You are on page 1of 3

Synopsis on GSM: 3G Technology Evolution with its Network and IT Security Perspective

Submitted in partial fulfilment of the requirements for the award of Degree of:

BACHELOR OF TECHNOLOGY IN INFORMATION TECHNOLOGY


Submitted By:

ASHUTOSH N. SAXENA
University Roll No: 06413103110 Branch: B.Tech IT (VIIth Semester) Mobile Number: 9013154972 E-mail id: ashutoshsaxena104@gmail.com

MENTOR:

Mr. Abhay Jain

Synopsis
GSM: 3G Technology Evolution with its Network and IT Security Perspective

I. Abstract
In the Indian industry the mobile telecommunication has revolutionized the technology world. The mobile operators network has continuously transformed from 2G to 2.5G and now to 3G and 3.5G. GSM network has become the defacto standard and has overtaken CDMA. All operators have launched GSM services and those on CDMA have also launched GSM networks for business survival. Our country today feels vulnerable with this public utility which has a potential to disrupt the countrys well-being by misuse and abuse of mobile networks. There is a call from the Indian Government to young Indian professionals to develop the skills in network security and to serve the nation by specializing in this field and to protect the assets and information of India.

II. Introduction
GSM (Global System for Mobile Communications) technology is a standard set developed by the European Telecommunications Standards Institute (ETSI) to describe protocols for second generation (2G) digital cellular networks used by mobile phones. It became the de facto global standard for mobile communications with over 80% market share. The GSM standard was developed as a replacement for first generation (1G) analog cellular networks, and originally described a digital, circuit-switched network optimized for full duplex voice telephony. This was expanded over time to include data communications, first by circuit-switched transport, then packet data transport via GPRS (General Packet Radio Services) and EDGE (Enhanced Data rates for GSM Evolution or EGPRS). Global System for Mobile Communications (GSM) services are a standard collection of applications and features available to mobile phone subscribers all over the world. The GSM standards are defined by the 3GPP collaboration and implemented in hardware and software by equipment manufacturers and mobile phone operators. The common standard makes it possible to use the same phones with different companies' services, or even roam into different countries. GSM is the world's most dominant mobile phone standard. 2G (or 2-G) is short for second-generation wireless telephone technology. 2G systems were significantly more efficient on the spectrum allowing for far greater mobile phone penetration levels; and 2G introduced data services for mobile, starting with SMS text messages. 2G network allows for much greater penetration intensity. 2G technologies enabled the various mobile phone networks to provide the services such as text messages, picture messages and MMS (Multi Media messages). All text messages sent over 2G are digitally encrypted,

allowing for the transfer of data in such a way that only the intended receiver can receive and read it. 2G has been superseded by newer technologies such as 2.5G, 2.75G, 3G, and 4G; however, 2G networks are still used in many parts of the world. 3G, short for third Generation, is the third generation of mobile telecommunications technology. 3G telecommunication networks support services that provide an information transfer rate of at least 200 kbit/s. However, many services advertised as 3G provide higher speed than the minimum technical requirements for a 3G service. Later 3G releases, often denoted 3.5G, also provide mobile broadband access of several Mbit/s to smartphones and mobile modems in laptop computers. 3G finds application in wireless voice telephony, mobile Internet access, fixed wireless Internet access, video calls and mobile TV.

III.

Objectives:
With above scenario in this project we shall take deep dive in the mobile and network technology and shall try to achieve the following: 1. Understand the technical aspects of mobile network in detail by understanding the underlying principles of mobile telephony. 2. Understanding the design aspects of GSM. 3. Try and list the known attacks faced by such a network. 4. Understand the natural evolution of technology from 2G to 3G and how the network design of 3G improves upon 2G and plugs the vulnerabilities inherent in the design and making it more secure by way of better technical design. 5. Finally take a look at 3G networks, its design principles and resulting vulnerabilities, if possible try and find the solution and publish the solutions. Therefore the points stated above shall be taken in consideration while finding a solution to GSM 3G technologies network security.

You might also like