Security of phone communications
|
|
|
- Karin Elliott
- 10 years ago
- Views:
Transcription
1 Security of phone communications Authentication, identification and mobile security Matej Kovačič (CC) 2015 This work is published under Creative Commons licence: AttributionNonCommercial-ShareAlike 2.5 Slovenia. Full legal text of the licence is available on a website: < Pictures: (CC) OpenClipArt.org, Matej Kovačič, Jaka Hudoklin (personal archive) and quoted authors (C).
2 Authentication and identification Authentication: a proof that message originated from holder of some given secret. Identification: a nontransferable proof that the other pa rty knows some given secret (wit hout revealing secret) Identification requires that the verifier check the info rmation presented against all th e entities it knows about. Authen tication requires that the inform ation be checked for a single, pr eviously identified entity.
3 Spoofing the identity of SMS sender
4 Sending of SMS from arbitrary number < username=xxxxxxxx&password=xxxxxxxxx&from=phrea ker&to= &text=sending%20of%20sms %20from%20number%20which%20is%20not%20a %20number.> EAS Y AS PIE!
5 Sending of SMS from arbitrary number
6 Spoofing the identity of a caller
7 Calling with arbitrary caller ID 1: setting-up the infrastructure phone network internet VPN
8 Calling with arbitrary caller ID 2: look into the virtual PBX
9 Calling with arbitrary caller ID 3: result on a phone [video]
10 Calling with arbitrary caller ID 4: traffic data recorded by the mobile provider
11 Practical»use«:-)
12 What does it means for the data retention measures and eavesdropping?
13 Courts tend to regard computer-generated materials as inherently trustworthy evidence. This has consequences for court procedure. In a court witnesses are sworn in and crossexamined to expose biases and conflicts. But what about software as a witness? Sergey Bratus, Ashlyn Lembree in Anna Shubina Software on the Witness Stand: What Should It Take for Us to Trust It?
14 Mobile identity spoofing
15 Mobile identity spoofing in GSM network (without possession of mobile phone and/or SIM card) [Vulrenabilities were fixed in most of Slovenian GSM networks, procedure is not working anymore. However, similar attacks could be possible via SS7 abuse...]
16 Mobile phone with Calypso chipset...
17 ...USRP, HackRF and HackRF clones Rad10 - HackRF clone.
18 RTL-SDR DVB-T with Elonics 4000 chipset.
19 GSM analysis with RTL-SDR Airprobe RTL-SDR
20 Use of weak encryption (A5/1)
21 Locating of user in mobile network We start sending silent SMS'es to a mobile number. During this we observe which TMSI number is receiving (encrypted) data. GSM network TMSI Mobile phone user does not detect reception of silent SMS. silent SMS Osmocom
22 Capture and cryptanalysis of A5/1 5. A3 GSM network 16 BE AF encrypted data C3 D C C8 C8 C3 29 2B 2B 2B 2B 2B CONTENT OF DATA BURST IN GSM 72 FE BC C4 2B Kraken From the air we passively capture encrypted data packets. With the help of guessing the contents of the GSM burst (guessing the padding bits) we calculate one-time encryption key. We use cryptanalysis to reconstruct session key Kc. In the process we need no access to the SIM card, mobile phone or mobile network! Kc
23 Cracking A5/1 session key Kc in a practice Cracking (cryptanalysis) with Kraken and predictions we are using in our gsmcrack.py...
24 Cracking A5/1 session key Kc in a practice and decrypted SMS message (received through 2G network). Application gsmcrack.py automatically identifies the TMSI number from the phone number (by sending silent SMS's). When we have TMSI of the target, our application is able to automatically follow the phone to an assigned dedicated channel and record encrypted message.
25 Mobile identity in mobile network Users in the mobile network does not identify themselves by the phone number, but with the IMSI and TMSI number. Important parameters are also the encryption key Kc and the Key sequence number. GSM network IMSI, TMSI, Kc, Key sequence number
26 Mobile identity spoofing If Kc does not change by every transaction, mobile identity can be easily spoofed. First, we have to identify IMSI number of our target HLR lookup HLR lookup is done through web service we get IMSI number.
27 SIM spoof Mobile identity spoofing with sim spoof command. For spoofing we need IMSI number (SS7 lookup), TMSI number (from the network), session key (we chack it) and key sequence number (from the network). In networks with A5/0 we need only TMSI and key sequence number no cryptanalysis needed!
28 Mobile identity spoofing Two SMS messages sent by spoofed mobile identity. Similarly it is possible to spoof voice calls too. [video]
29 SS7 attacks
30 Attacks on mobile networks through SS7 Signaling System 7 (SS7) is an architecture for performing out-of-band signaling in support of the call-establishment, billing, routing, and information-exchange functions of the public switched telephone network. Support for mobile telephony (roaming, SMS, data) has been added in 1990's and 2000's. Through SS7 it is possible to access Home Location Register, Visitor Location Register and Mobile Switching Center...
31 Attacks on mobile networks through SS7 With abuse of CAMEL protocol (Customised Applications for Mobile networks Enhanced Logic) it is possible to intercept outgoing calls: legitimate use: user who uses roaming in foreign country wants to call local number. MSC asks gsmscf (GSM Service Control Function) in his home network what to do with number in local format. gsmscf rewrites number in international format and forwards this number to MSC to call. attack: all calls are routed to the attacker with false gsmscf address rewrite. Attacker intercept the call and target it to its final destination.
32 Attacks on mobile networks through SS MSC, gsmscf
33 Attacks on mobile networks through SS7 Incoming calls interception is also possible: attacker pretends that user is roaming in his network. This is possible because SS7 updatelocation command is not authenticated attacker can send updatelocation command with his global title to user's HLR. All calls and SMS messages are now routed to the attacker. Consequences for two-factor authentication systems (mtan,...)?
34 Attack on mobile networks through SS7 TMSI deanonimisation and encryption key stealing: attacker intercepts TMSI number (for instance with OsmocomBB or RTL-SDR equipment)... attacker asks MSC for IMSI number og a giver TMSI number... with updatelocation command attacker can get phone number of user (MSISDN)... when attacker sends sendidentification SS7 request, MSC returns even session encrpyption key (Kc) of the user! Result: passive eavesdropping of mobile communications is possible and also mobile identity spoofing.
35 But there's an old saying inside the NSA: "Attacks always get better; they never get worse." --Bruce Schneier
36 ! D E T S U B Questions? Ilustracija: (CC) DeviantArt
SS7: Locate. Track. Manipulate.
You have a remote-controlled tracking device in your pocket Tobias Engel @2b_as 2 Signalling System #7 Protocol suite used by most telecommunications network operators throughout the world
Defending mobile phones. Karsten Nohl, [email protected] Luca Melette, [email protected]
Defending mobile phones Karsten Nohl, [email protected] Luca Melette, [email protected] GSM networks provide the base for various attacks SS7 Phone Base station GSM backend network User database (HLR) Vulnerability
GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010
Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010 Dennis Wehrle, Konrad Meier, Dirk von Suchodoletz, Klaus Rechert, Gerhard Schneider Overview 1. GSM Infrastructure
Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek
Mobile Security Practical attacks using cheap equipment Presented the 07/06/2016 Business France By Sébastien Dudek For Content Security measures Recent publications in the hacking community Practical
Mobile network security report: Poland
Mobile network security report: Poland GSM Map Project [email protected] Security Research Labs, Berlin February 2015 Abstract. Mobile networks differ widely in their protection capabilities against common
GSM security country report: USA
GSM security country report: USA GSM Map Project [email protected] Security Research Labs, Berlin August 2013 Abstract. GSM networks differ widely in their protection capabilities against common attacks.
Global System for Mobile Communication Technology
Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special
Mobile network security report: Belgium
Mobile network security report: Belgium GSM Map Project [email protected] Security Research Labs, Berlin December 2014 Abstract. Mobile networks differ widely in their protection capabilities against common
GSM security country report: Germany
GSM security country report: Germany GSM Map Project [email protected] Security Research Labs, Berlin December 2013 Abstract. GSM networks differ widely in their protection capabilities against common attacks.
An Example of Mobile Forensics
An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk [email protected] www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network
Mobile network security report: Netherlands
Mobile network security report: Netherlands GSM Map Project [email protected] Security Research Labs, Berlin July 2014 Abstract. Mobile networks differ widely in their protection capabilities against common
Mobile network security report: Germany
Mobile network security report: Germany GSM Map Project [email protected] Security Research Labs, Berlin December 2014 Abstract. Mobile networks differ widely in their protection capabilities against common
Mobile network security report: Poland
Mobile network security report: Poland GSM Map Project [email protected] Security Research Labs, Berlin October 2014 Abstract. Mobile networks differ widely in their protection capabilities against common
GSM and UMTS security
2007 Levente Buttyán Why is security more of a concern in wireless? no inherent physical protection physical connections between devices are replaced by logical associations sending and receiving messages
Worldwide attacks on SS7 network
Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin ([email protected]) Alexandre De Oliveira ([email protected]) Agenda Overall telecom architecture Architecture
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS
Implementing roaming for OpenBTS 1 Introduction One of the main advantages of OpenBTS TM system architecture is absence of a legacy GSM core network. SIP is used for registering, call control and messaging.
SIGNALING SYSTEM 7 (SS7) SECURITY REPORT
SIGNALING SYSTEM 7 () SECURITY REPORT Page CONTENTS. Introduction. Summary 4. Research methodology 5 Preconditions for attacks 5 An attacker s profile 5 Resources required 5 4. Research overview 6 4..
Feature and Technical
BlackBerry Mobile Voice System for SIP Gateways and the Avaya Aura Session Manager Version: 5.3 Feature and Technical Overview Published: 2013-06-19 SWD-20130619135120555 Contents 1 Overview...4 2 Features...5
GSM Databases. Virginia Location Area HLR Vienna Cell Virginia BSC. Virginia MSC VLR
Update ( Update Procedure) Network Mobiles Maryland Maryland Other Rockville Bethesda Maryland Mobile Mobile Cell Cell HLR Vienna Cell 12-Jun-14 22:48 (Page 1) This sequence diagram was generated with
International Journal of Computing and Business Research (IJCBR)
AN INVESTIGATION OF GSM ARCHITECTURE AND OVERLAYING WITH EFFICIENT SECURITY PROTOCOL Karun Madan, Surya World Institute of Engg. & Technology, Rajpura, Punjab ABSTRACT The Global System for Mobile Communications
Mobile network security report: Greece
Mobile network security report: Greece GSM Map Project [email protected] Security Research Labs, Berlin October 2012 Abstract. Mobile networks differ widely in their protection capabilities against common
SPYTEC 3000 The system for GSM communication monitoring
SPYTEC 3000 The system for GSM communication monitoring The SPYTEC 3000 system is intended for passive (if system encryption is absent of if A5.2 encryption is used) or semi-active (if A5.1 encryption
29.09.2015. Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy
29.09.2015 Digital Communications Exploring SS7 signaling fraud that threatens mobile Mobile communications is a prime target for hackers who desire to penetrate critical infrastructures and businesses
Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, 2001. GSM Location System Syslog XP 3.
Participant: Hack contacting... IT-Security: Theory and Practice Mobile Communication December 18, 2001 Uwe Jendricke [email protected] Lecture Homepage: http://www.informatik.uni-freiburg.de/~softech/teaching/ws01/itsec/
Locating Mobile Phones using Signalling System #7. Tobias Engel <[email protected]> twitter: @2b_as
Locating Mobile Phones using Signalling System #7 Tobias Engel twitter: @2b_as What is Signalling System #7? protocol suite used by most telecommunications operators throughout the world
Mobile network security report: Norway
Mobile network security report: Norway GSM Map Project [email protected] Security Research Labs, Berlin August 2014 Abstract. Mobile networks differ widely in their protection capabilities against common
Mobile Communications
October 21, 2009 Agenda Topic 2: Case Study: The GSM Network 1 GSM System General Architecture 2 GSM Access network. 3 Traffic Models for the Air interface 4 Models for the BSS design. 5 UMTS and the path
UMTS security. Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003
UMTS security Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003 Contents UMTS Security objectives Problems with GSM security UMTS security mechanisms
TELECOMMUNICATIONS REGULATORY AUTHORITY BAHRAIN. Bahrain Number Portability Implementation Routing and Charging specification
TELECOMMUNICATIONS REGULATORY AUTHORITY BAHRAIN Bahrain Number Portability Implementation Routing and Charging specification Version: 0.4 Status: draft Date: 4-0-00 Modification History Issue Date Modification
Global System for Mobile Communications (GSM)
Global System for Mobile Communications (GSM) Nguyen Thi Mai Trang LIP6/PHARE [email protected] UPMC/PUF - M2 Networks - PTEL 1 Outline Principles of cellular networks GSM architecture Security
Ch 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98
Ch 2.3.3 GSM In the early 80 s the European community decided to work together to define a cellular system that would permit full roaming in all countries and give the network providers freedom to provide
SIP and VoIP 1 / 44. SIP and VoIP
What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies
Encrypted SMS, an analysis of the theoretical necessities and implementation possibilities
Radboud University Nijmegen Bachelor Thesis Encrypted SMS, an analysis of the theoretical necessities and implementation possibilities Author: Lars Lockefeer Supervisors: Engelbert Hubbers Roel Verdult
Evaluating GSM A5/1 security on hopping channels
Evaluating GSM A5/1 security on hopping channels Bogdan Diaconescu v1.0 This paper is a practical approach on evaluating A5/1 stream cipher on a GSM hopping network air interface called Um. The end goal
Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers
Protecting Mobile Networks from SS7 Attacks Telesoft White Papers Christian Feest 23rd June 2015 SS7 Networks The Challenge The problem with the current SS7 system is that messages can be altered, injected
Wireless and Mobile Network Architecture
Wireless and Mobile Network Architecture Chapter 7: GSM Network Signaling Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Nov. 2006 1 Outline
House intercoms attacks
House intercoms attacks When frontdoors become backdoors Presented the 02/07/2016 NDH 2016 By Sébastien Dudek For About me Company: Synacktiv Interests: radio-communications (Wi-Fi, RFID, GSM, PLC...),
Wireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
SS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu
Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu Market GSM Overview Services Sub-systems Components Prof. Dr.-Ing. Jochen
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
Network Security. Chapter 14. Security Aspects of Mobile Communications
Network Security Chapter 14 Security Aspects of Mobile Communications Network Security (WS 2002): 14 Security Aspects of Mobile Communications 1 Security Aspects of Mobile Communication Mobile communication
Security in the GSM Network
Security in the GSM Network Ammar Yasir Korkusuz 2012 Bogazici University, Electrical-Electronics Engineering Department, MSc. Student EE 588 NETWORK SECURITY TERM PROJECT Abstract: GSM is the biggest
@msecnet / www.m-sec.net. Bogdan ALECU
Business logic flaws in mobile operators services Bogdan Alecu About me Independent security researcher Sysadmin Passionate about security, specially when it s related to mobile devices; started with NetMonitor
Mobile Phone Security. Hoang Vo Billy Ngo
Mobile Phone Security Hoang Vo Billy Ngo Table of Content 1. Introduction Page 2 1.1 Analog Network Page 2 1.2 Digital Network Page 2 2. Security Protocols Page 4 2.1 Analog Page 4 2.2 Digital Page 5 3.
GSM and IN Architecture
GSM and IN Architecture a common component: TCAP [email protected] Rka S-2007 Signaling Protocols 8-1 GSM system consists of sub-systems MS = ME+SIM Radio or Air i/f Base Station Sub-system (BSS)
Software on the witness stand: what should it take for us to trust it? Sergey Bratus & Anna Shubina, Dartmouth Ashlyn Lembree, Franklin Pierce Law
Software on the witness stand: what should it take for us to trust it? Sergey Bratus & Anna Shubina, Dartmouth Ashlyn Lembree, Franklin Pierce Law Why we are here You are experts on which kinds of software
EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server
Application Note EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server Introduction The demand for wireless LAN (WLAN) access to the public IP network is growing rapidly. It is only
Global System for Mobile Communication (GSM)
Global System for Mobile Communication (GSM) Li-Hsing Yen National University of Kaohsiung GSM System Architecture Um (ME/SIM) C E C PSTN, ISDN, PSPDN, CSPDN A-bis A F A-bis C B BTS BSS BSC HLR VLR EIR
Mobile Phone Network Security
Mobile Phone Network Security Internet Security [1] VU Adrian Dabrowski, Markus Kammerstetter, Georg Merzdovnik, Stefan Riegler and Aljosha Judmayer [email protected] Mobile phone networks 1G
Notes on Network Security - Introduction
Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network
Karsten Nohl, [email protected]. Breaking GSM phone privacy
arsten Nohl, [email protected] Breaking GSM phone privacy GSM is global, omnipresent and wants to be hacked 80% of mobile phone market 200+ countries 5 billion users! GSM encryption introduced in 1987
User Authentication Guidance for IT Systems
Information Technology Security Guideline User Authentication Guidance for IT Systems ITSG-31 March 2009 March 2009 This page intentionally left blank March 2009 Foreword The User Authentication Guidance
GSM Risks and Countermeasures
GSM Risks and Countermeasures STI Group Discussion and Written Project Authors: Advisor: Johannes Ullrich Accepted: February 1, 2010 Abstract Recent research has shown that GSM encryption can be cracked
Mobile self- defense. Karsten Nohl <[email protected]> SRLabs Template v12
Mobile self- defense Karsten Nohl SRLabs Template v12 Agenda SS7 a0acks 3G security Self- defense opfons 2 SS7 network enables exchange of SMS and cryptographic keys Mobile operator Exchange
(U)SimMonitor: A Mobile Application for Security Evaluation of Cellular Networks
(U)SimMonitor: A Mobile Application for Security Evaluation of Cellular Networks Christos Xenakis, Christoforos Ntantogian, Orestis Panos Department of Digital Systems, University of Piraeus Piraeus, Greece
CS 8803 - Cellular and Mobile Network Security: GSM - In Detail
CS 8803 - Cellular and Mobile Network Security: GSM - In Detail Professor Patrick Traynor 9/27/12 Cellular Telecommunications Architecture Background Air Interfaces Network Protocols Application: Messaging
Mobile SMS and Data Roaming Explained
Mobile SMS and Data Roaming Explained Mobile SMS and data roaming explained Roaming is the ability of customers to use their mobile phones or other mobile devices outside the geographical coverage area
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec
CSCI 454/554 Computer and Network Security Topic 8.1 IPsec Outline IPsec Objectives IPsec architecture & concepts IPsec authentication header IPsec encapsulating security payload 2 IPsec Objectives Why
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
Khomp KGSM-USB SPX and Elastix Server
Khomp KGSM-USB SPX and Elastix Server Setup Guide http://www.elastix.org 1.0 Setup Diagram Figure 1-1 is a setup diagram for a single Khomp KGSM-USB SPX Interface Card configuration. Figure 1-1. Setup
GSM System Architecture
Intersystem Operation and Mobility Management David Tipper Associate Professor Graduate Program in Telecommunications and Networking University it of Pittsburgh Telcom 2700 Slides 6 http://www.tele.pitt.edu/tipper.html
Secure Voice v 1.1 Mobile conversation encryption for Symbian Smartphones
Secure Voice v 1.1 Mobile conversation encryption for Symbian Smartphones www.5pro-software.com General Info about Secure Voice Enterprise solution for mobile conversation security Secures sensitive information
Monitoring mobile communication network, how does it work? How to prevent such thing about that?
Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘 維 亞 周 明 哲 劉 子 揚 (P78017058) (P48027049) (N96011156) 1 Contents How mobile communications work Why monitoring?
A Framework for Secure and Verifiable Logging in Public Communication Networks
A Framework for Secure and Verifiable Logging in Public Communication Networks Vassilios Stathopoulos, Panayiotis Kotzanikolaou and Emmanouil Magkos {v.stathopoulos, p.kotzanikolaou}@adae.gr [email protected]
VOIP Security Essentials. Jeff Waldron
VOIP Security Essentials Jeff Waldron Traditional PSTN PSTN (Public Switched Telephone Network) has been maintained as a closed network, where access is limited to carriers and service providers. Entry
Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM
Lecture overview History of cellular systems (1G) GSM introduction Basic architecture of GSM system Basic radio transmission parameters of GSM Analogue cellular systems 70 s In the early 70 s radio frequencies
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
VoIP Security Threats and Vulnerabilities
Abstract VoIP Security Threats and Vulnerabilities S.M.A.Rizvi and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, UK e-mail: [email protected] This paper presents the
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
The GSM and GPRS network T-110.300/301
The GSM and GPRS network T-110.300/301 History The successful analog 1:st generation mobile telephone systems proved that there is a market for mobile telephones ARP (AutoRadioPuhelin) in Finland NMT (Nordic
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography
Mobility Management 嚴 力 行 高 雄 大 學 資 工 系
Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management in Cellular Systems Cellular System HLR PSTN MSC MSC VLR BSC BSC BSC cell BTS BTS BTS BTS MT BTS BTS BTS BTS HLR and VLR HLR (Home Location Register)
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Cellular Network Organization
Cellular Networks Cellular Network Organization Use multiple low-power transmitters (100 W or less) Areas divided into cells o Each served by its own antenna o Served by base station consisting of transmitter,
Wireless Phone GSM tracking. Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim
Wireless Phone GSM tracking Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim Can someone track your phone? GPS Need access to phone Cell network trilateration/triangulation Multiple base stations
Verint GI2. Gi2 Features. 2010 Verint Systems Inc. All rights reserved.
Verint GI2 Gi2 Features 2010 Verint Systems Inc. All rights reserved. Channelyser Function The Channelyser allows the user to interrogate the local networks and display the Broadcast information. This
Threats to be considered (1) ERSTE GROUP
VoIP-Implementation Lessons Learned Philipp Schaumann Erste Group Bank AG Group IT-Security [email protected] http://sicherheitskultur.at/ Seite 1 Threats to be considered (1) Eavesdropping
Wireless Security: Token, WEP, Cellular
Wireless Security: Token, WEP, Cellular 27 May 2015 Lecture 9 Some slides adapted from Jean-Pierre Seifert (TU Berlin) 27 May 2015 SE 425: Communication and Information Security 1 Topics for Today Security
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Chapter 37. Secure Networks
Chapter 37 Network Security (Access Control, Encryption, Firewalls) Secure Networks Secure network is not an absolute term Need to define security policy for organization Network security policy cannot
TETRA Security. TETRA MoU Association Association House South Park Road Macclesfield Sk11 6SH England
TETRA Security TETRA MoU Association Association House South Park Road Macclesfield Sk11 6SH England www.tetramou.com February 2006 TETRA Security Page 2 of 2 1 The TETRA security functions TETRA contains
2 System introduction
2 System introduction Objectives After this chapter the student will: be able to describe the different nodes in a GSM network. be able to describe geographical subdivision of a GSM network. be able to
End-2-End QoS Provisioning in UMTS networks
End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Security Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc.
Security Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc. Executive Summary IFONE provides securable private cellular networks. It presents this paper
CS Fallback Function for Combined LTE and 3G Circuit Switched Services
EPC Voice over Circuit Switched Services Special Articles on SAE Standardization Technology CS Fallback Function for Combined and Circuit Switched Services The PP, an international standardization body
