Volume 17, Issue 2, December 2012

An Approach for Implementing Security between Base Stations in Cellular Communication System [Full Text]

Nusrat Sharmin and Farhana Haider

Abstract—According to Cellular Communication System cellular wireless networks are more vulnerable to unauthorized access and eavesdropping. The existing security algorithms ensure the security of voice signals between the mobile station and base station and authentication of users while the transmission of the voice signals in between base stations are not secured that means the traffic is transitted in plain text after base stations. This paper concentrates on the secured transmission of voice signals in cellular communication system. Vulnerabilities of the current GSM architecture are ensured and proposed a security mechanism using private and public key cryptography. A comparative analysis is given at the end of the paper by considering factors like cost, efficiency and performance in comparison with the existing security techniques