An Evaluation of Current Global System for Mobile Communications (GSM) Standards in Mobile Money Mogolodi Lore Menyatso Abstract The Global System for Mobile Communications (GSM) network since its invention was designed to carry voice communications data such as voice calls for devices that use the GSM network. However, this technology is seen to be applied on mobile monetary services and solutions, therefore this paper focuses on evaluating, comparing and formulating a conclusion based on the findings of the evaluation of Unstructured Supplementary Service (USSD) and Short Message Service (SMS) GSM standards. 1. Introduction Since the dawn of networks communications GSM has been used without any regular improvements throughout the years. However, evidence shows that the GSM is becoming vulnerable with time on due to advancements in technology, therefore, this leaves the technology unable to keep up with recent modern advancements which are resource demanding and fast paced. Numerous users in the globe depend on GSM service for e-commerce, purchases, utility payments, customer service support and self-service. The technology has gained traction in impoverished and developing markets such as Africa. Statistics show that In Uganda there are at least 25.8 million users and 26 banks participating in this wave of convenience offered by mobile money, the bank of Uganda (BoU) reported a warping total of 2.51 billion transactions being made on mobile monetary platforms (Ali, G., 2020), and note that was an annual financial report for the year 2018/19. One of the main reasons of its mass adoption in developing and impoverished countries is because the GSM based standards namely SMS and USSD can operate on low to fair network bandwidths, and it does not require much hardware resources such as an internet connection. Despite the GSM technology being efficient cases of underperformance exist. A recent study (Samera Uga Otor et.al. 2020) elaborates point of how stakeholders are affected in terms of business operations due to customers who are victimized from using their GSM standardbased applications in order to get access to services and products. Customers are often left vulnerable to fraudulent attacks, deceiving algorithms, eavesdropping and interception cases. These at times, are cases which are challenging to solve and justify exploited customers as the individuals who are behind these unethical acts use anonymous strategies such as the profound Man-in-the-middle attack for their activities. Often there are cases that arise pertaining the encryption of data collected from pull USSD services. Evidence shows that poorly encrypted data could be read easily, and this is worsened by using the relational database services as data packets would be travelling in the form of plain and unencrypted text. There are multiple papers that address the unsafe practices and weak points that exists in the GSM based standards. For Instance, (Nyamtiga, B et. al. 2013)’s research was focused on the security establishments of USSD and SMS standards as being suboptimal. Nevertheless, high stake participants such as banking sectors that use the GSM technology to deliver services and products initiate and take counteractive security measures as their priority before any attempts to optimize their service delivery vehicle. However, access points exist in the module responsible for coupling the bank’s infrastructure or any other third-party organization and the GSM standard-based application either SMS or USSD. Therefore, this paper argues that the GSM network standard must be technically upgraded, and protocols must be optimized to combat cases of security and deterioration in mobile money. This paper first explains the GSM technology as well as the GSM standards that are used in mobile money and then evaluate each standard’s make up and recent research that was aimed at improving the standards, then it compares and contrasts the various characteristics in a detailed manner of how it is utilized in mobile money. Finally, it addresses the conclusions that potential could have a positive impact. 1. Global System for Communication Network Architecture Mobile (GSM) On the GSM network, for a connection to be established with a device that uses the GSM protocol, a strong network connection with a fair signal should be available to nearby devices. Therefore, if a handset is in motion, an interchange among GSM base stations will simultaneously take place automatically depending on the network strength of any given base station within the radius reach of a device. Njuguna, M.W., 2020. Data in all sorts of format such as in Short Messaging Service (SMS) or voice type is transported all in one communication line which directly connects it a Network Sub-System (NSS) fragment. The NSS is responsible for establishing a link with an Operation and Maintenance (OMS) subsystem which its role is to enable a direct communication with the assigned databases to provide informational services. GSM networks usually have gateways in between the modules that couple an organizations infrastructure such as in-house software and hardware. However, a vulnerability exists in the scope, this due to an optional encryption that uses a weak (A5/1 or A5/2) stream type cipher algorithm. Saxena N, Payal A (2011) Figure1. The GSM network architecture illustration 2. Short Message Service (SMS) Architecture The standard operates wirelessly from any device with GMS capabilities built into it with the ability to send and receive data over a split second despite the network being of low band width connectivity. Data in this standard is sent in the form of a byte array, which is then processed as an alphanumeric package, this data is then forwarded over to be encapsulated into a data packet consisting of a header and body that will be storing the actual data which will be converted to 70 ASCII characters utilizing an encoding. After the processing of the data, it is then sent to the nearest Base Transceiver Station (BTS) tower wirelessly to be forwarded to the Base Station Controller (BSC), the BSC will then be responsible for transmitting the packet to the Mobile Switching Center which will then pass it over to the Signaling System No.7 (SS7), note how SS7 is stationed as a mid-point in the architecture setup. From the SSQ filtration will be done to filter out packets according to their Mobile carriers and if it happens that the SMS is from a different destination operator then the source, a Short Message Peer to Peer (SMPP)repackaging will be initiated by the source’s SMS Center (SMSC) before it is forwarded through a Transmission Control Protocol and Internet Protocol (TCP/IP) over any network connected to the receivers SMSC, the SMSC completes the link by delivering the packet to its destination where decapsulation will take place and presented as plain alphanumeric text to the receiver (Baraka W. Nyamtiga et.al 2013) Two-way transmissions are acceptable in the SMS technology meaning that a cellular subscriber can send and receive text messages at any time even during an outgoing call. Before the response is processed a few protocols of the GSM network must be followed in order to validate the action. These are as follows • The request is transported from the phone through the network to the nearest telecommunication tower available. • After the communications tower, the request is then forwarded to a GSM network module as a packet. • The gateway will perform a filtration action and accept certain requests to get data from the servers, this acts as an overseer for security rules. Figure2. The SMS architecture illustration 3. Unstructured Supplementary Service Data (USSD) Architecture The system runs on top of a Global System for mobile (GSM) communications network which is connected to a gateway coherently joined to a centralized server-side system hooked to a SQL server at the end of the link. Users access this service through dialing a combination of short codes on their GSM mobile phones, this is not acceptable in Code Division Multiple access devices (CDMA) as the devices do not have SIM card integration capability. Therefore, this protocol serves as a communication link between destined servers and GSM mobile devices. Njuguna M.W. (2020). The integration of the system service starts when a user dials a few pre-defined short codes with asterisks/star (*) at the beginning of the digits then followed by a hash (#) to mark the end of the code Suraj et. al. (2017). After all this is processed the procedure is apprehended as a request packet encapsulating 182-character bit of data (Suraj et.al). This is sent to the server and a response is expected to follow suit. Figure3. The USSD architecture illustration 4. How GSM Standards are used In Mobile Money Mobile financial services seem to be one of the most promising endeavors being developed in most developing economies Donovan, K. (2012). The GSM technology is the backbone which the SMS and USSD standards run on. It allows for any service provider to have their own access codes for a USSD service and SMS. Therefore, SIM provider would have to utilize what is already to their disposal, which is to integrate on the existing GSM technology. Various APIs and backend systems are implemented in order to form a link and act as a medium between the service provider’s servers and the SMS or USSD standard on the GSM network. Third party service providers such as banks and even SIM provider business rules are implemented and defined in these APIs. often stored on the user’s actual handset or the SIM, these are usually 140 bytes of data held within a SMS message. 5. Evaluation of GSM Standards Used in Mobile Money The first two sections of the payload are used to establish a connection with a certain port in GSM network for integration reasons. The next two sections functionality is to store the SMS message encoding then the timestamp is for storing the time when the SMS was received. The diagram (Figure4) below illustrates how a SMS payload is sectioned. SMS and USSD technologies have various characteristics which differentiates the two standards from one another. 5.1 Short Message Service (SMS) This uses the General Packet Radio Service, which is responsible for processing packets over the GSM network and the Code Division Multiple Access (CDMA) networks. If it happens the destination or the receiving terminal is unreachable the SMS data will be saved on-route within the network at the SMSC. The SMS will remain at the SMSC until the destination of the packet is reachable on the other end. Thiga, M. et.al (2013) However, In the SMS standard data is forwarded through a TCP/IP protocol to a SMSC before reaching its destination. This is a vulnerability in the system as the data is prone to information interception from unethical individuals. Medani, A et.al (2011) SMS technology is more susceptible to attacks due to the multiple stops a SMS data must make within the GSM network. Sanganagouda, J. (2011)’s research examined the flow of the packet enroute to their destination and derived results that proved interception attacks are probable during this process. Once the user sends a request to the service provider, for instance a banking platform, a response will be sent as short code in the form of text and saved on the user’s device, which the customer will use to access certain information/capabilities. Sanganagouda, J. (2011) furthermore declares this method to be risky since anyone who has access to the user’s device could use the short code for exploitation activities. In Saxena, N. and Chaudhari, N.S. (2013)’s paper a conclusion was reached that SMS is slow despite the fact it uses a method of storing user data when receiving information which is Figure4. The SMS Payload illustration 5.2 Unstructured Supplementary Service Data (USSD) As for USSD technology it does not need to store any user data within the actual handset or device, once USSD is invoked through dialing a set of short codes. A bi-directional session that a user can interact with is automatically initialized. An iterative menu is often presented to the user making the interaction lively. Sanganagouda, J. (2011). Saxena, N. and Chaudhari, N.S. (2013) discovered that USSD has had an upgrade which will allow it to have roaming capabilities. These upgrades include the ability to support an open HTTP interface and the ability to establish a communication link directly to the MSC through the SS7. Given how efficient USSD is, flaws have been identified to exist within the standard, these include USSD applications being vulnerable to network sniffer attacks such as Wire-shark, malware attacks found on devices that use Android IOS as the users PIN is handled between network protocols in the form of clear plain text. A user is also victim to being exploited by the service provider administrators as well. Mtaho, A.B., (2015) Adding on to the privacy leakage concern, Njuguna, M.W. (2020) discovered that despite the security measure most banking and financial service providers apply to such services, nontrivial data can still be extracted through an analysis of the traffic. Adding on to the privacy leakage concern, (Islam Kazu and Kantarcioglu, 2012) made research that served as evidence to the possibility of extracting non-trivial data such as user queries and the secret keys through a technical method of assessing read access patterns served as requests from client terminals. If in any case there is a breach on to the data, there would not be any form of defense mechanism in place to protect the data as it will be exposed exactly as is from when it was sent from the source. Research from (Nyamtiga and Laizer, 2013) and (Ali, G et. al., 2020) states that there is not any encryption in place in case there is an occurrence of the GSM backbone carrier encountering a breach. Due to the underlying technology that is the backbone of the system transactions often take longer and slow to fully complete. Mukesh S. et.al. (2011) declares that customers that use mobile money services must wait a couple of hours when making transactions reasons being the backend system is flimsy. (Mukesh S. et.al 2011) continues to claim that human interference is often required to finish and seal off any pending transactions which ends up being a costly operation. Every time USSD is invoked an active connection link between the sender and the receiver must be available as it operates on a real-time based session, therefore this condition can be costly Sanganagouda, J. (2011). 6. Comparison of USSD and SMS Standards in Mobile Money Services The different features of the SMS and USSD technologies are tabulated below: SMS USSD Fundamentally uses a store and forward strategy SMSC receives the SMS data before it Real-time based Client firsthand session interacts with the manages to deliver it to the destined recipient application platform hosting the service Composed of 160 alphanumeric characters Messages are stored directly on the handset or the SIM memory Plain text interaction Composed of 182 alphanumeric characters No messages stored on menu driven interactions Optional menu driven interaction Susceptible to carrying malformed short messages No short message sent to phone 7. Conclusion The paper clearly states how one standard performs better than the other on every given dimension where a functional requirement exists. Therefore, overall, the USSD standard technology is optimal for commercial uses however, this does not imply there is not any room for recommendable improvements. As flaws exist in the security aspects of the technology, a recommendation of upgrading databases with NoSQL databases on the USSD backend system would have a positive impact on the encrypting the data and increasing processing speed as data would be stored and sent with a json format. This conclusion about migrating from relation databases to NoSQL databases is derived from a study conducted by (Abdelraheem, M.A. et al. 2018). A clear illustration of table meta-data and number of records/entries were leaked after the AttributeName recovery-attack was initiated on a relation database. Given the fact that a GSM abled handset connects/ attaches to any base station with a rather superior connection among a set of base stations (Njuguna, M.W., 2020), an identification measure between devices and base stations such as a private key should be integrated in order to avoid handsets from connecting to rouge base station regardless how strong the signal is perceived to be. This would highly curb cases of where client-side terminals are being deceived into connecting to fraudulent base stations. References Research and Reviews in Computer Science, 2(2), p.295 -303 Otor, S.U., Akumba, B.O., Idikwu, J.S. and Achika, I.P., 2020. An Improved Security Model for Nigerian Unstructured Supplementary Services Data Mobile Banking Platform. Saxena, N. and Chaudhari, N.S., 2013. Prevention of SMS against Repudiation Attack over the GSM Network. Journal of Information Assurance & Security, 8(3). “Nyamtiga, B.W., Sam, A. and Laizer, L.S., 2013. Security Perspectives for USSD versus SMS in conducting mobile transactions: A case study of Tanzania. international journal of technology enhancements and emerging engineering research”, 1(3), pp.38-43. Page 41 Thiga, M.M., Siror, J.K. and Githeko, J., 2013. An SMS and USSD Model for Locationbased Mobile Advertising. Donovan, K., 2012. Mobile money for financial inclusion. Information and Communications for development, 61(1), pp.61 Medani, A., Gani, A., Zakaria, O., Zaidan, A.A. and Zaidan, B.B., 2011. Review of mobile short message service security issues and techniques towards the solution. Scientific Research and Essays, 6(6), page.1149. Ali, G., Ally Dida, M. and Elikana Sam, A., 2020. Evaluation of key security issues associated with mobile money systems in Uganda. Information, 11(6), page. 4. Mtaho, A.B., 2015. Improving mobile money security with two-factor authentication. International Journal of Computer Applications, 109(7). Page 9 Saxena, N. and Payal, A., 2011. Enhancing security system of short message service for mcommerce in GSM. International Journal of Computer Science & Engineering Technology (IJCSET), 2(4), pp.126 Islam, M.S., Kuzu, M. and Kantarcioglu, M., 2012, February. Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In Ndss (Vol. 20, p. 10). Njuguna, M.W., 2020. Dynamic knowledge based authentication model for enhancing security of USSD banking transactions (Doctoral dissertation, Strathmore University). Page 11 Mukesh Sadana, George Mugweru, Joyce Murithi, David Cracknell and Graham A.N. Wright (2011). Riding the M-PESA Rails: Advantages & Disadvantages. Page 2 “Nyamtiga, B.W., Sam, A. and Laizer, L.S., 2013. Security Perspectives for USSD versus SMS in conducting mobile transactions: A case study of Tanzania. international journal of technology enhancements and emerging engineering research”, 1(3), pp.38-43. Page 41 Sanganagouda, J., 2011. USSD-A Potential Communication Technology that can Ouster SMS Dependency. International Journal of Abdelraheem, M.A., Andersson, T., Gehrmann, C. and Glackin, C., 2018, September. Practical attacks on relational databases protected via searchable encryption. In International Conference on Information Security (pp. 171191). Springer, Cham.