International Journal of Research and Innovations in Science and Technology

♦ Call for Papers   No Publication Charges Join IJRIST in Linkdin

Data and Voice Signal Intelligence Interception Over The GSM Um Interface

Author(s) : Vincent N. Omollo, Silvance Abeka, Solomon Ogara

Volume & Issue : VOLUME 3 / 2016 , ISSUE 2

Page(s) : 6-14
ISSN (Online): 2394-3858
ISSN (Print) : 2394-3866


The Enhanced Data rates for GSM Evolution (EDGE) is a digital mobile phone technology that permits enhanced data communication rates as a backward-compatible annex of the Global System for Mobile communications (GSM). It delivers increased bit-rates per radio channel, which results to a threefold increase in capacity and performance compared with an ordinary GSM/General Packet Radio Service (GPRS) connection. It has found many applications in packet switched communication scenarios, such as internet connections. In a GSM environment, owing to its cellular nature, the communication signals are sent over the air interface. Therefore, it is less secure than in a wired network because it is prone to eavesdroppers equipped with appropriate radio receivers. To address the various security challenges, several security functions were built into GSM to safeguard subscriber privacy. These functions include: authentication of the registered subscribers only; secure data transfer through the use of encryption; subscriber identity protection; making mobile phones inoperable without a subscriber identity module (SIM); disallowing duplicate SIMs on the network; and securely storing the individual subscriber authentication key ( KI). However, as demonstrated in this paper, the EDGE signals can still be intercepted, re-routed or modified over the GSM Um interface.


Encryption, GSM, Security, Signal interception, Um Interface


  1. G. Sai and A. Kakkar, “Generations of Mobile Communication”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.6, No.3, (2016), pp. 320-324.
  2. U. Gawas, “An Overview on Evolution of Mobile Wireless Communication Networks: 1G-6G”, International Journal on Recent and Innovation Trends in Computing and Communication, Vol. 3 No.5, (2015), pp. 3130 – 3133.
  3. M. Toorani and S.Beheshti, “Solutions to the GSM Security Weaknesses”, Proceedings of the Second International Conference on Next Generation Mobile Applications, Services, and Technologies, Vol. 88, (2014), pp. 576-581.
  4. Kamel and E. George, “Secure Model for SMS Exchange over GSM”, I. J. Computer Network and Information Security, Vol.1, (2016), pp. 1-8.
  5. M. Ramadan, D. Guohong, L. Fagen, and X.Chunxiang, “A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems”, MDPI, (2016), pp. 1-17.
  6. D.  Brake, “5G and Next Generation Wireless: Implications for Policy and Competition”,  Information Technology & Innovation Foundation, (2016), pp.1-22.
  7. J. Cichonski,  J. Franklin , and M. Bartock, “Architecture Overview and Security Analysis”, National Institute of Standards and Technology, (2016), pp. 1-49.
  8. E. Donald, and O. Nosa, “Analysing GSM Insecurity”, International Journal of Research and Scientific Innovation, Vol.3, (2016), No. 10, pp. 10-18.
  9. B. Ravishankar, “Authentication and relate threats in 2G/3G/4G  Networks”, Department Of Computer Science, Oxford, (2016), pp. 1-64.
  10. M. Ramadan,  G.Du, F. Li,  C. Xu, “End-to-End Encryption Scheme over GSM System”,  Int. J. Secur. Appl, Vol. 10, (2016), pp. 229–240.
  11. M. Inayat,  M. Siddique, and  A. Asadullah, “ A Survey on the Encryption Algorithms Used in Cell Phone Messages”, International Journal of Emerging Technology and Advanced Engineering, Vol.6, No.2, (2016), pp. 36-39.
  12. Z. Jabr,  S. Taha and I. Aly Saroit, “Seps-Aka: A Secure Evolved Packet System Authentication And Key Agreement Scheme For Lte-A Networks”, Computer Science & Information Technology, (2014), pp. 57–70.