Let Me Answer That for You: Exploiting Broadcast Information in Cellular Networks

نویسندگان

  • Nico Golde
  • Kevin Redon
  • Jean-Pierre Seifert
چکیده

Mobile telecommunication has become an important part of our daily lives. Yet, industry standards such as GSM often exclude scenarios with active attackers. Devices participating in communication are seen as trusted and non-malicious. By implementing our own baseband firmware based on OsmocomBB, we violate this trust and are able to evaluate the impact of a rogue device with regard to the usage of broadcast information. Through our analysis we show two new attacks based on the paging procedure used in cellular networks. We demonstrate that for at least GSM, it is feasible to hijack the transmission of mobile terminated services such as calls, perform targeted denial of service attacks against single subscribers and as well against large geographical regions within a metropolitan area.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fuzzy based efficient drone base stations (DBSs) placement in the 5G cellular network

Currently, cellular networks are one of the essential communication methods for people. Providing proper coverage for the users and also offering high-quality services to them are two of the most important issues of concern in cellular networks. The fifth-generation cellular communication networks can provide higher data transmission rates, which lead to a higher quality of service but this hig...

متن کامل

Effects of Sowing Methods on the Quality and Quantity Traits of Three Annual Medicago Species

ABSTRACT- Annual Medicago species (Medicago spp.) are native to the Mediterranean region and widely used in fields and pastures in Iran. There are several methods of sowing annual Medicago species, each with different effects on the performance. However, there is currently no sufficient information about the appropriate methods for sowing Medicago species. In order to evaluate methods of sowing...

متن کامل

Toward an energy efficient PKC-based key management system for wireless sensor networks

Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...

متن کامل

Can Patterns Be Harmful

Let me answer this question unequivocally. It depends. Figured out I’m a consultant yet? Actually, let me explain. It does depend. It depends on what you think patterns are. Many people have a misunderstanding of patterns, and for those people, patterns can be harmful. However, when people get past their early understanding of patterns and come to comprehend them in a richer way, patterns canno...

متن کامل

Therapeutic CPR or consent DNR--a dilemma looking for an answer.

Doctor: As you know, you have severe emphysema and you will need to be on oxygen around the clock. JW: Yes, I know that. I am hardly able to move. I can’t finish a sentence without getting short of breath. Doctor: You must stop smoking. JW: I cannot and I will not. This is the only source of joy for me now. I know it is killing me. But I want you to know that I do not want to be placed on the v...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013