Preventing Man-in-The-Middle (MiTM) Attack of GSM Calls
##plugins.themes.bootstrap3.article.main##
Preventing man-in-the-middle (MiTM) attack using Artificial Neural Network refers to an in depth analysis of how calls are made vis-a-viz the structure of the inter-related operations that binds the respective subsystems within the GSM Architecture during calls. Calls in the GSM network is a request from aMobile Station (MS). This request has faced severe attacks due to the network’s access to Internet presence that has made its way into cellular telephony, creating a vulnerable and susceptible network attack such as Man-in-the-middle. This paper proffer solution to Man-in-the-middle attack during GSM calls by using Artificial Neural Network which can be embedded into the Protocol Stack to detect network intrusion and prevent Man-in-the-middle attack to obtain hitch-free local and international calls.
Downloads
References
-
Chan, A. S. (2018). A brief history of 1G mobile communication technology. https://blog.xoxzo.com/en/2018/07/24/history-of-1g/.
Google Scholar
1
-
Temple, S. (2010). Inside the Mobile Revolution: a Political History of GSM. http://www.gsmhistory.com/wp-content/uploads/2013/01/Inside-a-Mobile-Revolution-Temple-20101.pdf.
Google Scholar
2
-
Munir, M. W. (2005). Different Generations of Cellular Networks System. https://www.researchgate.net/publication/276319644_Different_Generations_of_Cellular_Networks_System/references.
Google Scholar
3
-
B.I.Bakare, I.A Ekanem and I.O. Allen (June, 2017). Appraisal of Global System for Mobile Communication in Nigeria, American Journal of Engineering Research. [Online]. 6(6), pp. 97-102. Available: http://ajer.org/papers/v6(06)/N060697102.pdf.
Google Scholar
4
-
B.I. Bakare, Sunny Orike and D.I. Oko (January, 2020). Evaluation and Analsis of the deployment of Green Communication Technology in GSM, European Journal of Electrical and Computer Science. [Online]. 4(1), pp. 1-9
Google Scholar
5
-
Mitel. (n.d.). What is Telephony? https://www.mitel.com/features-benefits/telephony.
Google Scholar
6
-
Rouse, M. (n.d.). GSM (Global System for Mobile communication). https://searchmobilecomputing.techtarget.com/definition/GSM.
Google Scholar
7
-
Leitao, M. J. (n.d.). Mobile Communication Systems: GSMGlobal System for Mobile Communication. https://web.fe.up.pt/~mleitao/CMOV/Teoricas/CMOV_GSM.pdf.
Google Scholar
8
-
Tutorialspoint.com (n.d.). GSM - Architecture. Retrieved from https://www.tutorialspoint.com/gsm/gsm_architecture.htm.
Google Scholar
9
-
Tipper, D. (n.d.). Global System for Mobile (GSM) (GSM). http://www.pitt.edu/~dtipper/2700/2700_Slides8_2.pdf.
Google Scholar
10
-
Shaikk, S., Chaudhari, N., & Patil, P. (2016). Modeling of Operation Support System (OSS) for Business Management and Automation. International Journal of Research in Management, ISSN 2249-5908 Available online on http://www.rspublication.com/ijrm/ijrm_index.htm Issue 6, Vol. 5 (September 2016).
Google Scholar
11
-
Toorani, M. and Beheshti, A.A. (2008). Solutions to the GSM Security Weaknesses. Proceedings of the 2nd International Conference on Next Generation Mobile Applications, Services, and Technologies (NGMAST'08), pp.576-581, University of Glamorgan, Cardiff, UK, Sep. 2008 [DOI 10.1109/NGMAST.2008.88].
Google Scholar
12
-
Albert, L. and Indra, W. (2000). Communication Networks. McGraw-Hill Higher Education.
Google Scholar
13
-
Electronicsnotes. (n.d.). GSM Network Architecture. https://www.electronics-notes.com/articles/connectivity/2g-gsm/network-architecture.php.
Google Scholar
14
-
Zhao, W. (1997). Handover Techniques and Network Integration between GSM and Satellite Mobile Communication Systems. https://core.ac.uk/download/pdf/102784.pdf.
Google Scholar
15
-
Yatebts.com. (2019). GSM Functionalities. Retrieved from https://yatebts.com/documentation/concepts/gsm-functionalities/.
Google Scholar
16
-
Gardezi, A. I. (n.d.). Security In Wireless Cellular Networks. Retrieved from https://www.cse.wustl.edu/~jain/cse574-06/ftp/cellular_security/index.html.
Google Scholar
17
-
Alfantookh, A. A. (2006). DoS Attacks Intelligent Detection using Neural Networks. J. King Saud Univ., Vol. 18, Comp. & Info. Sci., pp. 27-45 (A.H. 1426/2006).
Google Scholar
18
Most read articles by the same author(s)
-
B. I. Bakare,
J. C. Ozogbuda,
Measurement and Analysis of Electromagnetic Field Strength in Port Harcourt and its Environs Due to Treasure FM Radio Transmitter , European Journal of Electrical Engineering and Computer Science: Vol. 2 No. 4 (2018) -
B. I. Bakare,
T. C. Oguichen,
S. Orike,
An Improved Microcontroller Based Automated Home Using GSM Phone , European Journal of Electrical Engineering and Computer Science: Vol. 4 No. 4 (2020) -
B. I. Bakare,
K. J. Biebuma,
Sunny Orike,
Analysis of Signal Attenuation in Digital Terrestrial Television (DTTV) Broadcasting , European Journal of Electrical Engineering and Computer Science: Vol. 4 No. 4 (2020) -
B. I. Bakare,
V. E. Idigo,
S. U. Nnebe,
Interference Management for the Coexistence of DTTV and LTE Systems within the Proposed Digital Dividend Band in Nigeria , European Journal of Electrical Engineering and Computer Science: Vol. 5 No. 6 (2021) -
B. I. Bakare,
A. Umoru,
S. Orike,
Improved Alcohol Level Sensing Device that Transmit Offender’s Data to a Central Server through Short Messaging Services (SMS) , European Journal of Electrical Engineering and Computer Science: Vol. 4 No. 5 (2020)