GSM OTA SIM Cloning Attack and Cloning Resistance in EAP-SIM and USIM

@article{Singh2013GSMOS,
  title={GSM OTA SIM Cloning Attack and Cloning Resistance in EAP-SIM and USIM},
  author={Jaspreet Singh and Ron Ruhl and Dale Lindskog},
  journal={2013 International Conference on Social Computing},
  year={2013},
  pages={1005-1010}
}
Global System for Mobile communications (GSM) is the most popular telecommunication protocol used in telecommunication networks. The GSM protocol has weaknesses in the security of its unique identifiers which makes possible cloning in various circumstances. This paper will show, by comparison with physical cloning attacks, how an attacker can perform SIM (Subscriber Identity Module) cloning over the air by exploiting weaknesses in standard GSM communication. This paper will describe the… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-4 OF 4 CITATIONS

Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding

  • 2018 IEEE Symposium on Security and Privacy (SP)
  • 2018
VIEW 7 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

New safety measure to protect the 3G/4G SIM cards against cloning

  • 2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)
  • 2018
VIEW 2 EXCERPTS
CITES BACKGROUND

On using emoticons and lingoes for hiding data in SMS

  • 2015 International Symposium on Technology Management and Emerging Technologies (ISTMET)
  • 2015
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-5 OF 5 REFERENCES

Security in the GSM system

VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

The Modeling of an Identity Catching Attack on the Universal Mobile Telecommunication System (UMTS) Using Attack Tree Methodology,[online].Available

Ezeude k
  • 2010
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

A study of third party tracking by mobile Apps in the wild,[online].Available: ftp://ftp.cs.washington.edu/tr/2012/.../UW-CSE-12-03-01.PD

S. Han, J. Jung, Wetherall
  • 2012

private issue of the antivirus application in Smartphones Twelfth Annual Conference - Winona State University,[online

N. Shakya
  • 2012

SIM card security,[online

S He
  • 2011