Threats and Countermeasures in GSM Networks
@article{Bocan2006ThreatsAC, title={Threats and Countermeasures in GSM Networks}, author={Valer Bocan and Vladimir Cretu}, journal={J. Networks}, year={2006}, volume={1}, pages={18-27} }
Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of service (DOS) attacks will evolve into a critical danger as the availability of mobile networks becomes more and more important for the modern information society. This paper outlines a critical flaw in GSM networks which opens the avenue for distributed denial of service attacks. We propose a way to mitigate the attacks by…
Figures and Tables from this paper
22 Citations
SAKA: a secure authentication and key agreement protocol for GSM networks
- Computer ScienceCSI Transactions on ICT
- 2013
A new secure GSM protocol called “SAKA” is proposed to prevent GSM networks from various security issues and attacks and it is claimed that on an average the SAKA protocol has reduced 56 % of the bandwidth consumption during the authentication process which is the maximum reduction of bandwidth by any G SM protocol.
Securing the next generation mobile network
- Computer ScienceSecur. Commun. Networks
- 2008
A cooperative NGMN security architecture is proposed in this paper that identifies and isolates/eliminates security attacks and utilizes an anomaly-based attack detection mechanism.
Vulnerabilities in Existing GSM Technology that causes Exploitation
- Computer Science
- 2013
The GSM system has become the most popular standard for digital cellular communication for day to day communication in the world, and over 6 billion users worldwide in 2013, of which 80% are GSM subscribers.
Security between base stations in cellular communication system
- Computer Science2012 International Conference on Informatics, Electronics & Vision (ICIEV)
- 2012
This paper consists of some successive steps to ensure security against the vulnerabilities of the current GSM architecture by measures taken for base stations using private and public key cryptography.
A Survey of Man In The Middle Attacks
- Computer ScienceIEEE Communications Surveys & Tutorials
- 2016
This paper extensively review the literature on MITM to analyse and categorize the scope of MITM attacks, considering both a reference model, such as the open systems interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS.
End Users Security Awareness Campaign from Information Security Threats, Vulnerabilities and Concurrent Cyber-Attacks
- Computer Science
- 2017
The intent study of this article is to fortify the protection of sensitive data and information from breach any means necessary from attack either an insider or an outsider in the organizations. In…
Security issues and vulnerabilities in connected car systems
- Computer Science2015 International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS)
- 2015
The paper shows how the connected feature changes the vehicle and also presents vulnerabilities of each element to show the importance of cautious system security design.
Provably secure anonymous authentication with batch verification for mobile roaming services
- Computer ScienceAd Hoc Networks
- 2016
Security in Emerging 4G Networks
- Computer Science
- 2013
This chapter presents emerging wireless technologies applied to the domain of healthcare, which has been identified as a very important domain of increasing interest to researchers. The chapter also…
In-Depth Analysis of Signal Jammers' and Anti-Jamming Effect on 5G Signal
- Computer Science2019 7th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)
- 2019
This project will look to highlight the existential threat to local infrastructure and develop an effective method to supressing and thereby, minimising the threat.
References
SHOWING 1-10 OF 17 REFERENCES
Mitigating denial of service threats in GSM networks
- Computer ScienceFirst International Conference on Availability, Reliability and Security (ARES'06)
- 2006
A critical flaw in GSM networks which opens the avenue for distributed denial of service attacks is outlined and a way to mitigate the attacks is proposed by adding minimal authentication to the GSM channel assignment protocol.
Developments in DoS Research and Mitigating Technologies
- Computer Science
- 2004
The current state of facts that allows DoS attacks and the potential mitigation technologies are described and the proposed ways to defend against them are described.
Exploiting open functionality in SMS-capable cellular networks
- Computer ScienceCCS '05
- 2005
The ability to deny voice service to cities the size of Washington D.C. and Manhattan with little more than a cable modem is demonstrated and countermeasures that mitigate or eliminate the threats introduced by these attacks are discussed.
GSM Networks: Protocols, Terminology and Implementation
- Computer Science
- 1998
This detailed book is a practical handbook for engineers involved with all aspects of the GSM infrastructure from research and development ( to installation, operation, and on-site management ( to technical support, maintenance, and testing).
Practical cryptography
- Computer Science, Mathematics
- 2003
Practical Cryptography is the first hands-on cryptographic product implementation guide, bridging the gap between cryptographic theory and real-world cryptographic applications.
GSM and 3G Security
- Black Hat Conference Singapore,
- 2001
Securing the wireless internet
- Computer ScienceIEEE Commun. Mag.
- 2001
New classes for the Java 2 Micro-Edition platform are created that offer fundamental cryptographic operations such as message digests and ciphers as well as higher level security protocols like SSL, showing that SSL is a practical solution for ensuring end-to-end security of wireless Internet transactions even within today's technological constraints.
Cryptography and Network Security: Principles and Practice
- Computer Science
- 1998
William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. In…
Network Access and Security Issues in Ubiquitous Computing
- Computer Science
- 2001
Infrastructure and security issues and how problems of access, coverage, roaming, end-to-end security, reliability, location management and multicast communications could be addressed in the pervasive and ubiquitous environment are focused on.
Writing Secure Code, 2 nd Edition
- Writing Secure Code, 2 nd Edition
- 2003