Skip to content
Scan a barcode
Scan
Added to your cart
Paperback Development and Implementation of secure GSM algorithm for Mobile Banking: Telecommunication Security Book

ISBN: 3656326142

ISBN13: 9783656326144

Development and Implementation of secure GSM algorithm for Mobile Banking: Telecommunication Security

Master's Thesis from the year 2011 in the subject Computer Science - IT-Security, grade: MERIT, ( Middlesex University in London ), course: Telecommunication Engineering, language: English, abstract: GSM systems are vulnerable to an unauthorized access and eaves droppings when compared with the traditional fixed wired networks due to the mobility of its users. The main idea of this project is to develop an application device to secure mobile banking over unsecure GSM network. It is important to mention here that, mobile banking is a term used for performing balance checks, account transactions, payments, credit applications and many other online applications. But unfortunately, the security architecture for cellular network is not entirely secure. As a matter of fact, GSM network infrastructure is proved to be insecure and many possible attacks have well documented in the literature. Security was never considered in the initial stages therefore sending protective banking information across an open mobile phone network remains insecure. Consequently, this project focuses entirely on the developing and designing security techniques to asses some security issues within mobile banking through cellular phone network (GSM). The main aim of this project was to investigate and examine the following: 1. Security issues in each level of the mobile network architecture. 2. Messages and signals exchanged between user's cellular phone and mobile network at each level. 3. The overall security architecture of GSM flaws. 4. Some existing security measures for mobile transactions. 5. The current security within SMS banking and GPRS banking. Finally, two folded simulation in MATLABT were performed using OFDM which is a broadband multicarrier modulation method that provides a high performance operation to transmitted and received data or information. In other words, it is the most customary single that uses carrier modulation that gives high speed function in microwave frequency

Recommended

Format: Paperback

Condition: New

$14.13
50 Available
Ships within 2-3 days

You Might Also Enjoy

System Design Interview - An insider's guide
System Design Interview - An insider's guide
Alex Xu

from: $33.59

HTML and CSS: Design and Build Websites
HTML and CSS: Design and Build Websites
Jon Duckett

from: $6.09

Mastering Monero: The future of private transactions
Mastering Monero: The future of private transactions
SerHack

from: $19.99

How to Think Like a Manager for the CISSP Exam
How to Think Like a Manager for the CISSP Exam
Luke Ahmed

from: $27.48

Access for Dummies
Access for Dummies
Laurie A Ulrich, Ken Cook

from: $12.89

A Seniors Guide to the iPhone SE (3rd Generation): Getting Started with the the 2022 iPhone SE
A Seniors Guide to the iPhone SE (3rd Generation): Getting Started with the the 2022 iPhone SE
Scott La Counte

from: $19.80

Teach Yourself Visually iPhone 14
Teach Yourself Visually iPhone 14
Guy Hart-Davis

from: $21.39

iPhone 12 User Guide for Seniors: Easily Master the Latest Version of Your iPhone Thanks to Step-by-Step Tutorials, Large Texts, and Illustrations. You Won’t Feel in Denial Anymore!
iPhone 12 User Guide for Seniors: Easily Master the Latest Version of Your iPhone Thanks to Step-by-Step Tutorials, Large Texts, and Illustrations. You Won’t Feel in Denial Anymore!
Brandon Ballard

from: $20.69

Windows 10 for Seniors for Dummies
Windows 10 for Seniors for Dummies
Peter Weverka

from: $5.49

The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes
The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes
Marlon Buchanan

from: $15.74

Html5: Learn Html and Css With a Complete Tutorial Guide
Html5: Learn Html and Css With a Complete Tutorial Guide
Shawn Catlett

from: $16.35

FreeCAD 0.20 Learn by doing
FreeCAD 0.20 Learn by doing
Tutorial Books

from: $25.21

Getting Started With Ubuntu OS: A Ridiculously Simple Guide to the Linux Open Source Operating System
Getting Started With Ubuntu OS: A Ridiculously Simple Guide to the Linux Open Source Operating System
Lewis Richards, NOW Series, Scott La Counte

from: $10.48

Power Pivot and Power BI: The Excel User's Guide to DAX, Power Query, Power BI Power Pivot in Excel 2010-2016
Power Pivot and Power BI: The Excel User's Guide to DAX, Power Query, Power BI Power Pivot in Excel 2010-2016
Rob Collie, Avichal Singh

from: $22.62

Cybersecurity First Principles: A Reboot of Strategy and Tactics
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard

from: $24.00

Data Structures and Algorithms in Python
Data Structures and Algorithms in Python
Robert Method Karamagi

from: $20.00

Vintage Laptop Computers: First Decade: 1980-89
Vintage Laptop Computers: First Decade: 1980-89
James E. Wilson

from: $14.54

A Hacker's Mind
A Hacker's Mind

Out of Stock

Related Subjects

Math Mathematics Science & Math

Customer Reviews

0 customer rating | 0 review
There are currently no reviews. Be the first to review this work.
Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured