##plugins.themes.bootstrap3.article.main##

Preventing man-in-the-middle (MiTM) attack using Artificial Neural Network refers to an in depth analysis of how calls are made vis-a-viz the structure of the inter-related operations that binds the respective subsystems within the GSM Architecture during calls. Calls in the GSM network is a request from aMobile Station (MS). This request has faced severe attacks due to the network’s access to Internet presence that has made its way into cellular telephony, creating a vulnerable and susceptible network attack such as Man-in-the-middle. This paper proffer solution to Man-in-the-middle attack during GSM calls by using Artificial Neural Network which can be embedded into the Protocol Stack to detect network intrusion and prevent Man-in-the-middle attack to obtain hitch-free local and international calls.

Downloads

Download data is not yet available.

References

  1. Chan, A. S. (2018). A brief history of 1G mobile communication technology. https://blog.xoxzo.com/en/2018/07/24/history-of-1g/.
     Google Scholar
  2. Temple, S. (2010). Inside the Mobile Revolution: a Political History of GSM. http://www.gsmhistory.com/wp-content/uploads/2013/01/Inside-a-Mobile-Revolution-Temple-20101.pdf.
     Google Scholar
  3. Munir, M. W. (2005). Different Generations of Cellular Networks System. https://www.researchgate.net/publication/276319644_Different_Generations_of_Cellular_Networks_System/references.
     Google Scholar
  4. B.I.Bakare, I.A Ekanem and I.O. Allen (June, 2017). Appraisal of Global System for Mobile Communication in Nigeria, American Journal of Engineering Research. [Online]. 6(6), pp. 97-102. Available: http://ajer.org/papers/v6(06)/N060697102.pdf.
     Google Scholar
  5. B.I. Bakare, Sunny Orike and D.I. Oko (January, 2020). Evaluation and Analsis of the deployment of Green Communication Technology in GSM, European Journal of Electrical and Computer Science. [Online]. 4(1), pp. 1-9
     Google Scholar
  6. Mitel. (n.d.). What is Telephony? https://www.mitel.com/features-benefits/telephony.
     Google Scholar
  7. Rouse, M. (n.d.). GSM (Global System for Mobile communication). https://searchmobilecomputing.techtarget.com/definition/GSM.
     Google Scholar
  8. Leitao, M. J. (n.d.). Mobile Communication Systems: GSMGlobal System for Mobile Communication. https://web.fe.up.pt/~mleitao/CMOV/Teoricas/CMOV_GSM.pdf.
     Google Scholar
  9. Tutorialspoint.com (n.d.). GSM - Architecture. Retrieved from https://www.tutorialspoint.com/gsm/gsm_architecture.htm.
     Google Scholar
  10. Tipper, D. (n.d.). Global System for Mobile (GSM) (GSM). http://www.pitt.edu/~dtipper/2700/2700_Slides8_2.pdf.
     Google Scholar
  11. Shaikk, S., Chaudhari, N., & Patil, P. (2016). Modeling of Operation Support System (OSS) for Business Management and Automation. International Journal of Research in Management, ISSN 2249-5908 Available online on http://www.rspublication.com/ijrm/ijrm_index.htm Issue 6, Vol. 5 (September 2016).
     Google Scholar
  12. Toorani, M. and Beheshti, A.A. (2008). Solutions to the GSM Security Weaknesses. Proceedings of the 2nd International Conference on Next Generation Mobile Applications, Services, and Technologies (NGMAST'08), pp.576-581, University of Glamorgan, Cardiff, UK, Sep. 2008 [DOI 10.1109/NGMAST.2008.88].
     Google Scholar
  13. Albert, L. and Indra, W. (2000). Communication Networks. McGraw-Hill Higher Education.
     Google Scholar
  14. Electronicsnotes. (n.d.). GSM Network Architecture. https://www.electronics-notes.com/articles/connectivity/2g-gsm/network-architecture.php.
     Google Scholar
  15. Zhao, W. (1997). Handover Techniques and Network Integration between GSM and Satellite Mobile Communication Systems. https://core.ac.uk/download/pdf/102784.pdf.
     Google Scholar
  16. Yatebts.com. (2019). GSM Functionalities. Retrieved from https://yatebts.com/documentation/concepts/gsm-functionalities/.
     Google Scholar
  17. Gardezi, A. I. (n.d.). Security In Wireless Cellular Networks. Retrieved from https://www.cse.wustl.edu/~jain/cse574-06/ftp/cellular_security/index.html.
     Google Scholar
  18. Alfantookh, A. A. (2006). DoS Attacks Intelligent Detection using Neural Networks. J. King Saud Univ., Vol. 18, Comp. & Info. Sci., pp. 27-45 (A.H. 1426/2006).
     Google Scholar