Jump to content

GSM

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 5.125.178.252 (talk) at 11:54, 24 April 2023 (→‎Base-station subsystem: Delivery delete * macro * micro * pico * femto, and * umbrella cells). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

GSM
Industrytelecommunication
FoundedDecember 1991
Successor3G Edit this on Wikidata
Productsdigital cellular networks
Websitewww.gsma.com

The Global System for Mobile Communications (GSM) is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation (2G) digital cellular networks used by mobile devices such as mobile phones and tablets. GSM is also a trade mark owned by the GSM Association.[2] GSM may also refer to the Full Rate voice codec.[3]

It was first implemented in Finland in December 1991.[4] By the mid-2010s, it became a global standard for mobile communications achieving over 90% market share, and operating in over 193 countries and territories.[5]

2G networks developed as a replacement for first generation (1G) analog cellular networks. The GSM standard originally described a digital, circuit-switched network optimized for full duplex voice telephony. This expanded over time to include data communications, first by circuit-switched transport, then by packet data transport via General Packet Radio Service (GPRS), and Enhanced Data Rates for GSM Evolution (EDGE).

Subsequently, the 3GPP developed third-generation (3G) UMTS standards, followed by the fourth-generation (4G) LTE Advanced and the fifth-generation 5G standards, which do not form part of the ETSI GSM standard.

Beginning in the late 2010s, various carriers worldwide started to shut down their GSM networks. Nevertheless, as a result of the network's widespread use, the acronym "GSM" is still used as a generic term for the plethora of <n>G mobile phone technologies evolved from it.

|archiveurl=https://web.archive.org/web/20110519093843/http://gsmworld.com/about-us/history.htm |archivedate=19 May 2011 |accessdate=5 May 2011 |quote=1982 Groupe Speciale Mobile (GSM) is formed by the Confederation of European Posts and Telecommunications (CEPT) to design a pan-European mobile technology. |url-status=dead}}</ref>[6]

In February 1987 Europe produced the first agreed GSM Technical Specification. Ministers from the four big EU countries cemented their political support for GSM with the Bonn Declaration on Global Information Networks in May and the GSM MoU was tabled for signature in September. The MoU drew in mobile operators from across Europe to pledge to invest in new GSM networks to an ambitious common date.

In this short 38-week period the whole of Europe (countries and industries) had been brought behind GSM in a rare unity and speed guided by four public officials: Armin Silberhorn (Germany), Stephen Temple (UK), [[Philippe Du </ref> Optus in Australia completed the shut down of its 2G GSM network on 1 August 2017, part of the Optus GSM network covering Western Australia and the Northern Territory had earlier in the year been shut down in April 2017.[7] Singapore shut down 2G services entirely in April 2017.[8]


Base-station subsystem

GSM cell site antennas in the Deutsches Museum, Munich, Germany

GSM utilizes a cellular network, meaning that cell phones connect to it by searching for cells in the immediate vicinity. There are five different cell sizes in a GSM network:

GSM security

GSM was intended to be a secure wireless system. It has considered the user authentication using a pre-shared key and challenge–response, and over-the-air encryption. However, GSM is vulnerable to different types of attack, each of them aimed at a different part of the network.[9]

The development of UMTS introduced an optional Universal Subscriber Identity Module (USIM), that uses a longer authentication key to give greater security, as well as mutually authenticating the network and the user, whereas GSM only authenticates the user to the network (and not vice versa). The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no non-repudiation.

GSM uses several cryptographic algorithms for security. The A5/1, A5/2, and A5/3 stream ciphers are used for ensuring over-the-air voice privacy. A5/1 was developed first and is a stronger algorithm used within Europe and the United States; A5/2 is weaker and used in other countries. Serious weaknesses have been found in both algorithms: it is possible to break A5/2 in real-time with a ciphertext-only attack, and in January 2007, The Hacker's Choice started the A5/1 cracking project with plans to use FPGAs that allow A5/1 to be broken with a rainbow table attack.[10] The system supports multiple algorithms so operators may replace that cipher with a stronger one.

Since 2000, different efforts have been made in order to crack the A5 encryption algorithms. Both A5/1 and A5/2 algorithms have been broken, and their cryptanalysis has been revealed in the literature. As an example, Karsten Nohl developed a number of rainbow tables (static values which reduce the time needed to carry out an attack) and have found new sources for known plaintext attacks.[11] He said that it is possible to build "a full GSM interceptor...from open-source components" but that they had not done so because of legal concerns.[12] Nohl claimed that he was able to intercept voice and text conversations by impersonating another user to listen to voicemail, make calls, or send text messages using a seven-year-old Motorola cellphone and decryption software available for free online.[13]

GSM uses General Packet Radio Service (GPRS) for data transmissions like browsing the web. The most commonly deployed GPRS ciphers were publicly broken in 2011.[14]

The researchers revealed flaws in the commonly used GEA/1 and GEA/2 (standing for GPRS Encryption Algorithms 1 and 2) ciphers and published the open-source "gprsdecode" software for sniffing GPRS networks. They also noted that some carriers do not encrypt the data (i.e., using GEA/0) in order to detect the use of traffic or protocols they do not like (e.g., Skype), leaving customers unprotected. GEA/3 seems to remain relatively hard to break and is said to be in use on some more modern networks. If used with USIM to prevent connections to fake base stations and downgrade attacks, users will be protected in the medium term, though migration to 128-bit GEA/4 is still recommended.

The first public cryptanalysis of GEA/1 and GEA/2 (also written GEA-1 and GEA-2) was done in 2021. It concluded that although using a 64-bit key, the GEA-1 algorithm actually provides only 40 bits of security, due to a relationship between two parts of the algorithm. The researchers found that this relationship was very unlikely to have happened if it wasn't intentional. This may have been done in order to satisfy European controls on export of cryptographic programs.[15][16][17]

Standards information

The GSM systems and services are described in a set of standards governed by ETSI, where a full list is maintained.[18]

GSM open-source software

Several open-source software projects exist that provide certain GSM features:[19]

Issues with patents and open source

Patents remain a problem for any open-source GSM implementation, because it is not possible for GNU or any other free software distributor to guarantee immunity from all lawsuits by the patent holders against the users. Furthermore, new features are being added to the standard all the time which means they have patent protection for a number of years.[citation needed]

The original GSM implementations from 1991 may now be entirely free of patent encumbrances, however patent freedom is not certain due to the United States' "first to invent" system that was in place until 2012. The "first to invent" system, coupled with "patent term adjustment" can extend the life of a U.S. patent far beyond 20 years from its priority date. It is unclear at this time whether OpenBTS will be able to implement features of that initial specification without limit. As patents subsequently expire, however, those features can be added into the open-source version. As of 2011, there have been no lawsuits against users of OpenBTS over GSM use.[citation needed]

See also

References

  1. ^ Sauter, Martin (21 November 2013). "The GSM Logo: The Mystery of the 4 Dots Solved". Archived from the original on 4 March 2016. Retrieved 23 November 2013. [...] here's what [Yngve Zetterstrom, rapporteur of the Marketing and Planning (MP) group of the MoU (Memorandum of Understanding group, later to become the GSM Association (GSMA)) in 1989] had to say to solve the mystery: '[The dots symbolize] three [clients] in the home network and one roaming client.' There you go, an answer from the prime source!
  2. ^ "GSM BRANDS Trademark of GSM Sales LLC - Registration Number 5523328 - Serial Number 87703883 :: Justia Trademarks". trademarks.justia.com. Retrieved 9 February 2023.
  3. ^ "GSM Audio Codec: Vocoder: AMR, CELP etc .. » Electronics Notes". www.electronics-notes.com. Retrieved 9 February 2023.
  4. ^ Anton A. Huurdeman, The Worldwide History of Telecommunications, John Wiley & Sons, 31 July 2003, page 529
  5. ^ "GSM Global system for Mobile Communications". 4G Americas. Archived from the original on 8 February 2014. Retrieved 22 March 2014.
  6. ^ "Cellular History". etsi.org. European Telecommunications Standards Institute. 2011. Archived from the original on 17 February 2012. Retrieved 5 May 2011. The task was entrusted to a committee known as Groupe Spécial Mobile (GSMTM), aided by a "permanent nucleus" of technical support personnel, based in Paris.
  7. ^ "Optus to complete 2G network turn off". Optus. 1 August 2017. Retrieved 20 November 2020.{{cite web}}: CS1 maint: url-status (link)
  8. ^ "Joint Media Release by IMDA, M1, Singtel & StarHub: 2G services to cease on 1 April 2017". M1. 27 March 2017. Retrieved 22 October 2017.
  9. ^ Solutions to the GSM Security Weaknesses, Proceedings of the 2nd IEEE International Conference on Next Generation Mobile Applications, Services, and Technologies (NGMAST2008), pp.576–581, Cardiff, UK, September 2008, arXiv:1002.3175
  10. ^ Steve. "The A5/1 Cracking Project". Retrieved 3 November 2011 – via Scribd.
  11. ^ Kevin J. O'Brien (28 December 2009). "Cellphone Encryption Code Is Divulged". The New York Times.
  12. ^ "A5/1 Cracking Project". Archived from the original on 25 December 2009. Retrieved 30 December 2009.
  13. ^ Owano, Nancy (27 December 2011). "GSM phones -- call them unsafe, says security expert". Archived from the original on 3 January 2012. Retrieved 27 December 2011. Nohl said that he was able to intercept voice and text conversations by impersonating another user to listen to their voice mails or make calls or send text messages. Even more troubling was that he was able to pull this off using a seven-year-old Motorola cellphone and decryption software available free off the Internet.
  14. ^ "Codebreaker Karsten Nohl: Why Your Phone Is Insecure By Design". Forbes.com. 12 August 2011. Retrieved 13 August 2011.
  15. ^ Lorenzo Franceschi-Bicchierai (12 June 2021). "Bombshell Report Finds Phone Network Encryption Was Deliberately Weakened". www.vice.com.
  16. ^ Christof Beierle; et al. (18 June 2021). "Cryptanalysis of the GPRS EncryptionAlgorithms GEA-1 and GEA-2" (PDF). Annual International Conference on the Theory and Applications of Cryptographic Techniques. Lecture Notes in Computer Science. 12697: 155–183. doi:10.1007/978-3-030-77886-6_6. ISBN 978-3-030-77885-9. S2CID 235452714. Archived (PDF) from the original on 16 June 2021.
  17. ^ Matthew Sparks (17 June 2021). "Flaw in old mobile phone encryption code could be used for snooping". New Scientist.
  18. ^ "GSM UMTS 3GPP Numbering Cross Reference". ETSI. Retrieved 30 December 2009.
  19. ^ Donald, Ene; Favour, Osagie Nosa (October 2016). "Analysing GSM Insecurity". International Journal of Research & Scientific Innovation. 3 (10): 10. ISSN 2321-2705. S2CID 212468467.
  20. ^ "Gsmd – Openmoko". Wiki.openmoko.org. 8 February 2010. Retrieved 22 April 2010.
  21. ^ "The Hacker's Choice Wiki". Archived from the original on 15 August 2010. Retrieved 30 August 2010.
  22. ^ "OsmocomBB". Bb.osmocom.org. Archived from the original on 26 February 2011. Retrieved 22 April 2010.
  23. ^ "YateBTS". Legba Inc. Retrieved 30 October 2014.

Further reading

  • Redl, Siegmund M.; Weber, Matthias K.; Oliphant, Malcolm W (February 1995). An Introduction to GSM. Artech House. ISBN 978-0-89006-785-7.
  • Redl, Siegmund M.; Weber, Matthias K.; Oliphant, Malcolm W (April 1998). GSM and Personal Communications Handbook. Artech House Mobile Communications Library. Artech House. ISBN 978-0-89006-957-8.
  • Hillebrand, Friedhelm, ed. (December 2001). GSM and UMTS, The Creation of Global Mobile Communications. John Wiley & Sons. ISBN 978-0-470-84322-2.
  • Mouly, Michel; Pautet, Marie-Bernardette (June 2002). The GSM System for Mobile Communications. Telecom Publishing. ISBN 978-0-945592-15-0.
  • Salgues, Salgues B. (April 1997). Les télécoms mobiles GSM DCS. Hermes (2nd ed.). Hermes Sciences Publications. ISBN 978-2866016067.