Eavesdropping on GSM: state-of-affairs

نویسنده

  • Fabian van den Broek
چکیده

In the almost 20 years since GSM was deployed several security problems have been found, both in the protocols and in the originally secret cryptography. However, practical exploits of these weaknesses are complicated because of all the signal processing involved and have not been seen much outside of their use by law enforcement agencies. This could change due to recently developed open-source equipment and software that can capture and digitize signals from the GSM frequencies. This might make practical attacks against GSMmuch simpler to perform. Indeed, several claims have recently appeared in the media on successfully eavesdropping on GSM. When looking at these claims in depth the conclusion is often that more is claimed than what they are actually capable of. However, it is undeniable that these claims herald the possibilities to eavesdrop on GSM using publicly available equipment. This paper evaluates the claims and practical possibilities when it comes to eavesdropping on GSM, using relatively cheap hardware and open source initiatives which have generated many headlines over the past year. The basis of the paper is extensive experiments with the USRP (Universal Software Radio Peripheral) and software projects for this hardware.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Questioning the Feasibility of UMTS-GSM Interworking Attacks

Recently, Ahmadian and Salimi [1] presented and analyzed three different attacks that can be performed in UMTS-GSM interworking networks: (i) a real-time eavesdropping attack, (ii) an offline eavesdropping attack, and (iii) an impersonation attack. In this letter we question the feasibility of these attacks. In particular, we pinpoint and analyze that these attacks are based on some erroneous a...

متن کامل

A Security Analysis of GSM Security using ECC Technique

GSM (Group Special Mobile or System for Mobile Communications) is the PAN-EUROPEAN standard for digital cellular communication. GSM provides enhanced features when compared with the older analog-based wireless systems. A GSM network is more vulnerable to unauthorized access and eavesdropping when compared with the traditional fixed wired networks due to the mobility of users, the transmission o...

متن کامل

GSM Security

Mobile wireless networks are more vulnerable to unauthorised access and eavesdropping when compared with the traditional fixed wired networks due to the mobility of users, the transmission of signals through open-air and the requirement of low power consumption by a mobile user. This paper focuses on the security techniques used within the GSM standard. First, current GSM security system vulner...

متن کامل

A Study Report on Authentication Protocols in GSM, GPRS and UMTS

Masquerading and eavesdropping are major threats in mobile Communications. To provide protection in communication we require enciphering of voice message and authentication for subscriber with the communication network. This paper presents a complete study report on authentication protocols and its application on mobile communication systems like GSM, GPRS and UMTS. In addition, we describe the...

متن کامل

Presenting a Paradigmatic Model of the Organizational Architecture of Tax Affairs Based on Information Technology Governance by Data Method (Case Study of the State Tax Affairs Administration)

Today it is clear that both modernizing and smartening tax system cause to increase tax revenues and moves the country's economy towards transparency and tax justice. This article aims at presenting a paradigmatic model of the organizational architecture of tax affairs based on the information technology governance in the state tax organization by using data method, a qualitative research metho...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1101.0552  شماره 

صفحات  -

تاریخ انتشار 2011