GSM AUTHINTICATION,LOCALIZATION
AND HANDOVER
GSM: SYSTEM ARCHITECTURE

3.2

Prof.
Anir
udha
Sah
oo
AUTHENTICATION:
Confirm the true identity of the user(or device).
Ensures that the subscriber is authorized access to
the network.

GOALS:
Protection of the network against unauthorized use.
Protect the operator against the billing fraud.
AUTHENTICATION:
Authenticates the identity of the subscriber through the use of a
challenge-response mechanism.

MS requests access to the network.
Forward the IMSI and authentication request to the request authentication
The MSC will forward the IMSI to the HLR and Authentication Center
(AuC).
Triplets.
IMSI
HLR

MS

IMSI

Request authentication Triplets

request Triplets

MSC

BS
AuC
TMSI-Temporary Mobile Subscriber Identity
HLR-Home Location Register
MSC-Mobile Switching Center
IMSI-International Mobile Subscriber Identity

V
f
v
d

e r i
y
a l i
i t y
AUTHENTICATION:
The AuC will use the IMSI to look up the Ki associated with
that IMSI.
The Auc will also generate a 128-bit random number called
the RAND.
Ki-Individual subscriber authentication key.
It is a 128-bit number that is paired with an IMSI when the SIM
IMSI
card is created.

Authentication Center

RAND

Ki
AUTHENTICATION:
The RAND and the Ki are inputted into the A3 encryption
algorithm as well as A8 encryption algorithm.
The output is the Signed Response (SRES) and Ciphering
key(Kc) correspondingly.
The RAND, SRES, and Kc are collectively known as the
Triplets.
RAND

RAND

Ki

A8

A3
32-bit
SRES

Ki

64-bit
Kc
AUTHENTICATION:
Once the AuC has generated the triplets, it forwards them to
theThe HLR subsequently sends them to the requesting
HLR.
MSC. MSC stores the Kc and the SRES but forwards the RAND to the MS
The
and orders it to authenticate.
Triplets
MSC
SRES
HLR

Request triplets

Kc

IMSI

Triplets

IMSI
Request authentication Triplets

MS

AuC

BS
AUTHENTICATION:
The MS has the Ki stored on the SIM card.
The A3 and A8 algorithms also reside on the SIM card.
The RAND and Ki are inputted into the A3 and A8 algorithm.
Generate the SRES and the Kc respectively.

RAND

MS

Ki

Ki

RAND

SIM

A3
SRES

A8
Kc
AUTHENTICATION:
The MS stores the Kc on the SIM card and sends the generated SRES back to the
network.

Triplets

RAND
MSC
SRES
Kc

IMSI
Request authentication Triplets
IMSI

IF

SRES

=

SRES

AUTHENTICATION SUCCESSFUL

Triplets

Request
TMSI or IMSI
access

Request triplets

MS

HLR

AuC
GSM LOCALIZATION:

Kind of cell phone tracking mechanism that's possible
in GSM phones.
The GSM system always knows where a user is
currently located.
Same phone number is valid worldwide.
GSM system performs periodic location updates, even
if the user does not use the MS.
-provided that the MS is still logged on to the GSM
network and is not completely switched off.
GSM ARCHITECTURE:
GSM LOCALIZATION:

HOW?

The HLR contains information about the current
location.
The VLR that is currently responsible for the MS
informs the HLR about the location of the MS when
it changes.

Localization can be done in following four ways..
-Network based
-Handset based
-SIM based
-Hybrid
GSM LOCALIZATION :
HYBRID BASED LOCALIZATION:
Uses a combination of Network based, Handset based
& SIM based technologies.
-makes the location more accurate.
Example : Global Positioning System (GPS)

space based satellite navigation system.

allows small electronic
receivers to determine their location
GSM LOCALIZATION:
To locate an MS and to address the MS following
numbers are required..
 Mobile Station International ISDN Number
(MSISDN) :

 Important for GSM user.
 Associated with SIM.
 Consists of –




Country Code (CC)
National Destination Code(NDC)
Subscriber Number (SN)
GSM LOCALIZATION:
International Mobile Subscriber Identity(IMSI) :
 GSM uses the IMSI for internal unique identification
of a subscriber.
 Consists of –
Mobile Country Code (MCC)
Mobile Network Code(MNC)
Mobile Subscriber Identification Number(MSIN)
GSM LOCALIZATION:
Temporary Mobile Subscriber Identity(TMSI):
 Give the exact identity of the user signaling over the
air interface.
 GSM uses the 4 byte TMSI.
 TMSI is selected by the current VLR.
 Only valid temporarily and within the location area of
VLR.
GSM LOCALIZATION:
Mobile Station Roaming Number(MSRN) :
 Temporary address.
 Hides the location of a subscriber.
 Consists of –
Visitor Country Code(VCC)
Visitor National Destination Code (VNDC)
GSM HANDOVER:
Handover is the process of switching a radio connection from
one BS to another in order to maintain seamless radio
connection during mobile station movement.
HANDOVER

BTS

BTS
1 Handover request

GSM HANDOVER:
1
3
5
6
4
2

2 Forward

MSC new BSCa handover request from the old BSC. a handover
The receives handoverthe handover by transmitting
initiates complete
MS sendsthe old radio channels inmessage to the old BSC via new
Releasestothe the request to the new BSC. sends handover bursts to the
the old
MSC forwardsthe MS the connection the MS
In order to
command establish via old BSC.
BSC.
BSC. BSC
new
MSC
3 Handover
2
1
command
4 Handover burst
3
5 Handover
BSC
BSC
5
complete
6 Release

4

5

3

6
HANDOVER SUCCESSFUL

4
BTS
BTS
NEW

OLD
Questions ?
THANK YOU

More Related Content

DOCX
Call flow in gsm
PPTX
2 g data call flow
PPTX
PDF
Simplified Call Flow Signaling: Registration - The Attach Procedure
PPT
Layer 3 messages (2G)
PPTX
Gsm architecture and call flow
PDF
VoLTE Flows and CS network
PPT
Basic gsm principles
Call flow in gsm
2 g data call flow
Simplified Call Flow Signaling: Registration - The Attach Procedure
Layer 3 messages (2G)
Gsm architecture and call flow
VoLTE Flows and CS network
Basic gsm principles

What's hot (20)

PPT
Tems layer3_messages
PDF
VoLTE KPI Performance Explained
PPTX
Diameter Presentation
PPT
3 g call flow
PPT
Gsm call routing
PDF
UMTS/LTE/EPC Call Flows for CSFB
PDF
VoLTE KPI Performance
PPTX
Wireless application protocol
PPT
Basic GSM Call Flows
PPTX
IMS + VoLTE Overview
PPTX
Mobile Originated Call Process in Simple Words
PDF
ims registration call flow procedure volte sip
PDF
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
PDF
Introduction to trace viewer
ODP
UMTS, Introduction.
PDF
Telecom interconnect Billing Basics
PDF
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
PDF
MQTT - MQ Telemetry Transport for Message Queueing
PDF
2.1 introduction to cellular architecture
Tems layer3_messages
VoLTE KPI Performance Explained
Diameter Presentation
3 g call flow
Gsm call routing
UMTS/LTE/EPC Call Flows for CSFB
VoLTE KPI Performance
Wireless application protocol
Basic GSM Call Flows
IMS + VoLTE Overview
Mobile Originated Call Process in Simple Words
ims registration call flow procedure volte sip
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
Introduction to trace viewer
UMTS, Introduction.
Telecom interconnect Billing Basics
End to End volte ims sip call flow Guide - Mobile originating and Mobile term...
MQTT - MQ Telemetry Transport for Message Queueing
2.1 introduction to cellular architecture
Ad

Viewers also liked (20)

PPTX
Authentication and Ciphering
PPT
Gsm.....ppt
PDF
3 handoff management
PPT
HANDOFF
PPT
Uk pakistan imsi (1)
PDF
Using gsm sim authentication in vp ns
PPTX
Speech Compression using LPC
PPT
Speech compression-using-gsm
PPT
Basic GSM CallFlow
PDF
01 09 tmsi reallocation
PPT
Gsm network
PDF
Gsm technology
PDF
Thong tin_di_dong
PPSX
Handover in Telecom
DOC
Thiet ke toi uu vo tuyen
PPT
Wcdma callflow
PPTX
NEXT GENERATION 5 G MOBILE WIRELESS TECHNOLOGY
PPT
Bluetooth, Infrared
PPT
5 g
PDF
RIL and Android Telephony
Authentication and Ciphering
Gsm.....ppt
3 handoff management
HANDOFF
Uk pakistan imsi (1)
Using gsm sim authentication in vp ns
Speech Compression using LPC
Speech compression-using-gsm
Basic GSM CallFlow
01 09 tmsi reallocation
Gsm network
Gsm technology
Thong tin_di_dong
Handover in Telecom
Thiet ke toi uu vo tuyen
Wcdma callflow
NEXT GENERATION 5 G MOBILE WIRELESS TECHNOLOGY
Bluetooth, Infrared
5 g
RIL and Android Telephony
Ad

Similar to Gsm (20)

PPT
Gsm security
PPTX
Gsm architecture
PPTX
GSM Architecture
PPTX
GSM Network Architecture
PPT
GSM architecture
PPTX
PPT
fdocuments.net_gsm-call-flows-5584455b2833e.ppt
PPT
GSM Architecture.ppt
PPTX
Basic of teleom gsm
PDF
Gsm presntation
PDF
Gsm presntation
PPTX
PPT
GSM_SANAT_Ppt
PPT
Rk 3 gsm network
PPT
Rk 3 gsm network @guddu
PPTX
GSM.pptx full gsm solution of final exam
PPTX
GSM WITH SATELLITE.pptx
PPT
Gsm fundamentals
PPTX
Gsm technology
Gsm security
Gsm architecture
GSM Architecture
GSM Network Architecture
GSM architecture
fdocuments.net_gsm-call-flows-5584455b2833e.ppt
GSM Architecture.ppt
Basic of teleom gsm
Gsm presntation
Gsm presntation
GSM_SANAT_Ppt
Rk 3 gsm network
Rk 3 gsm network @guddu
GSM.pptx full gsm solution of final exam
GSM WITH SATELLITE.pptx
Gsm fundamentals
Gsm technology

More from Nur Islam (8)

PPT
Lan wan
PPTX
Overview of iso 9001
PPTX
Software reliability & quality
PPTX
Metrics for project size estimation
PPT
Organization and team structures
PPTX
Halsted’s Software Science-An analytical technique
PPTX
Cellular automata
PPTX
Designing of media player
Lan wan
Overview of iso 9001
Software reliability & quality
Metrics for project size estimation
Organization and team structures
Halsted’s Software Science-An analytical technique
Cellular automata
Designing of media player

Recently uploaded (20)

PPTX
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
PPT
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
0520_Scheme_of_Work_(for_examination_from_2021).pdf
PDF
Compact First Student's Book Cambridge Official
PPTX
Education and Perspectives of Education.pptx
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
The TKT Course. Modules 1, 2, 3.for self study
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PPTX
What’s under the hood: Parsing standardized learning content for AI
PPTX
Climate Change and Its Global Impact.pptx
PDF
Everyday Spelling and Grammar by Kathi Wyldeck
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PDF
English Textual Question & Ans (12th Class).pdf
PDF
Climate and Adaptation MCQs class 7 from chatgpt
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
0520_Scheme_of_Work_(for_examination_from_2021).pdf
Compact First Student's Book Cambridge Official
Education and Perspectives of Education.pptx
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
The TKT Course. Modules 1, 2, 3.for self study
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
What’s under the hood: Parsing standardized learning content for AI
Climate Change and Its Global Impact.pptx
Everyday Spelling and Grammar by Kathi Wyldeck
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
UNIT_2-__LIPIDS[1].pptx.................
English Textual Question & Ans (12th Class).pdf
Climate and Adaptation MCQs class 7 from chatgpt

Gsm

  • 3. AUTHENTICATION: Confirm the true identity of the user(or device). Ensures that the subscriber is authorized access to the network. GOALS: Protection of the network against unauthorized use. Protect the operator against the billing fraud.
  • 4. AUTHENTICATION: Authenticates the identity of the subscriber through the use of a challenge-response mechanism. MS requests access to the network. Forward the IMSI and authentication request to the request authentication The MSC will forward the IMSI to the HLR and Authentication Center (AuC). Triplets. IMSI HLR MS IMSI Request authentication Triplets request Triplets MSC BS AuC TMSI-Temporary Mobile Subscriber Identity HLR-Home Location Register MSC-Mobile Switching Center IMSI-International Mobile Subscriber Identity V f v d e r i y a l i i t y
  • 5. AUTHENTICATION: The AuC will use the IMSI to look up the Ki associated with that IMSI. The Auc will also generate a 128-bit random number called the RAND. Ki-Individual subscriber authentication key. It is a 128-bit number that is paired with an IMSI when the SIM IMSI card is created. Authentication Center RAND Ki
  • 6. AUTHENTICATION: The RAND and the Ki are inputted into the A3 encryption algorithm as well as A8 encryption algorithm. The output is the Signed Response (SRES) and Ciphering key(Kc) correspondingly. The RAND, SRES, and Kc are collectively known as the Triplets. RAND RAND Ki A8 A3 32-bit SRES Ki 64-bit Kc
  • 7. AUTHENTICATION: Once the AuC has generated the triplets, it forwards them to theThe HLR subsequently sends them to the requesting HLR. MSC. MSC stores the Kc and the SRES but forwards the RAND to the MS The and orders it to authenticate. Triplets MSC SRES HLR Request triplets Kc IMSI Triplets IMSI Request authentication Triplets MS AuC BS
  • 8. AUTHENTICATION: The MS has the Ki stored on the SIM card. The A3 and A8 algorithms also reside on the SIM card. The RAND and Ki are inputted into the A3 and A8 algorithm. Generate the SRES and the Kc respectively. RAND MS Ki Ki RAND SIM A3 SRES A8 Kc
  • 9. AUTHENTICATION: The MS stores the Kc on the SIM card and sends the generated SRES back to the network. Triplets RAND MSC SRES Kc IMSI Request authentication Triplets IMSI IF SRES = SRES AUTHENTICATION SUCCESSFUL Triplets Request TMSI or IMSI access Request triplets MS HLR AuC
  • 10. GSM LOCALIZATION: Kind of cell phone tracking mechanism that's possible in GSM phones. The GSM system always knows where a user is currently located. Same phone number is valid worldwide. GSM system performs periodic location updates, even if the user does not use the MS. -provided that the MS is still logged on to the GSM network and is not completely switched off.
  • 12. GSM LOCALIZATION: HOW? The HLR contains information about the current location. The VLR that is currently responsible for the MS informs the HLR about the location of the MS when it changes. Localization can be done in following four ways.. -Network based -Handset based -SIM based -Hybrid
  • 13. GSM LOCALIZATION : HYBRID BASED LOCALIZATION: Uses a combination of Network based, Handset based & SIM based technologies. -makes the location more accurate. Example : Global Positioning System (GPS) space based satellite navigation system. allows small electronic receivers to determine their location
  • 14. GSM LOCALIZATION: To locate an MS and to address the MS following numbers are required..  Mobile Station International ISDN Number (MSISDN) :  Important for GSM user.  Associated with SIM.  Consists of –    Country Code (CC) National Destination Code(NDC) Subscriber Number (SN)
  • 15. GSM LOCALIZATION: International Mobile Subscriber Identity(IMSI) :  GSM uses the IMSI for internal unique identification of a subscriber.  Consists of – Mobile Country Code (MCC) Mobile Network Code(MNC) Mobile Subscriber Identification Number(MSIN)
  • 16. GSM LOCALIZATION: Temporary Mobile Subscriber Identity(TMSI):  Give the exact identity of the user signaling over the air interface.  GSM uses the 4 byte TMSI.  TMSI is selected by the current VLR.  Only valid temporarily and within the location area of VLR.
  • 17. GSM LOCALIZATION: Mobile Station Roaming Number(MSRN) :  Temporary address.  Hides the location of a subscriber.  Consists of – Visitor Country Code(VCC) Visitor National Destination Code (VNDC)
  • 18. GSM HANDOVER: Handover is the process of switching a radio connection from one BS to another in order to maintain seamless radio connection during mobile station movement. HANDOVER BTS BTS
  • 19. 1 Handover request GSM HANDOVER: 1 3 5 6 4 2 2 Forward MSC new BSCa handover request from the old BSC. a handover The receives handoverthe handover by transmitting initiates complete MS sendsthe old radio channels inmessage to the old BSC via new Releasestothe the request to the new BSC. sends handover bursts to the the old MSC forwardsthe MS the connection the MS In order to command establish via old BSC. BSC. BSC. BSC new MSC 3 Handover 2 1 command 4 Handover burst 3 5 Handover BSC BSC 5 complete 6 Release 4 5 3 6 HANDOVER SUCCESSFUL 4 BTS BTS NEW OLD