Security analysis of a femtocell device

@inproceedings{Borgaonkar2011SecurityAO,
  title={Security analysis of a femtocell device},
  author={Ravishankar Borgaonkar and Kevin Redon and Jean-Pierre Seifert},
  booktitle={SIN},
  year={2011}
}
Mobile network operators are adapting femtocells in order to simplify their network architecture for increased coverage, performance, and greater revenue opportunities. While emerging as a new low-cost technology which assures best connectivity, it has also introduced a range of new potential security risks for the mobile network operators. In this paper, we analyze these security issues and demonstrate the weaknesses of femtocell security. We demonstrate several security flaws that allowing… CONTINUE READING
Highly Cited
This paper has 21 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 15 extracted citations

An Effective Target Cell Selection Scheme for Next-Generation Open-Access Femtocell Networks

GLOBECOM 2017 - 2017 IEEE Global Communications Conference • 2017
View 3 Excerpts

An authentication scheme to protect the location privacy of femtocell users

2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA) • 2014
View 2 Excerpts

References

Publications referenced by this paper.
Showing 1-6 of 6 references

SCTPscan: SCTP network and port scanner

Philippe Langlois
http: //www.p1sec.com/corp/research/tools/sctpscan/, • 2011
View 4 Excerpts
Highly Influenced

SCCP hacking, attacking the SS7 and SIGTRAN applications one step further and mapping the phone system

Philippe Langlois
2010
View 9 Excerpts
Highly Influenced

Building Femtocell More Secure with Improved Proxy Signature

GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference • 2009
View 9 Excerpts
Highly Influenced

Security Issues in HNB Deployment

GSM Association
Technical report, July • 2008
View 10 Excerpts
Highly Influenced

Internet Key Exchange (IKEv2) Protocol

RFC • 2005
View 3 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…