Mobility and Security Management in The GSM System and Some Proposed Future Improvements
Mobility and Security Management in The GSM System and Some Proposed Future Improvements
Important aspects of mobility and security in the Global System b) MS turned on, idle state: Here, the system can page
for Mobile communications (GSM) system are discussed in this the MS successfully. This is the situation in which
paper. Mobility management functions are broadly categorized the MS is considered attached (IMSI attached). While
into three groups: a) mobile turned on, b) mobile turned off,
and c) mobile in conversation. The paper first outlines the mo- on the move, the MS has to check that it is al-
bile synchronization sequence followed by its mobility functions: ways connected to the best received broadcast control
mobile identification, authentication, international mobile station channel (BCCH). This procedure is called roaming.
identity attach/detach, and its location update. The important While on the move, the mobile must also inform the
role of security in the GSM system is fully explored, including
authentication, encryption, and positive identification of mobile
system about changes of LA, which is called location
equipment before the user is provided with the service. The future updating.
of mobility management, with respect to subscriber identification c) MS busy: The radio network has traffic channels
module roaming, intersystem roaming, advancement in mobile
allocated for the data flow to/from the MS. While
service, and its impact on data base requirements, is covered in
subsequent paragraphs. moving, the MS must also be able to change to
a new traffic channel as the signal on the traffic
Keywords— Encryption, GSM signaling protocols, intersystem
roaming, mobile temporary ID, mobility management, security channel drops below an unacceptable level, which is
management, SIM roaming, subscriber, subscriber identity mod- called handover. In order to decide whether to hand
ule, TMSI attach and detach, white, black, and gray equipment over, the mobile switching center (MSC) base station
list.
controller (BSC in some cases) interprets information
received from the MS and base transceiver station
I. INTRODUCTION (BTS) known as locating.
Mobility management (MM) entails the Global System
In view of the above, we shall discuss the complete mobility
for Mobile communications (GSM) system’s keeping track
of the mobile while it is on the move. Basically, we have aspect of the system, which revolves around these three
two different situations: mobile idle and mobile busy. These states.
two cases lead to all the relevant cases we need to consider: Another important aspect of the GSM system is security.
a) mobile station (MS) is turned off, b) MS is turned on but At an early stage in the development of the Pan-European
is in the idle state, and c) MS is in the conversational mode. mobile radio system GSM, it was apparent that the weakest
part of the system was the radio path, as this could be
a) MS turned off: In this case, the mobile cannot be easily eavesdropped upon with radio equipment. There
reached by the network because it does not answer was also a need to authenticate users of the system so
a paging message. It does not inform the system that the resources were not misused by nonsubscribers.
about possible changes of location area (LA), as it It is easy to see that the public land mobile network
is simply inoperative. In this case, the MS is simply (PLMN) needs a higher level of protection than traditional
considered detached from the system [international telecommunications networks. Therefore, to protect the
mobile station identity (IMSI) detached]. system against the two cases mentioned above, the GSM
system has been reinforced by the following four security
techniques [1]–[3]:
Manuscript received June 13, 1997. • anonymity: mobile temporary identification (ID)
The authors are with Hughes Network Systems, Germantown, MD (TMSI);
20876 USA (e-mail: [email protected]; [email protected]).
Publisher Item Identifier S 0018-9219(98)04245-5. • authentication;
• encryption; interfaces use the SS7 message transfer part (MTP) level
• user’s subscriber identity module (SIM) module and 1 with channel rates of 64 kb/s, where the medium can be
mobile equipment ID. coaxial cable, balanced wire pairs, or fiber-optic cable.
Among these, we shall elaborate on three important tech- The data link layer uses integrated services digital net-
niques: authentication, encryption, and mobile equipment work (ISDN) link access protocol D (LAP-D) on the
ID. -Interface and a version called LAP-D on radio links
To make the discussion complete, the last section of the to MS’s. LAP-D uses the GSM RF interface framing and
paper will deal with future improvements one should pursue synchronization scheme rather than that of ISDN. All other
in these areas. The following are candidates for discussion: interfaces use the SS7 MTP level 2 protocol for the data link
improvement in SIM roaming, intersystem roaming, future layer. The air and -Interfaces have no network layer.
service, and data base requirements. Before we discuss the All other interfaces within GSM use both MTP level 3 and
mobility aspect of the user, let us briefly introduce the the SS7 signaling connection control part (SCCP). MTP
GSM protocols and how the mobile synchronizes within 3 provides routing of general connectionless messages to
the GSM system. Both factors are intimately tied to the the various network nodes, while SCCP routes connection-
mobility aspect of GSM users. oriented-messages, specific to a particular user transaction,
all the way to the destination terminals. No GSM interfaces
II. GSM SIGNALING PROTOCOLS have need for use of the SS7 transport, session, and
GSM uses the International Consultative Committee on presentation layers. The rest of the interfaces are at the
Telegraphy and Telephony Signaling System 7 (SS7) proto- application layer 3. Interfaces to the fixed networks [public
cols for its signaling [1], [4]–[5]. Fig. 1 shows key elements switched telephone network, ISDN] use their own standard
of a GSM system as vertical bars, with the spaces between telephone user part and ISDN user part protocols. Once a
them representing interfaces among different subsystems. radio resource (RR) connection has been established, there
The protocol is based on open system interconnection (OSI) exists a physical point-to-point bidirectional connection
layers, which are shown at the left. between two RR entities. At one instant of time, there will
At the physical layer, the air interface uses radio fre- not be more than one RR connection available between a
quency (RF) radio transmission. The -Interface be- mobile station and the MSC. One RR connection may be
tween BTS and BSC uses 64 kb/s channels on wire cable, used to support several MM connections.
optical fiber, or microwave links based on the best avail- The SS7 application layer has several sublayers specific
ability, designer’s choice, and ease of installation. All other to the GSM system. The radio interface layer 3 (RIL3)
MEHROTRA AND GOLDING: MOBILITY AND SECURITY IN THE GSM SYSTEM 1481
Fig. 2. MAP protocol connections [3, p. 297].
RR management protocols establish and release connections network parts is handled by the various mobile application
between an MS and various BSC’s for the duration of a call part (MAP) protocols, details of which are shown in Fig. 2
despite user movement. The radio subsystem management [2], [5]–[7]. These protocols are designated as MAP/B
protocol provides RR functions between the BTS and through MAP/H. For example, signaling between MSC and
BSC. The direct transfer application part (DTAP) protocols equipment ID register (EIR) is through MAP/F. Although
provide RR messages between the MS and MSC. The base these messages are not directly related for completing the
station subsystem management part (BSSMAP) protocols actual voice or data transmission path, they are essential for
provide RR messages between the BSC and MSC. The the proper establishment of the traffic channel, as we shall
distinction between DTAP and BSSMAP is provided by see in the mobility discussion.
a small “distribution” protocol below them.
The RIL3 MM protocols deal with MS location man- III. MOBILE INITIALIZATION
agement (cell assignment, location updating, paging for
Prior to establishing any communication links to other
incoming calls, etc.) and security aspects of the system parties, the MS must first acquire synchronization with the
(authentication, user identity protection, etc.). This pro- GSM system. This process begins after the MS is turned
tocol is the main interest of this paper. The RIL3 call on in a PLMN. The first step of the process is for the
control management protocols deal with call control (CC), MS to search for and acquire a frequency control channel
supplementary services, and short messages. All mobility (FCCH) burst on some common control frequency channel.
management and call control functions reside in the MSC. The mobile will scan all or part of 124 RF channels and
Thus, all CC and MM messages are interpreted neither obtain the average signal strength of each channel. During
by the BSC nor by the BTS. They are transparently con- the scanning process, several readings of the RF level have
veyed to its corresponding entity within the MSC. Before to be taken so that the mobile gets an accurate estimate
exchanging messages between MM entities of the mobile of the channel power. Thus, the scanning may take several
station and the network (MSC), an RR connection needs seconds.
to be established. For each of the 124 channels, starting with the one of
The transaction capabilities application part provides highest signal strength level, the mobile searches for the
correlation between individual operations and structured FCCH. This is the first step of the process known as
exchanges in building up a complete transaction. The frequency synchronization. The frequency correction burst
transaction sublayer manages transactions on an end-to-end is unique and easily recognizable. The FCCH burst is a
basis. The component sublayer correlates commands and re- long sine wave that is offset by 67.7 kHz from the carrier
sponses within a dialog. Noncall-related signaling between frequency. The cell transmits all zeros for the frequency
correction signal. The mobile has to take out this offset the internally stored synchronizing pattern is correlated,
before an estimate of the carrier frequency can be made. and at the peak of correlation, the channel is considered
This process of frequency synchronization is shown as the to be synchronized. If synchronization does not occur, the
first step in Fig. 3 [3]. If no frequency burst is detected, process of frequency synchronization with the next highest
then the mobile can go to a channel with the next highest channel in the list may start. If the synchronization is
signal strength level. successful, the mobile will read the time division multiple
After the frequency correction burst is detected, the MS access (TDMA) frame number and the base station identity
will try to synchronize with the time synchronization burst code. Assuming that the mobile is in sync and decodes
synchronization channel (SCH). The SCH always occurs the information on a BCCH, the BCCH information will
in the next frame in the same time slot as the FCCH. contain such items as adjacent cell list, BCCH location
This is eight burst periods later than the FCCH. The of adjacent cells, minimum received signal strength, and
SCH contains precise timing information on the timeslot location area identity. The BCCH information also provides
boundaries to permit refining the received slot timing. The beacon frequencies of surrounding BTS cells, etc. All
SCH message also contains the current frame number to BCCH transmissions are at a standard power level, which
which the MS synchronizes. This time synchronization is permits the MS to compare received power from its own
generally carried out in two steps: coarse and fine. Here, BTS as well as from adjoining BTS’s. Therefore, when the
MEHROTRA AND GOLDING: MOBILITY AND SECURITY IN THE GSM SYSTEM 1483
Fig. 4. Mobile identification process.
BCCH information is correctly decoded, the mobile follows the VLR must get its file from the home location register
one of the two paths discussed below. (HLR) identified in the IMSI. To do this, the VLR sends
the HLR a MAP/D Update Location message. Assuming
a) If the BCCH information includes the present BCCH that the IMSI is in fact registered in the HLR, the HLR
channel, then the mobile will simply stay on the responds with a MAP/D Update Location Result message,
channel. followed by a MAP/D Insert Subscriber Data message
b) If the current channel is not in BCCH information containing other pertinent data needed by the VLR. The
list, or the received signal strength level is below the VLR acknowledges the data transfer with a MAP/D Insert
desired level, the mobile will continue searching for Subscriber Data result message to the HLR.
the next control channel.
B. Authentication
After the mobile has successfully synchronized to a valid
BCCH, the mobile is now ready to register, receive paging, The authentication process may be run at each and every
or originate an outgoing call. location update and at the initiation of every new service
request. The process starts at VLR. If the VLR determines
IV. MOBILITY FUNCTIONS that authentication is required, it sends a MAP/D Send
Parameters message to the HLR, which relays this message
Among all functions that the mobile is at liberty to to the authentication center (AuC). The AuC then draws a
perform, we shall consider only those connected with the value for the random challenge random number (RAND)
MM layer or the mobility aspect of the GSM system. Those and applies algorithms A3 and A8 to generate the signed
functions are [2]–[3], [5]–[8]: response (SRES) and the cipher key. The complete process
• mobile identification; of authentication is discussed in section 4.0. The AuC then
• authentication; returns the triplet (RAND, signed response, ) value to
• IMSI attach and detach; the VLR in a MAP/D Send Parameters Result message.
• location update. Actually, the AuC normally calculates and sends a few such
triplets at a time for each requesting MS, so the VLR only
A. Identification Procedure has to request parameters from the AuC if it has no stored
The identification procedure is used to identify the unused triplets for the particular MS [10]–[12].
MS/SIM by its IMSI if the visitor location register (VLR) The VLR then sends a MAP/B Authenticate message to
does not recognize the TMSI sent by the MS. This lack of the MSC, which in turn sends an RIL3-MM Authentication
recognition can be the result of the mobile user’s changing Request message containing RAND to the MS over the air.
the MSC/VLR area from the last time he accessed the The MS calculates the required signed response challenge
system or can be due to some other reason. If identification (SRESc) using the algorithm A3 and authentication key
is required, the VLR first sends a MAP/B Provide IMSI stored in the SIM. The SRESc is returned to the
message to the MSC, as shown in Fig. 4 [3]. As a result of MSC in a RIL3-MM Authentication Response message.
this message, MSC sends an RIL3-MM Identity Request The MSC compares the SRESc with the signed response,
message to the MS. The MS responds by returning an RIL3- and if they agree, it sends the MS an RIL3-MM Service
MM Identity Response message containing its IMSI to the Accept message. The MSC also sends the VLR a MAP/B
MSC. The MSC then sends the MAP/B IMSI acknowledge Authentication Complete message. The protocol for the
to the VLR. If the IMSI is currently not in the VLR, then authentication process is shown in Fig. 5.
MEHROTRA AND GOLDING: MOBILITY AND SECURITY IN THE GSM SYSTEM 1485
Fig. 6. IMSI attach.
the number of cells where the mobile has to be paged, and the new VLR records relevant parameters needed to
thereby reducing the load on the system. process calls.
The MS location is determined from the cell identification The message sequence is shown in Fig. 9. The MS is
of the strongest BCCH signal received by the MS. The switched on in a location area different from the previous
MS regularly measures the received signal strengths of the one, or it moves across boundaries of a location area in
BCCH’s for all surrounding cells at least once every six sec- the idle state RIL3-Location Updating Request message,
onds (superframe cycle). It stores at least the six strongest which is sent from the MS to the BSS and is relayed to
BCCH measurements and their identifications in the SIM, the MSC. The MSC in turn alerts the VLR by a MAP/B
which can subsequently be used for handover decisions. Update Location Area message. The message contains the
The MS also transmits the location area of the strongest old location area that the mobile had in its storage along
cell to the MSC during location updating. The location area with its TMSI (designated here as LAI , TMSI ). The
may be a single cell or a contiguous group of cells under process of authentication, ciphering, and TMSI reallocation
the control of one BSC, as shown in Fig. 8 [3]–[4]. can now start. After completion of the ciphering process,
A cellular system requires that the user location of all the message is sent from the VLR to the MSC for re-
active mobile units be known at all times as they roam. As allocation of the TMSI if desired (Forward New TMSI).
seen in Fig. 8, each cell is served by one BTS. Each location A TMSI Reallocation Complete message is sent from the
area is divided into many cells, which may be served by one MS to the BSS after reallocation of new TMSI. The
or more BSC’s. The VLR may serve one or more location HLR sends a MAP/D Location Update Result message
areas. An inactive mobile is ignored by the system. As to the VLR, which in turn sends a MAP/B Location
soon as the mobile switches its power, it retrieves its stored Update Acknowledge message to the MSC. This message is
location-area identity and compares it with the one being subsequently forwarded to the MS as a RIL3-RR Location
broadcast within its present cell. If they match, the mobile Update Accepted message. In the event that the HLR rejects
does not have to do anything, as the subscriber is already the request, the VLR RIL3-MM Location Update Reject
correctly located; however, if it does not match, the mobile message is sent from the MSC to the MS (shown dotted).
identifies itself by transmitting its IMSI together with the Either the accept or the reject message is initiated from
identities of the previous and present location areas. The MSC. Location area updating may not be accepted due to
BSS transmits this information to the associated VLR. the following reasons:
Each time an MS moves into a new location area, the • unknown subscriber;
corresponding VLR is informed. If both the present and • unknown location area;
previous areas are served by the same VLR, the mobile
station is given a new TMSI, and its location is updated in • roaming not allowed;
the VLR memory. On the other hand, if the mobile enters • system failure.
a new VLR area, its HLR, the old VLR, and the new VLR After the location update accept or reject message, the MSC
are informed. The old VLR erases the data for the mobile, asks the BSS to release the allocated dedicated resource
MEHROTRA AND GOLDING: MOBILITY AND SECURITY IN THE GSM SYSTEM 1487
(a)
(b)
Fig. 9. Location update process.
by sending a BSSMAP Clear Command message to the was an important issue that needed to be addressed. It was
BSS, which then forwards it to the MS. A BSSMAP Clear apparent that the weakest part of the system was the radio
Complete message follows from the BSS to the MSC, path, as this could be easily eavesdropped upon with radio
which completes the location updating process. equipment. There was also a need to authenticate users
In the next section, we shall discuss the most important
of the system so that the resources are not misused by
security aspects of the GSM system.
nonsubscribers [3], [10]–[12].
V. SECURITY ASPECTS OF THE GSM SYSTEM Therefore, the objective of this section is to outline
At an early stage in the development of the Pan European clearly the most important security features adapted in
mobile radio system GSM, it was realized that security GSM, including: a) authentication; b) ciphering; and c) an
MEHROTRA AND GOLDING: MOBILITY AND SECURITY IN THE GSM SYSTEM 1489
Fig. 11. Generation of Kc , signed response, and RAND at the AuC [3, p. 157].
complexity to the MS. The cipher key is obtained as a side algorithm is used for protection of all transmitted data in
product of the authentication procedure and differs from call dedicated mode, whether it is user information (speech or
to call. The GSM is designed so that a single encryption data), user-related signaling (e.g., the messages carrying
MEHROTRA AND GOLDING: MOBILITY AND SECURITY IN THE GSM SYSTEM 1491
Fig. 13. Sequential steps for encryption and decryption process [3, p. 160].
not to carry a privately owned handset from place to place. enable the mobile subscriber to have the necessary data for
Wherever the user goes, he can rent a cellular telephone, all cellular standards on one SIM card, enabling a mobile
and it will work with the user’s SIM card. subscriber to choose different systems based on personal
In this case, the SIM card will have data according to choice and the availability of the system. This multisystem
several standards. For example, such a dual-mode SIM SIM card has many advantages.
card can operate on the GSM system when inserted into a • It allows for use of already existing terminals.
GSM terminal, i.e., a GSM terminal would access the GSM
directory on the SIM. Similarly, a packet data terminal — No new terminal development is required for end
would access the packet data directory on the SIM when the users roaming among different standards.
SIM is inserted into a packet data terminal. In the future,
• The use of such a SIM card would enable the mobile
this concept can be expanded, and one SIM card can work subscriber to have the necessary data for all cellular
on many standards. standards on one SIM card.
This solution has many advantages. First, it allows for the
use of already existing terminals (thus not requiring new — This enables a mobile subscriber to choose dif-
terminals to be developed) for end users to roam among ferent systems based on personal choice and the
different standards. Second, the use of such a SIM card can availability of the system.
Fig. 16 shows such a SIM card working on systems A and be interconnected using commonly agreed upon signaling
B [3], [15]–[18]. procedures. One standard is GSM, which supports inter-
national roaming. Other examples include the Advanced
B. Intersystem Roaming Mobile Phone System (AMPS) standard, which supports
roaming within North America today, and packet data
Currently, a number of cellular standards exist, each
of them supporting seamless roaming and call delivery terminals, which support roaming within Japan. In most
within each standard. These standards include air interface of the above-mentioned cellular standards, the MAP is the
procedures, whereby an MS can access a visited network in signaling protocol that handles the roaming signaling in
the same way as it would access its home network. Network the respective network. For a standard to provide roaming,
interfaces allow networks run by different operators to it is equally important that the standard include a fully
MEHROTRA AND GOLDING: MOBILITY AND SECURITY IN THE GSM SYSTEM 1493
Fig. 18. Network architecture for roaming from packet data to
GSM [3, p. 386].
terminals (multimode terminals will allow a subscriber to or a few countries). The telecom operator to whom I am
access different systems) as shown in Fig. 19 [18]–[20]. connected may now contact a location agency (LA). The
This terminal will allow a mobile to have worldwide service LA will search a data base to see what it knows about
just by having a single multimode terminal. you. Based on knowledge of your habits and any recent
calls to or from you, the search may then proceed by one
C. Future Mobile Service and Data Base Requirements or more of the following ways. You are working late: try
As discussed above, future universal mobile telecommu- your office. Ask all personal communications network and
nications service (UMTS) will consist of a wide variety cellular operators within the country, “Can you connect to
of interconnected networks and facilities. For mobile origi- X, and if so, what is the charge?” Ask the local paging
nated transactions, let us assume that a terminal can access operators to page you, but suppose the LA data base knows
the base station, which responds to a request for service its last contact with you was an hour before from XYZ
and can then proceed to negotiate conditions and price. hotel in New York. A call is made to your personal number
Because payment can be by electronic cash over the air, a via the hotel switchboard. No response is obtained from
user does not have to subscribe to or belong to the network either your room extension or the hotel’s cordless telephone
being used. The base station or the network to which it system. Therefore, a New York radio-paging operator is
is attached will have sufficient intelligence to carry out an asked to page you. A response comes back from your
electronic cash or credit transaction. This is likely to be a pocket phone.
commonplace function in the near future for many types of The LA computer will then calculate the cost of a
remote shopping. Because cash is transferred electronically, call using its knowledge of networks and organizations to
the subscriber does not have to belong to the specific determine the lowest cost options and then call me back
network from which he wants the service. We then have and offer to connect me to you at a cost of $2 per minute
the problem of locating the mobile terminal and establishing for voice or $5 per megabyte of data transmission. The
the connection via one or more competing networks. The associated data base requirements, based on the complex
following example is provided to show how the mobile can problem we have just shown, will now be discussed.
be located potentially in a UMTS/future public land mobile
telephone system. D. Data Base Requirements
Consider the following example. There is an urgent To locate an individual, a comprehensive data base must
need to contact you: I call your personal number. It is contain all relevant information for the user. The data
routed to your home because, after 6 p.m., you are most base might also keep success statistics for some or all
often at home. The phone in your home rings. After five of the “usual places” for an individual. For instance, it
seconds with no response, I am asked if I wish to pay could generate and keep hour-by-hour probabilities. Other
for a search or to be connected to an answering machine information in the data base might include which services
or voice mail service. Because I need to speak to you the user subscribes to or authorizes to use, etc. The usual
urgently, I ask for a “grade I search” (assume grade I is information about the subscriber, which has to be stored in
a worldwide search, no expense spared, costs up to my the data base, is shown in Table 1 [20]–[23]. It should be
credit limit; lesser grades possible can be activated also noted that possibly there will be many LA’s maintaining
with a limitation of an area search, such as one country the data base. Each individual agency will only have to
MEHROTRA AND GOLDING: MOBILITY AND SECURITY IN THE GSM SYSTEM 1495
Table 1 Location Agency Data Base Entries
the correct brand of transceivers. True mobility for the user
can be achieved only by multiple entries on the SIM card,
by design of multimode terminals, and by the availability
of fast and large data bases.
REFERENCES
MEHROTRA AND GOLDING: MOBILITY AND SECURITY IN THE GSM SYSTEM 1497