An Approach to Analyze Security of GSM Network

被引:0
|
作者
Hadzialic, Mesud [1 ]
Skrbic, Mirko [1 ]
Huseinovic, Kemal [2 ]
Kocan, Irvin [1 ]
Musovic, Jasmin [2 ]
Hebibovic, Alisa [2 ]
Kasumagic, Lamija [2 ]
机构
[1] Fac Elect Engn, Zmaja Bosne Bb, Sarajevo 71000, Bosnia & Herceg
[2] Commun Regulatory Agcy BH, Sarajevo 71000, Bosnia & Herceg
关键词
IMSI catcher; GSM; OpenBTS; USRP;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
One of the weaknesses of a GSM network is a lack of two-way authentication. For years, this weakness has been abused using IMSI catcher. However, due to high prices there were no major opportunities for detailed IMSI catcher analysis and for a practical implementation of the IMSI catcher with lower costs and greater availability. Development of a software defined radio has enabled a cheaper implementation. In this paper, the implementation of open-source IMSI catcher using USRP device is presented. Also, it describes security attack based on sending malicious SMS to multiple mobile users.
引用
收藏
页码:99 / 102
页数:4
相关论文
共 50 条
  • [1] An approach to analyze software security requirements in ABAC model
    Thanh-Nhan Luong
    Dinh-Hieu Vo
    Ninh-Thuan Truong
    [J]. PROCEEDINGS OF 2019 6TH NATIONAL FOUNDATION FOR SCIENCE AND TECHNOLOGY DEVELOPMENT (NAFOSTED) CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2019, : 184 - 189
  • [2] GSM security
    Kasim, B
    Ertaul, L
    [J]. ICWN '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, 2005, : 555 - 561
  • [3] Security Management in Kerberos V5 for GSM Network
    Jaiganesh, M.
    Ramdoss, B.
    [J]. ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 682 - +
  • [4] Analyzing the Security in the GSM Radio Network Using Attack Jungles
    Abdulla, Parosh Aziz
    Cederberg, Jonathan
    Kaati, Lisa
    [J]. LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION, AND VALIDATION, PT I, 2010, 6415 : 60 - +
  • [5] Automata-Based Approach to Design and Analyze Security Policies
    Krombi, Wadie
    Erradi, Mohammed
    Khoumsi, Ahmed
    [J]. 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 306 - 313
  • [6] Grid of security: a new approach of the network security
    Flauzac, Olivier
    Nolot, Florent
    Rabat, Cyril
    Steffenel, Luiz-Angelo
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 67 - 72
  • [7] Network traffic exploration application: A tool to assess, visualize, and analyze network security events
    Vandenberghe, Grant
    [J]. VISUALIZATION FOR COMPUTER SECURITY, PROCEEDINGS, 2008, 5210 : 181 - 196
  • [8] The Security Supervision System for College's Dormitory based on GSM Network
    Li, Tao
    Sun, Chuan
    Ding, W. -J
    Xiao, N. -Q.
    [J]. 2010 INTERNATIONAL CONFERENCE ON EDUCATION AND SPORTS EDUCATION, VOL 1, 2010, : 113 - 116
  • [9] A Comprehensive Approach for Network Security
    Rm, Manikandan
    Radha, D.
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 420 - 426
  • [10] Adaptive Approach to Network Security
    Ksiezopolski, Bogdan
    Kotulski, Zbigniew
    Szalachowski, Pawel
    [J]. COMPUTER NETWORKS, PROCEEDINGS, 2009, 39 : 233 - +