FEATURES OF DATA SECURITY IN THE GSM MOBILE CHANNEL
Abstract
The article analyzes the mobile communication of the GSM standard, in particular, considers the functional structure and interfaces of interaction between the structural elements of the cellular network. To understand the principle of communication according to the GSM standard, a block diagram of the Mobile Switching Center (MSC), base station equipment (BSS), control and service center (MCC), mobile stations (MS). The main algorithms for ensuring the confidentiality and security of mobile subscribers' data are considered, as the GSM channel has its methods of protection, as well as vulnerabilities. In particular, the following dangerous types of attacks to which cellular network subscribers are sensitive have been identified: sniffing; leakage of personal data; leakage of location data; spoofing; remote SIM card capture, execution of arbitrary code (RCE); denial of service (DoS). It is established that the necessary function of the mobile network is the identification of subscribers, which is performed by IMSI, which is recorded in the SIM-card of the subscriber and the HLR of the operator. To protect against spoofing, the network authenticates the subscriber before starting its service. In the case of authentication of the subscriber, both the subscriber and the network operator are protected from the effects of fraudulent access. In addition, the user must be protected from eavesdropping. This is achieved by encrypting the data transmitted over the radio interface.