Threats and Countermeasures in GSM Networks

نویسندگان

  • Valer Bocan
  • Vladimir Cretu
چکیده

Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of service (DOS) attacks will evolve into a critical danger as the availability of mobile networks becomes more and more important for the modern information society. This paper outlines a critical flaw in GSM networks which opens the avenue for distributed denial of service attacks. We propose a way to mitigate the attacks by adding minimal authentication to the GSM channel assignment protocol. Keywords–security, denial of service, attack, wireless networks, GSM, GPRS, 2G, DREAD

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Security and Denial of Service Threats in GSM Networks

Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of service (DoS) attacks will evolve into a critical danger as the availability of mobile networks becomes more and more important for the modern information society. This paper outlines a series of flaws in such networks, partic...

متن کامل

Securing VoIP Networks using graded Protection Levels

This contribution evaluates the security of VoIP networks. Potential threats to VoIP networks lead to unbearable risks which need to be eliminated by suitable countermeasures. However, cost and complexity of countermeasures should be adapted to the practical situation. Therefore the protection requirements are assessed. In this contribution the range of possible protection requirements is divid...

متن کامل

Response Mechanism for Defending Computer Networks

With the significant reliance of proactive monitoring of computer networks on security information management systems, a requirement is to provide appropriate and comprehensive countermeasures to perceived threats on the entire network. A security response mechanism is proposed that combines both generic and fuzzy response models to provide automated (static and dynamic) security countermeasure...

متن کامل

Security Attacks and Countermeasures for Wireless Sensor Networks: Survey

The security topic is a conclusive challenge for Wireless Sensor Networks (WSNs) due to the deployment nature and the resources limitations of wireless sensor devices used in such networks. Wireless Sensor Networks are used sometime in very sensitive applications, such as military, airports, and healthcare. Therefore, we must address the security concerns from the beginning of network design. D...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JNW

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2006