an indistinguishable capacities from
utilized for transmitting versatile voice and information they did when the first GSM framework was propelled
administrations. The idea of GSM rose up out of a cell- in the mid 1990s [3].The GSM arrange engineering as
based portable radio framework at Bell Laboratories in characterized in the GSM determinations can be
the mid 1970s. GSM is the name of an assembled into four principle territories [4]:
institutionalization gather set up in 1982 to make a
typical European cell phone standard. GSM is the most 1. Mobile station (MS)
generally acknowledged standard in broadcast
communications and it is actualized all inclusive [1].
GSM is a circuit-exchanged framework that partitions 2. Base-Station Subsystem (BSS)
each 200 kHz channel into eight 25 kHz schedule
vacancies. GSM works on the versatile correspondence 3. Network and Switching Subsystem (NSS)
groups 900 MHz and 1800 MHz in many parts of the
world. 4. Operation and Support Subsystem (OSS)

In US, GSM works in the groups 850 Mega Hertz and 1. Mobile station (MS):
1900 Mega Hertz. GSM claims a piece of the overall
industry of more than 70 percent of the world's
Versatile stations or portable gear (as they are most
advanced cell endorsers. GSM makes utilization of
generally referred to) cell or cell phones fill in as the
narrowband Time Division Multiple Access (TDMA)
segment of a GSM cell arrange that the client sees and
strategy for transmitting signals. GSM was created
works. As of late their size has fallen significantly while
utilizing advanced innovation. It has a capacity to Page 70
International Journal of Science Engineering and Advance Technology, ISSN 2321-6905
IJSEAT, Vol. 5, Issue 1 January -2017

the level of usefulness has incredibly expanded. A named the center system. It gives the principle control
further preferred standpoint is that the time between and interfacing for the entire versatile system. The
charges has essentially expanded. significant components inside the center system include:

There are various components to the wireless, in spite of 1) Mobile Switching administrations Center
the fact that the two principle components are the (MSC): The fundamental component inside the center
fundamental equipment and the SIM.The equipment system region of the general GSM arrange engineering
itself contains the primary components of the cell phone is the Mobile exchanging Services Center (MSC). The
including the show, case, battery, and the hardware used MSC demonstrations like a typical exchanging hub
to produce the flag, and process the information inside a PSTN or ISDN, additionally gives extra
beneficiary and to be transmitted. It likewise contains a usefulness to empower the necessities of a portable
number known as the International Mobile Equipment client to be upheld. These incorporate enlistment,
Identity (IMEI). This is introduced in the telephone at verification, call area, between MSC handovers and call
fabricate and "can't" be changed. It is gotten to by the steering to a portable supporter. It additionally gives an
system amid enrollment to check whether the hardware interface to the PSTN so calls can be directed from the
has been accounted for as stolen. portable system to a telephone associated with a
landline. Interfaces to different MSCs are given to
The SIM or Subscriber Identity Module contains the empower calls to be made to mobiles on various
data that gives the personality of the client to the systems.
system. It contains are assortment of data including a
number known as the International Mobile Subscriber 2) Home Location Register (HLR): This database
Identity (IMSI). contains all the regulatory data about every supporter
alongside their last known area. Along these lines, the
2. Base Station Subsystem (BSS) GSM system can course calls to the applicable base
station for the MS. At the point when a client switches
on their telephone, the telephone registers with the
The Base Station Subsystem (BSS) segment of the GSM
organize engineering that is on a very basic level related system and from this it is conceivable to figure out
with speaking with the mobiles on the system. It which BTS it speaks with so approaching calls can be
steered suitably. Notwithstanding when the telephone is
comprises of two components:
not dynamic (but rather exchanged on) it re-enrolls
intermittently to guarantee that the system (HLR) knows
1) Base Transceiver Station (BTS): The BTS about its most recent position. There is one HLR per
utilized as a part of a GSM organize involves the radio organize, despite the fact that it might be dispersed
transmitter recipients, and their related reception crosswise over different sub-focuses to for operational
apparatuses that transmit and get to straightforwardly reasons.
speak with the mobiles. The BTS is the characterizing
component for every cell. The BTS speaks with the
3) Visitor Location Register (VLR): This contains
mobiles and the interface between the two is known as
the Um interface with its related conventions [5]. chose data from the HLR that empowers the chose
administrations for the individual endorser of be given.
The VLR can be actualized as a different substance,
2) Base Station Controller (BSC): The BSC however it is generally acknowledged as a necessary
shapes the following stage over into the GSM organize. part of the MSC, instead of a different element. Along
It controls a gathering of BTSs, and is regularly co- these lines get to is made speedier and more
situated with one of the BTSs in its gathering. It deals advantageous.
with the radio assets and controls things, for example,
handover inside the gathering of BTSs, designates
4) Equipment Identity Register (EIR): The EIR is
channels and so forth. It speaks with the BTSs over
the substance that chooses whether given portable
what is named the Abis interface.
hardware might be permitted onto the system. Every cell
phone has a number known as the International Mobile
3. Network Switching Subsystem (NSS): Equipment Identity. This number, as said above, is
introduced in the hardware and is checked by the system
The GSM framework engineering contains an amid enlistment. Subordinate upon the data held in the
assortment of various components, and is frequently EIR, the versatile might be assigned one of three states - Page 71
International Journal of Science Engineering and Advance Technology, ISSN 2321-6905
IJSEAT, Vol. 5, Issue 1 January -2017

permitted onto the system, banished get to, or observed

on the off chance that its issues.

5) Authentication Center: It is an ensured

database that contains the mystery enter likewise
contained in the client's SIM card. It is utilized for
verification and for figuring on the radio channel.

6) Gateway Mobile Switching Center (GMSC):

The GMSC is the indicate which a ME ending call is at
first steered, with no information of the MS's area. The
GMSC is hence responsible for acquiring the MSRN
(Mobile Station Roaming Number) from the HLR in
light of the MSISDN (Mobile Station ISDN number, the
"index number" of a MS) and steering the call to the
right went to MSC. The "MSC" part of the term GMSC
is misdirecting, since the passage operation does not
require any connecting to a MSC. Figure 1: GSM Architectural Elements

III. GSM Operation

7) SMS Gateway (SMS-G): The SMS-G or SMS
The GSM operation includes
door is the term that is utilized to all things considered
1) Mobile Phone to Public Switched Telephone
portray the two Short Message Services Gateways
Network (PSTN):
characterized in the GSM measures. The two portals
When a mobile subscriber makes a call to a PSTN
handle messages coordinated in various bearings. The
telephone subscriber, the following sequence of events
SMS-GMSC (Short Message Service Gateway Mobile
takes place:
Switching Center) is for short messages being sent to a
The MSC/VLR receives the message of a call request.
ME. The SMS-IWMSC (Short Message Service Inter-
The MSC/VLR checks if the mobile station is
Working Mobile Switching Center) is utilized for short
authorized to access the network. If so, the mobile
messages started with a portable on that system. The
station is activated. If the mobile station is not
SMS-GMSC part is like that of the GMSC, while the
authorized, then the service will be denied. MSC/VLR
SMS-IWMSC gives a settled get to indicate the Short
analyzes the number and initiates a call setup with the
Message Service Center.
PSTN.MSC/VLR asks the corresponding BSC to
allocate a traffic channel (a radio channel and a time
4. Operation and Support Subsystem (OSS): slot).The BSC allocates the traffic channel and passes
the information to the mobile station. The called party
The OSS or operation bolster subsystem is a component answers the call and the conversation takes place. The
inside the general GSM organize engineering that is mobile station keeps on taking measurements of the
associated with segments of the NSS and the BSC. It is radio channels in the present cell and the neighboring
utilized to control and screen the general GSM system cells and passes the information to the BSC. The BSC
and it is additionally used to control the movement heap decides if a handover is required. If so, a new traffic
of the BSS. It must be noticed that as the quantity of BS channel is allocated to the mobile station and the
increments with the scaling of the supporter populace a handover takes place. If handover is not required, the
portion of the upkeep errands are exchanged to the BTS, mobile station continues to transmit in the same
permitting funds in the cost of responsibility for frequency as shown in Figure 2.
framework. The engineering of a GSM is appeared in
Figure 1. Page 72
International Journal of Science Engineering and Advance Technology, ISSN 2321-6905
IJSEAT, Vol. 5, Issue 1 January -2017

various sorts of assault, each of them went for an

alternate part of the system. The advancement of UMTS
presents a discretionary Universal Subscriber Identity
Module (USIM), that uses a more extended
confirmation key to give more noteworthy security, and
in addition commonly validating the system and the
client, while GSM just verifies the client to the system
(and not the other way around). The security show in
this way offers secrecy and verification, however
constrained approval capacities, and no non-
repudiation.GSM utilizes a few cryptographic
calculations for security. The A5/1, A5/2, and
A5/3stream figures are utilized for guaranteeing over-
the-air voice security. A5/1 was created first and is a
more grounded calculation utilized inside Europe and
the United States; A5/2 is weaker and utilized as a part
of different nations. Genuine shortcomings have been
found in both calculations: it is conceivable to break
A5/2 continuously with a figure content just assault, and
Figure 2: GSM Operation for Event handling in January 2007, The Hacker's Choice begun the A5/1
2) PSTN to Mobile Phone: splitting venture with arrangements to utilize FPGAs
that permit A5/1 to be broken with a rainbow table
At the point when a PSTN endorser calls a versatile assault. The framework bolsters numerous calculations
station, the accompanying succession of occasions so administrators may supplant that figure with a more
happens: The Gateway MSC gets the call and inquiries grounded one. New assaults have been watched that
the HLR for the data expected to course the call to the exploit poor security usage, engineering, and
serving MSC/VLR. The GMSC courses the call to the improvement for Smartphone applications. Some
MSC/VLR. The MSC checks the VLR for the area wiretapping and spying methods capture the sound
region of the MS. The MSC contacts the MS by means information and yield giving a chance to an outsider to
of the BSC through a communicate message, that is, tune in into the conversation.GSM utilizes General
through a paging demand. The MS reacts to the page Packet Radio Service (GPRS) for information
ask. The BSC dispenses a movement channel and makes transmissions like perusing the web. The most generally
an impression on the MS to tune to the channel. The MS sent GPRS figures were freely softened up 2011.The
produces a ringing signal and, after the supporter specialists uncovered imperfections in the ordinarily
replies, the discourse association is built up. Handover, utilized GEA/1 and GEA/2 figures and distributed the
if required, happens, as examined in the before case. To open-source "GPRS interpret" programming for sniffing
transmit the discourse over the radio divert in the GPRS systems. They likewise noticed that a few
stipulated time, the MS codes it at the rate of 13 Kbps. transporters don't scramble the information (i.e.,
The BSC transcodes the discourse to 64 Kbps and sends utilizing GEA/0) to recognize the utilization of
it over a land connect or a radio connection to the MSC. movement or conventions they don't care for (e.g.,
The MSC then advances the discourse information to Skype), leaving clients unprotected. GEA/3 appears to
the PSTN. In the turn around heading, the discourse is remain generally difficult to break and is said to be
gotten at 64 Kbps at the BSC and the BSC transcodes it being used on some more advanced systems. In the
to 13 Kbps for radio transmission.GSM underpins 9.6 event that utilized with USIM to forestall associations
Kbps information that can be directed in one TDMA with fake base stations and downsize assaults, clients
timeslot. To supply higher information rates, numerous will be ensured in the medium term, however movement
upgrades were done to the GSM gauges (GSM Phase 2 to 128-piece GEA/4 is still prescribed.
and GSM Phase 2+).
V. Conclusions:
IV. GSM Security
In this paper a short diagram of GSM system is
GSM was expected to be a safe remote framework. It introduced. GSM system is still utilized as a part of
has considered the client validation utilizing a pre- numerous nations the same number of nations of the
shared key and test reaction, and over-the-air world have reported to shutdown GSM administrations
encryption. Be that as it may, GSM is helpless against Page 73
International Journal of Science Engineering and Advance Technology, ISSN 2321-6905
IJSEAT, Vol. 5, Issue 1 January -2017

toward the finish of 2016. GSM system or 2G organize

has worked for over 20 years. At the time, simply
making a telephone approach the move was a curiosity
and everyone grasped the versatile marvel. Be that as it
may, time changes, as innovation developed and cell
phones have turned out to be more quick witted, clients
have actually moved to 3G and 4G systems that offer
quicker speeds and a client experience that we could just
have envisioned around 20 years back. With new
advances like LTE Advancement, the systems
administration is keeping on developing much further.


1. W. Xu and G. Campbell, “A Near Perfect

Stable Random Access Protocol for a Broadcast
Channel,” in IEEE Proc. ICC92,vol. 1, 1992, p.
2. X. W. and G. Campbell, “DQRAP, A
Distributed Queueing Random Access Protocol for
a Broadcast Channel,” in Compute Commun.Mag.,
vol. 23, no. 4, Oct. 1993, p. 370374.
3. Luis Alonso, Ramon Agust´ı, Oriol Sallent, “A
Near-Optimum MAC Protocol Based on the
Distributed Queueing Random Access
Protocol(DQRAP) for a CDMA Mobile
Communication System,” in IEEE J. Sel. Areas
Commun., vol. 18, no. 9, Sep. 2000, pp. 1701–1718.
4. Bego˜na Otal, Luis Alonso, Ramon Agust´ı,
“Design and analysis of a cellular mobile
5. Luis Alonso, Ramon Agust, system based on
DQRAP/CDMA MAC protocol,” in IEEE
Electronic Lett., vol. 38, no. 3, Jan. 2002, pp. 138–
139. Page 74

View publication stats