An Approach to Analyze Security of GSM Network

被引:0
|
作者
Hadzialic, Mesud [1 ]
Skrbic, Mirko [1 ]
Huseinovic, Kemal [2 ]
Kocan, Irvin [1 ]
Musovic, Jasmin [2 ]
Hebibovic, Alisa [2 ]
Kasumagic, Lamija [2 ]
机构
[1] Fac Elect Engn, Zmaja Bosne Bb, Sarajevo 71000, Bosnia & Herceg
[2] Commun Regulatory Agcy BH, Sarajevo 71000, Bosnia & Herceg
关键词
IMSI catcher; GSM; OpenBTS; USRP;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
One of the weaknesses of a GSM network is a lack of two-way authentication. For years, this weakness has been abused using IMSI catcher. However, due to high prices there were no major opportunities for detailed IMSI catcher analysis and for a practical implementation of the IMSI catcher with lower costs and greater availability. Development of a software defined radio has enabled a cheaper implementation. In this paper, the implementation of open-source IMSI catcher using USRP device is presented. Also, it describes security attack based on sending malicious SMS to multiple mobile users.
引用
收藏
页码:99 / 102
页数:4
相关论文
共 50 条
  • [31] GSM security issues and challenges
    Siddique, S. Muhammad
    Amir, Muhammad
    [J]. SNPD 2006: SEVENTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 413 - +
  • [32] Solutions to the GSM Security Weaknesses
    Toorani, Mohsen
    Shirazi, Ali Asghar Beheshti
    [J]. NGMAST 2008: SECOND INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES, AND TECHNOLOGIES, PROCEEDINGS, 2008, : 576 - 581
  • [33] Communication Security in GSM Networks
    Bouska, Petr
    Drahansky, Martin
    [J]. SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 248 - 251
  • [34] Social Network Approach to Analyze Stability and Variability of Travel Decisions
    Puhe, Maike
    Schippl, Jens
    Fleischer, Torsten
    Vortisch, Peter
    [J]. TRANSPORTATION RESEARCH RECORD, 2021, 2675 (09) : 398 - 407
  • [35] An Approach to Analyze and Model the Information Flow on Spacecraft Platform Network
    Yi, Xinqiang
    Zheng, Qi
    Yang, Liman
    Li, Yunhua
    Zhao, Shenglin
    Cui, Langfu
    [J]. PROCEEDINGS OF THE 2017 12TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2017, : 1669 - 1674
  • [36] Layered protocols approach to analyze haptic communication over a network
    van Essen, HA
    Rovers, AF
    [J]. WORLD HAPTICS CONFERENCE: FIRST JOINT EUROHAPTICS CONFERENCE AND SYMPOSIUM ON HAPTIC INTERFACES FOR VIRUTUAL ENVIRONMENT AND TELEOPERATOR SYSTEMS, PROCEEDINGS, 2005, : 30 - 39
  • [37] Amplified DWDM Communication Network: An Approach to analyze the characteristic Performance
    Baby, Rinu Ann
    Antony, Neenu Therese
    Jose, Lin Ann
    [J]. 2015 TWELFTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2015,
  • [38] Modelling and Analysis of Network Security - an Algebraic Approach
    Zhang, Qian
    Jiang, Ying
    Wu, Peng
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 308 - 315
  • [39] Integration soft computing approach to network security
    Srinoy, Surat
    [J]. AMS 2007: FIRST ASIA INTERNATIONAL CONFERENCE ON MODELLING & SIMULATION ASIA MODELLING SYMPOSIUM, PROCEEDINGS, 2007, : 159 - 164
  • [40] Data Security Approach for Online Social Network
    Bachpalle, Shital D.
    Desai, Manisha
    [J]. SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014), 2014, : 262 - 267