HOME

TheInfoList



OR:

GSM 03.48 is a protocol used to exchange secured packets between an entity in a
GSM The Global System for Mobile Communications (GSM) is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation ( 2G) digital cellular networks used by mobile devices such as ...
PLMN In telecommunication, a public land mobile network (PLMN) is a combination of wireless communication services offered by a specific operator in a specific country.3GPP TS 21.905 https://www.etsi.org/deliver/etsi_tr/121900_121999/121905/15.00.00_6 ...
and an entity in the
SIM card file:SIM-Karte von Telefónica O2 Europe - Standard und Micro.jpg, A typical SIM card (mini-SIM with micro-SIM cutout) file:Sim card.png, A smart card taken from a Global System for Mobile Communications, GSM mobile phone file:Simkarte NFC SecureE ...
. Secured packets contain application messages to which certain mechanisms according to
GSM The Global System for Mobile Communications (GSM) is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation ( 2G) digital cellular networks used by mobile devices such as ...
03.48 have been applied. Application messages are commands or data exchanged between an application resident in or behind the
GSM The Global System for Mobile Communications (GSM) is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation ( 2G) digital cellular networks used by mobile devices such as ...
PLMN In telecommunication, a public land mobile network (PLMN) is a combination of wireless communication services offered by a specific operator in a specific country.3GPP TS 21.905 https://www.etsi.org/deliver/etsi_tr/121900_121999/121905/15.00.00_6 ...
and on the
Wap WAP or Wap may refer to: Music * "WAP" (song), a 2020 song by Cardi B featuring Megan Thee Stallion Organizations * Weatherization Assistance Program, for US energy costs * Western Australia Party, a political party founded in 2016 * Western A ...
or
MMS MMS may refer to: Science and technology Network communication protocols * Multimedia Messaging Service for mobile phones * Microsoft Media Server, a content-streaming protocol (mms://) * Manufacturing Message Specification for real time proces ...
. It is evolved to 3GPP TS 23.048 in 3G. From Release 5, TS 23.048 is split into the generic part and the bearers specific application. The generic part on packet structure has been transferred to SCP (ETSI TS 102 225). The bearers specific part is 3GPP TS 31.115.


Overview

The Sending Application prepares an Application Message and forwards it to the Sending Entity, with an indication of the security to be applied to the message. The Sending Entity prepends a Security Header (the Command Header) to the Application Message. It then applies the requested security to part of the Command Header and all of the Application Message, including any padding
octets Octet may refer to: Music * Octet (music), ensemble consisting of eight instruments or voices, or composition written for such an ensemble ** String octet, a piece of music written for eight string instruments *** Octet (Mendelssohn), 1825 compos ...
. The resulting structure is here referred to as the (Secured) Command Packet. Under normal circumstances the Receiving Entity receives the Command Packet and unpacks it according to the security parameters indicated in the Command Header. The Receiving Entity subsequently forwards the Application Message to the Receiving Application indicating to the Receiving Application the security that was applied. The interface between the Sending Application and Sending Entity and the interface between the Receiving Entity and Receiving Application are proprietary. If so indicated in the Command Header, the Receiving Entity shall create a (Secured) Response Packet. The Response Packet consists of a Security Header (the Response Header) and optionally, application specific data supplied by the Receiving Application. Both the Response Header and the application specific data are secured using the security mechanisms indicated in the received Command Packet. The Response Packet will be returned to the Sending Entity, subject to constraints in the
transport layer In computer networking, the transport layer is a conceptual division of methods in the layered architecture of protocols in the network stack in the Internet protocol suite and the OSI model. The protocols of this layer provide end-to-end ...
, (e.g. timing).


References

{{Reflist Packets (information technology)