Mobile Phone Network Security
|
|
- Juliet Griffin
- 8 years ago
- Views:
Transcription
1 Mobile Phone Network Security Internet Security [1] VU Adrian Dabrowski, Markus Kammerstetter, Georg Merzdovnik, Stefan Riegler and Aljosha Judmayer
2 Mobile phone networks 1G Not standardized 2G (GSM) From 1980es Introduced SIM Started as CS, now PS 3G (UMTS) From 1990es 4G (LTE) From 2000nd Planes User Plane Voice, Data, SMS Signaling Plane Call setup,... Management Plane Network organization
3 Structure of a 2G/3G System Source: LTE Security Dan Forsberg
4 Legend User Equipment (UE) Radio Access Network (RAN) Core Network (CN) Universal Terrestrial Radio Access Network (UTRAN) GSM/EDGE Radio Access Network (GERAN) GPRS Support Node (SGSN) Gateway GPRS Support Node (GGSN) Mobile Switching Centre (MSC)
5 Radio Layer Physical Channels!= Logical Channels Broadcast Channels Carry Beacon Information Paging & signaling to idle devices Unencrypted Dedicated Channels Communication to a specific UE(ME). Often encrypted
6 GSM Encryption A5/0 No encryption, banned from many networks (i.e. Tmobile Austria) A5/1 Standard today A5/2 Export Version, broken 199 A5/3 + 4 Backport of UMTS Katsumi based cipher
7 GSM Encryption
8 IMEI IMSI - TMSI International Mobile Equipment Identifier The phone International Mobile Subscriber Identifier The SIM card (i.e., the user) Temporary Mobile Subscriber Identifier A temporary UserID / SessionID (should) Prevent tracking since signaling plane is unencrypted
9 Attacks: TMSI deanonymization TMSI deanonymization Record Paging Traffic Call known Number, hangup before full channel setup (=before starts ringing) Use set of recorded pages to filter candidates Aka sieve Repeat until one candidate left
10 Attacks: Internet interconnectivity GPRS tunneling over Internet Publicly reachable tunnel endpoints have been found via port scanning at several Telcos DNS infrastructure, e.g., epc.mncxxx.mccxxx.3gppnetwork.org
11 Attacks: SIM Cloning COMP128 weakness Key derivation algorithm Secret key recovery by analyzing thousands of responses SIM card cloning Used via programmable multi-sims and development SIM cards
12 Attacks: Decryption GSM Cipher Rainbow tables available (~2TB) Decode session key (eavesdropping) In seconds...
13 Attacks: SS7 SS7 Attacks Signaling System 7 Signaling Backbone within and between many Telcos Telcos fully trust each other e.g. Anytime Interrogation Find cell ids (=location) of any phone Share Session key in case of roaming, etc Works also without roaming
14 Attacks: IMSI Catchers aka Stingray Used for Tracking users Eavesdropping calls, data, texts Man-in-the-Middle Attack phone using operator system messages (e.g. Management Interface, reprogram APN, HTTP-Proxy, SMS/WAP-Server...) Attack SIM (c.f. SIM card rooting, otherwise filtered by most mobile carriers), Attack Baseband Geotargeting ads (e.g. SMS) Intercept TAN, mobile phone authentication,
15 A Mobile Network
16 A Mobile Network with a Mobile Station
17 Location Areas
18 A wild IMSI Catcher appears..
19 A wild IMSI Catcher appears Use UMTS/GSM Protocol; not very effective!
20 A Real Network Source: Let me answer that for you, Golde et al., TROOPERS & USENIX
21 Cell tower density Source: Sendekataster.at
22 IMSI Catchers Identification only Retrive IMSI / IMEI / TMSI Reject Location Update Tracking UMTS downgrade Blocking UMTS transmission Spoofing System messages Traffic Man-in-the-Middle Hold in Cell Actively intercept traffic Relay to real network Active or passive decryption Hold but intercept passively Imprison in cell, so phone is not lost to a neighbor cell
23 IMSI Catchers Source: Verfassungsschutz (via DuD 26, 2006)
24 IC: Car Installation Source: Gamma Group
25 IC: Car Installation Source: Gamma Group
26 Car Installation Source: Gamma Group
27 IC: Car Installation Source: Gamma Group
28 IC: Car Installation Source: Gamma Group
29 Body IMSI Catcher Source: Gamma Group
30 Only for Law Enforcement? Known Producers Rohde & Schwarz Gamma Group Ability IAI Elta Septier Meganet NeoSoft Proximus Cyttek DIY USRP based Kirstin Paget DEFCON 19 US$1,500 D. Werhle Master's Thesis Freiburg B. Postl Master's Thesis Vienna
31 How to catch an IMSI Catcher?
32 Artifact: Frequency Unused or guard channel Only found in Full Scan Announced neighbor freq., but unused Careful not to create interference Detactability Frequency plans e.g. radio regulatory Self created
33 Artifact: Cell ID New CID/LAC needed To provoke Location Update Request Random? Use real one not used in that geographical region Detectability Cell IDs are very stable Cell Database (local) Also for frequencies Correlation with GPS coordinates
34 Artifact: Location Update / Register Just providing a better signal Is not enough Timers, Hysteresis Unpredictable radio environment RF Jamming? Forcing full scan Detectability: Watching noise levels
35 Artifact: UMTS handling Downgrading to GSM e.g. Mayer and Wetzel, 2005 [1] Detectability: Noise and Signal levels GSM layer in most Database of deployed UMTS networks regions where UMTS is available, (selectively) and GSM usage is Jamming unlikely Downgrade LUR Cell Database Others... [1] Mayer and Wetzel, A man-in-the-middle attack on UMTS, ACM Workshop on Wireless security, 2005
36 Downgrade 4G 3G 2G Pre-authentication traffic is unprotected - includes GET_IDENTITY (IMSI, IMEI) Location Updates can be rejected unauthenticated Needed for Roaming case Reject cause: You don't have a subscription for this service
37 Encryption Older IMSI Catchers: Downgrade encryption to Detectability: Cipher Indicator 'none' (A5/0) Feature request A5/1 and A5/2 can be in Android, 2009, decrypted with rainbow assigned 2013 tables Roaming! In realtime A5/3 rolled out at the moment IC will have to do active MITM again
38 Artifact: Cell Imprisonment Networks provides up to 32 neighbor frequencies MS stores typ. 6+1 Used for hand overs, LAR, IC will likely provide an empty (eq.) NL To not loose phone to a neighbor cell Detectability: Neighbor cell list
39 Traffic forwarding a) relay via other MS Loose caller ID No incoming calls b) via SS7 or similar Caller ID correct Loose incoming calls c) recover secret SIM key Impersonate to network with victims identity Detectability: Call tests (?)
40 Usage Pattern Identification Mode Short living cells MITM Mode Longer living cells Both: Unusual locations for cells
41 Cell capabilities and parameter fingerprinting Cell capabilities & parameters Organization of logical channels on physical channels Timeout values Can be different on each cell, but typically they are the same over the whole network Differ between networks Detectability: Cell and network database
42 Network Monitor Mode
43 Detection Matrix
44 Two approaches Mobile IMSI Catcher Catcher Standard Android API No need to root phone No need for a specific chipset (e.g. GoldX) Easy Interface Stationary IMSI Catcher Catcher Network of measuring stations Good locations, larger coverage Cheap RaspberryPi based
45 Mobile IMSI Catcher Catcher
46
47 Two approaches - Features Mobile IMSI Catcher Catcher GPS + Neighbor cell listing Geographical correlation Cell-IDs Cell Capabilities RF and NCL manipulations Limited to NCL but mobile Stationary IMSI Catcher Catcher Cell-ID mapping Frequency usage Cell lifetime Cell capabilities, network parameters Jamming
48 Stationary IMSI Catcher Catcher
49
50
51
52
53
54
55 WIP: Network operator has no global view Currently in a project with a major Austrian carrier Finding IMSI Catcher based on operator data Network operator has no global view Some transactions are designed decentralized One transaction can leave trace on many levels/protocols 2G/3G/4G interaction grown historically Monitoring solutions have to carry high load e.g. > 100K LUR/min but still extract and correlate data meaningfully
56 Work in Progress Verified with USRP based IMSI Catcher Need commercial devices for testing Build dense measurement network Goal: stations Implement 3G + LTE Android-APP Fine tune ruleset for everyday situations Problem zones: Tunnels Underground
57 (Bachalor's and Master's) Thesis' opportunities Port 2G broadcast sniffing to FPGA (BladeRF) Implement 3G GNU Radio, SDR Implement 4G GNU Radio, SDR Implement client stack More ideas? Contact:
GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010
Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010 Dennis Wehrle, Konrad Meier, Dirk von Suchodoletz, Klaus Rechert, Gerhard Schneider Overview 1. GSM Infrastructure
More informationMobile network security report: Poland
Mobile network security report: Poland GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin February 2015 Abstract. Mobile networks differ widely in their protection capabilities against common
More informationMobile network security report: Belgium
Mobile network security report: Belgium GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin December 2014 Abstract. Mobile networks differ widely in their protection capabilities against common
More informationGSM security country report: USA
GSM security country report: USA GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin August 2013 Abstract. GSM networks differ widely in their protection capabilities against common attacks.
More informationHow To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph
. Femtocell: Femtostep to the Holy Grail... Ravishankar Borgaonkar, Kévin Redon.. Technische Universität Berlin, SecT ravii/kredon@sec.t-labs.tu-berlin.de TROOPERS 2011, 30 March 2011 3G/UMTS femtocells
More informationGSM security country report: Germany
GSM security country report: Germany GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin December 2013 Abstract. GSM networks differ widely in their protection capabilities against common attacks.
More informationSS7: Locate. Track. Manipulate.
You have a remote-controlled tracking device in your pocket Tobias Engel @2b_as 2 Signalling System #7 Protocol suite used by most telecommunications network operators throughout the world
More informationMobile network security report: Netherlands
Mobile network security report: Netherlands GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin July 2014 Abstract. Mobile networks differ widely in their protection capabilities against common
More informationMobile network security report: Poland
Mobile network security report: Poland GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin October 2014 Abstract. Mobile networks differ widely in their protection capabilities against common
More informationMobile network security report: Germany
Mobile network security report: Germany GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin December 2014 Abstract. Mobile networks differ widely in their protection capabilities against common
More informationHow to hack your way out of home detention
How to hack your way out of home detention About me William @Amm0nRa Turner @Assurance Disclaimer: I own this system (and 0wn it) The following information is for academic purposes only Don t use this
More informationCellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME
Cellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME Copyright 2015, Guardian Digital Forensics Cellular Telephone Easy
More informationHow To Understand The Gsm And Mts Mobile Network Evolution
Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems
More informationSecurity in cellular-radio access networks
Security in cellular-radio access networks Ravishankar Borgaonkar, Oxford University 5G Security Workshop Stockholm, Sweden 11 May 2016 Outline Radio Access Network Layered Security Emerging low cost attacks
More informationGSM and UMTS security
2007 Levente Buttyán Why is security more of a concern in wireless? no inherent physical protection physical connections between devices are replaced by logical associations sending and receiving messages
More informationUMTS security. Helsinki University of Technology S-38.153 Security of Communication Protocols k-p.perttula@hut.fi 15.4.2003
UMTS security Helsinki University of Technology S-38.153 Security of Communication Protocols k-p.perttula@hut.fi 15.4.2003 Contents UMTS Security objectives Problems with GSM security UMTS security mechanisms
More informationGSM Risks and Countermeasures
GSM Risks and Countermeasures STI Group Discussion and Written Project Authors: Advisor: Johannes Ullrich Accepted: February 1, 2010 Abstract Recent research has shown that GSM encryption can be cracked
More informationSPYTEC 3000 The system for GSM communication monitoring
SPYTEC 3000 The system for GSM communication monitoring The SPYTEC 3000 system is intended for passive (if system encryption is absent of if A5.2 encryption is used) or semi-active (if A5.1 encryption
More informationMobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek
Mobile Security Practical attacks using cheap equipment Presented the 07/06/2016 Business France By Sébastien Dudek For Content Security measures Recent publications in the hacking community Practical
More informationWireless Phone GSM tracking. Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim
Wireless Phone GSM tracking Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim Can someone track your phone? GPS Need access to phone Cell network trilateration/triangulation Multiple base stations
More informationIMSI-Catch Me If You Can: IMSI-Catcher-Catchers
IMSI-Catch Me If You Can: IMSI-Catcher-Catchers Adrian Dabrowski SBA Research Vienna, Austria adabrowski@sba-research.org Martin Mulazzani SBA Research Vienna, Austria mmulazzani@sba-research.org Nicola
More informationMobile network security report: Greece
Mobile network security report: Greece GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin October 2012 Abstract. Mobile networks differ widely in their protection capabilities against common
More informationWorldwide attacks on SS7 network
Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin (po@p1sec.com) Alexandre De Oliveira (alex@p1sec.com) Agenda Overall telecom architecture Architecture
More informationTheory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, 2001. GSM Location System Syslog XP 3.
Participant: Hack contacting... IT-Security: Theory and Practice Mobile Communication December 18, 2001 Uwe Jendricke uwe@iig.uni-freiburg.de Lecture Homepage: http://www.informatik.uni-freiburg.de/~softech/teaching/ws01/itsec/
More informationDefending mobile phones. Karsten Nohl, nohl@srlabs.de Luca Melette, luca@srlabs.de
Defending mobile phones Karsten Nohl, nohl@srlabs.de Luca Melette, luca@srlabs.de GSM networks provide the base for various attacks SS7 Phone Base station GSM backend network User database (HLR) Vulnerability
More informationAuthentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 10 Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography Wilayat Khan 1 and Habib Ullah 2 1 Department of Electrical
More informationGSM Databases. Virginia Location Area HLR Vienna Cell Virginia BSC. Virginia MSC VLR
Update ( Update Procedure) Network Mobiles Maryland Maryland Other Rockville Bethesda Maryland Mobile Mobile Cell Cell HLR Vienna Cell 12-Jun-14 22:48 (Page 1) This sequence diagram was generated with
More informationGlobal System for Mobile Communication Technology
Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special
More informationAn Example of Mobile Forensics
An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk k.c.hilton@staffs.ac.uk www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network
More informationWIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
More informationMobile network security report: Norway
Mobile network security report: Norway GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin August 2014 Abstract. Mobile networks differ widely in their protection capabilities against common
More informationLTE security and protocol exploits
LTE security and protocol exploits Roger Piqueras Jover Wireless Security Research Scientist Security Architecture Bloomberg LP ShmooCon January 2016 About me Wireless Security Researcher (aka Security
More informationA practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications ABSTRACT
A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications David Perez - david@taddong.com Jose Pico - jose@taddong.com Black Hat DC 2011 (Jan. 18-19) ABSTRACT In this article we present
More informationHow to secure an LTE-network: Just applying the 3GPP security standards and that's it?
How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro
More informationMobile Computing. Basic Call Calling terminal Network Called terminal 10/25/14. Public Switched Telephone Network - PSTN. CSE 40814/60814 Fall 2014
Mobile Computing CSE 40814/60814 Fall 2014 Public Switched Telephone Network - PSTN Transit switch Transit switch Long distance network Transit switch Local switch Outgoing call Incoming call Local switch
More informationContents VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014
VULNERABILITIES OF MOBILE INTERNET (GPRS) Dmitry Kurbatov Sergey Puzankov Pavel Novikov 2014 Contents 1. Introduction 2. Summary 3. Mobile network scheme 4. GTP protocol 5. Searching for mobile operator
More information2G/3G Mobile Communication Systems
2G/3G Mobile Communication Systems Winter 2012/13 Integrated Communication Systems Group Ilmenau University of Technology Outline 2G Review: GSM Services Architecture Protocols Call setup Mobility management
More information9.1 Introduction. 9.2 Roaming
9 Location Updating Objectives After this chapter the student will: be able to define the concepts of roaming and location updating. be able to name the different types of location updating and why they
More informationLTE Overview October 6, 2011
LTE Overview October 6, 2011 Robert Barringer Enterprise Architect AT&T Proprietary (Internal Use Only) Not for use or disclosure outside the AT&T companies except under written agreement LTE Long Term
More informationAnalysis of Methods for Mobile Device Tracking. David Nix Chief Scientific Advisor
Analysis of Methods for Mobile Device Tracking David Nix Chief Scientific Advisor October 2013 Table of Contents 1. Document Purpose and Scope 3 2. Overview 3 2.1 Mobile Device Penetration 3 2.2 Mobile
More informationMobile Communications
October 21, 2009 Agenda Topic 2: Case Study: The GSM Network 1 GSM System General Architecture 2 GSM Access network. 3 Traffic Models for the Air interface 4 Models for the BSS design. 5 UMTS and the path
More informationLTE Security How Good Is It?
LTE Security How Good Is It? Michael Bartock IT Specialist (Security) National Institute of Standards & Technology Jeffrey Cichonski IT Specialist (Security) National Institute of Standards & Technology
More informationDelivery of Voice and Text Messages over LTE
Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a
More informationUMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen
UMTS/GPRS system overview from an IP addressing perspective David Kessens Jonne Soininen Introduction 1) Introduction to 3GPP networks (GPRS, UMTS) Technical overview and concepts for 3GPP networks Mobility
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationUsing TEMS Pocket. Johan Montelius
Using TEMS Pocket Johan Montelius Introduction In this laboration you will get acquainted with the TEMS Pocket tool. You will examine both the Monaco network and a commercial network. Since this is your
More informationintroduction to femtocells
.. introduction to femtocells Kévin Redon Technische Universität Berlin, Security in Telecommunications femtocell@sec.t-labs.tu-berlin.de OsmoDevCon 2012, Berlin, 24th March 2012 UMTS architecture SecT
More informationIAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner johannes.feichtner@iaik.tugraz.at IAIK
Motivation 2 Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at What you have heard last time Mobile devices: Short history, features Technical evolution, major OS,
More informationPractical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils
Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils 06/11/2012 1 Today s Talk Intro to LTE Networks Technical Details Attacks and Testing Defences Conclusions
More informationEPS and Network Engineering
Introduction This application note explains the functions and applications of a powerful unique feature of the SeeGull EX and MX Scanning Receivers: the Enhanced Power Scan (EPS). Unlike standard tools,
More informationLTE and IMSI catcher myths
LTE and IMSI catcher myths Ravishankar Borgaonkar, Altaf Shaik, N. Asokan, ValAeri Niemi, Jean- Pierre Seifert Blackhat EU, Amsterdam, Netherlands 13 November 2015 Outline Fake base stamons in GSM/3G LTE/4G
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular
More informationETSI TS 129 118 V11.8.0 (2013-10)
TS 129 118 V11.8.0 (2013-10) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Mobility Management Entity (MME) - Visitor Location Register (VLR) SGs interface specification
More information5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network
5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:
More informationProtocol Signaling Procedures in LTE
White Paper Protocol Signaling Procedures in LTE By: V. Srinivasa Rao, Senior Architect & Rambabu Gajula, Lead Engineer Overview The exploding growth of the internet and associated services has fueled
More informationCh 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98
Ch 2.3.3 GSM In the early 80 s the European community decided to work together to define a cellular system that would permit full roaming in all countries and give the network providers freedom to provide
More informationMobile@Home GSM services over wireless LAN
Mobile@Home GSM services over wireless LAN Martin Bäckström, Andreas Havdrup, Tomas Nylander, Jari Vikberg and Peter Öhman What do you get when you combine mobile telephony with voice over IP (VoIP)? Mobile@Home.
More informationHandoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering
Handoff in GSM/GPRS Cellular Systems Avi Freedman Hexagon System Engineering Outline GSM and GSM referemce model GPRS basics Handoffs GSM GPRS Location and Mobility Management Re-selection and routing
More informationChapter 2 Mobility Management for GPRS and UMTS
Chapter 2 Mobility Management for GPRS and UMTS Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 2.1 Network Architectures 2.2 Concepts
More informationETSI TS 123 251 V6.5.0 (2005-09)
TS 123 251 V6.5.0 (2005-09) Technical Specification Universal Mobile Telecommunications System (UMTS); Network sharing; Architecture and functional description (3GPP TS 23.251 version 6.5.0 Release 6)
More informationGeneral Packet Radio Service (GPRS): Mobility- and Session Management
ehrstuhl für ommunikationsnetze Prof. Dr.-Ing. Jörg Eberspächer General Packet Radio Service (GPRS): Mobility- and Session Management ITG-Fachgruppe 5.2.4 "IP und Mobility June 20, 2001. Tagung amp-intfort
More informationNTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications
M2M 3GPP Standardization Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends Core Network Infrastructure and Congestion Control Technology for M2M Communications The number
More informationCustomer Training Catalog Training Programs WCDMA RNP&RNO Technical Training
Customer Training Catalog Training Programs Customer Training Catalog Training Programs WCDMA RNP&RNO Technical Training HUAWEI Learning Service 2015 COMMERCIAL IN CONFIDENCE 1 Customer Training Catalog
More informationLong-Term Evolution. Mobile Telecommunications Networks WMNet Lab
Long-Term Evolution Mobile Telecommunications Networks WMNet Lab Background Long-Term Evolution Define a new packet-only wideband radio with flat architecture as part of 3GPP radio technology family 2004:
More informationSecurity Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils
Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils 11/09/2012 1 Today s Talk Intro to 4G (LTE) Networks Technical Details Attacks and Testing Defences Conclusions 11/09/2012
More informationMobile Phone Security. Hoang Vo Billy Ngo
Mobile Phone Security Hoang Vo Billy Ngo Table of Content 1. Introduction Page 2 1.1 Analog Network Page 2 1.2 Digital Network Page 2 2. Security Protocols Page 4 2.1 Analog Page 4 2.2 Digital Page 5 3.
More informationALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel.
Contact: ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel.be Voice over (Vo) was developed at some universities to diminish
More informationSecurity of phone communications
Security of phone communications Authentication, identification and mobile security Matej Kovačič (CC) 2015 This work is published under Creative Commons licence: AttributionNonCommercial-ShareAlike 2.5
More informationASR 5x00 Series SGSN Authentication and PTMSI Reallocation Best Practices
ASR 5x00 Series SGSN Authentication and PTMSI Reallocation Best Practices Document ID: 119148 Contributed by Krishna Kishore DV, Sujin Anagani, and Parthasarathy M, Cisco TAC Engineers. Jun 12, 2015 Contents
More informationMobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
More informationWHITE PAPER. August, 2002. Contacts: Christopher Wingert Mullaguru Naidu
C D M A 1 X R T T S E C U R I T Y WHITE PAPER O V E R V I E W August, 2002 Contacts: Christopher Wingert Mullaguru Naidu T A B L E O F C O N T E N T S 1. Executive Summary 2 2. Security CDMA Networks 3
More informationBasic Network Design
Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. It uses radio frequencies
More informationChapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks
Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National
More informationWireless Security: Token, WEP, Cellular
Wireless Security: Token, WEP, Cellular 27 May 2015 Lecture 9 Some slides adapted from Jean-Pierre Seifert (TU Berlin) 27 May 2015 SE 425: Communication and Information Security 1 Topics for Today Security
More informationPrivacy through Pseudonymity in Mobile Telephony Systems
Privacy through Pseudonymity in Mobile Telephony Systems Eike Ritter University of Birmingham Joint work with Myrto Arapinis, Loretta Mancini and Mark Ryan Eike Ritter Privacy in Mobile Telephony Systems
More informationOpenBTS and the Future of Cellular Networks
OpenBTS and the Future of Cellular Networks Overview Range Networks is a new breed of network equipment provider. It is meeting the demand for low cost, easy to install GSM cellular networks for remote
More informationTopics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
More informationAdvanced SIP Series: SIP and 3GPP Operations
Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.
More information2 System introduction
2 System introduction Objectives After this chapter the student will: be able to describe the different nodes in a GSM network. be able to describe geographical subdivision of a GSM network. be able to
More informationSecurity Measures and Weaknesses of the GPRS Security Architecture
Security Measures and Weaknesses of the GPRS Security Architecture Christos Xenakis Security Group, Communication Networks Laboratory, Department of Informatics & Telecommunications, University of Athens,
More informationThe GSM and GPRS network T-110.300/301
The GSM and GPRS network T-110.300/301 History The successful analog 1:st generation mobile telephone systems proved that there is a market for mobile telephones ARP (AutoRadioPuhelin) in Finland NMT (Nordic
More informationAgilent Network Monitoring Content Intercept Manager
Agilent Network Monitoring Content Intercept Manager Enabling Lawful Intercept agencies to keep pace with evolving cellular networks CIM is a flexible tool allowing precise and secure lawful interception
More informationATCN 2014: SDN - Mobility and SDN: Mobility Management and Mobile Networks
ATCN 2014: SDN - Mobility and SDN: Mobility Management and Mobile Networks Karin Anna Hummel, ETH Zurich (thanks to Vasileios Kotronis for some material) November 10, 2014 1 Locating and Connecting 2 Wireless
More information2G Mobile Communication Systems
2G Mobile Communication Systems 2G Review: GSM Services Architecture Protocols Call setup Mobility management Security HSCSD GPRS EDGE References Jochen Schiller: Mobile Communications (German and English),
More informationU.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD
U.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD [0001] The disclosure relates to mobile networks and, more specifically, to wireless
More information(U)SimMonitor: A Mobile Application for Security Evaluation of Cellular Networks
(U)SimMonitor: A Mobile Application for Security Evaluation of Cellular Networks Christos Xenakis, Christoforos Ntantogian, Orestis Panos Department of Digital Systems, University of Piraeus Piraeus, Greece
More informationMinimization of Drive Tests (MDT) in Mobile Communication Networks
Minimization of Drive Tests (MDT) in Mobile Communication Networks Daniel Baumann Supervisor: Tsvetko Tsvetkov Seminar Future Internet WS2013/2014 Chair for Network Architectures and Services Department
More informationSS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 akg0x11@gmail.com Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
More informationDepartment of Public Safety and Correctional Services. Non-Jamming Cell Phone Pilot Summary
Department of Public Safety and Correctional Services Non-Jamming Cell Phone Pilot Summary January 20, 2010 INTRODUCTION The Department s Cell Phone Pilot is a follow-up to the September 2009 Cell Phone
More informationRADIUS. Brief brochure. Product Purpose
Product Purpose The Product is designed for searching, intercepting, registering and analyzing of communication sessions as well as service information circulating in cellular GSM networks without encryption
More informationLTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks
LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks 1 Nokia Siemens Networks New evolved Networks - new security needs Walled Garden Transport & Protocols
More informationENGN4536 Mobile Communications
ENGN4536 Mobile Communications Dr Thushara Abhayapala Department of Engineering Faculty of Engineering & Information Technology Australian National University thushara@faceng.anu.edu.au http://www.webct.anu.edu.au
More informationCS 8803 - Cellular and Mobile Network Security: GSM - In Detail
CS 8803 - Cellular and Mobile Network Security: GSM - In Detail Professor Patrick Traynor 9/27/12 Cellular Telecommunications Architecture Background Air Interfaces Network Protocols Application: Messaging
More informationProduct Description. HiLink E3531 HSPA+ USB Stick V100R001 HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2013-6-13
HiLink E3531 HSPA+ USB Stick V100R001 Issue 01 Date 2013-6-13 HUAWEI TECHNOLOGIES CO., LTD. Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. Please feel
More informationMobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
More informationMobile self- defense. Karsten Nohl <nohl@srlabs.de> SRLabs Template v12
Mobile self- defense Karsten Nohl SRLabs Template v12 Agenda SS7 a0acks 3G security Self- defense opfons 2 SS7 network enables exchange of SMS and cryptographic keys Mobile operator Exchange
More informationMobile Devices Security: Evolving Threat Profile of Mobile Networks
Mobile Devices Security: Evolving Threat Profile of Mobile Networks SESSION ID: MBS-T07 Anand R. Prasad, Dr.,ir., Selim Aissi, PhD Objectives Introduction Mobile Network Security Cybersecurity Implications
More informationMobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu
Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu Market GSM Overview Services Sub-systems Components Prof. Dr.-Ing. Jochen
More informationCourse Curriculum for Master Degree in Electrical Engineering/Wireless Communications
Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications The Master Degree in Electrical Engineering/Wireless Communications, is awarded by the Faculty of Graduate Studies
More informationETSI TS 133 107 V3.1.0 (2000-12)
TS 133 107 V3.1.0 (2000-12) Technical Specification Universal Mobile Telecommunications System (UMTS); 3G Security; Lawful Interception Architecture and Functions (3GPP TS 33.107 version 3.1.0 Release
More information