Threats and Countermeasures in GSM Networks

@article{Bocan2006ThreatsAC,
  title={Threats and Countermeasures in GSM Networks},
  author={Valer Bocan and Vladimir Cretu},
  journal={J. Networks},
  year={2006},
  volume={1},
  pages={18-27}
}
Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of service (DOS) attacks will evolve into a critical danger as the availability of mobile networks becomes more and more important for the modern information society. This paper outlines a critical flaw in GSM networks which opens the avenue for distributed denial of service attacks. We propose a way to mitigate the attacks by… 
SAKA: a secure authentication and key agreement protocol for GSM networks
TLDR
A new secure GSM protocol called “SAKA” is proposed to prevent GSM networks from various security issues and attacks and it is claimed that on an average the SAKA protocol has reduced 56 % of the bandwidth consumption during the authentication process which is the maximum reduction of bandwidth by any G SM protocol.
Securing the next generation mobile network
TLDR
A cooperative NGMN security architecture is proposed in this paper that identifies and isolates/eliminates security attacks and utilizes an anomaly-based attack detection mechanism.
Vulnerabilities in Existing GSM Technology that causes Exploitation
TLDR
The GSM system has become the most popular standard for digital cellular communication for day to day communication in the world, and over 6 billion users worldwide in 2013, of which 80% are GSM subscribers.
Security between base stations in cellular communication system
  • N. SharminF. Haider
  • Computer Science
    2012 International Conference on Informatics, Electronics & Vision (ICIEV)
  • 2012
TLDR
This paper consists of some successive steps to ensure security against the vulnerabilities of the current GSM architecture by measures taken for base stations using private and public key cryptography.
A Survey of Man In The Middle Attacks
TLDR
This paper extensively review the literature on MITM to analyse and categorize the scope of MITM attacks, considering both a reference model, such as the open systems interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS.
End Users Security Awareness Campaign from Information Security Threats, Vulnerabilities and Concurrent Cyber-Attacks
The intent study of this article is to fortify the protection of sensitive data and information from breach any means necessary from attack either an insider or an outsider in the organizations. In
Security issues and vulnerabilities in connected car systems
  • Tamás BécsiS. AradiP. Gáspár
  • Computer Science
    2015 International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS)
  • 2015
TLDR
The paper shows how the connected feature changes the vehicle and also presents vulnerabilities of each element to show the importance of cautious system security design.
Security in Emerging 4G Networks
This chapter presents emerging wireless technologies applied to the domain of healthcare, which has been identified as a very important domain of increasing interest to researchers. The chapter also
In-Depth Analysis of Signal Jammers' and Anti-Jamming Effect on 5G Signal
TLDR
This project will look to highlight the existential threat to local infrastructure and develop an effective method to supressing and thereby, minimising the threat.
...
...

References

SHOWING 1-10 OF 17 REFERENCES
Mitigating denial of service threats in GSM networks
  • V. BocanV. Cretu
  • Computer Science
    First International Conference on Availability, Reliability and Security (ARES'06)
  • 2006
TLDR
A critical flaw in GSM networks which opens the avenue for distributed denial of service attacks is outlined and a way to mitigate the attacks is proposed by adding minimal authentication to the GSM channel assignment protocol.
Developments in DoS Research and Mitigating Technologies
TLDR
The current state of facts that allows DoS attacks and the potential mitigation technologies are described and the proposed ways to defend against them are described.
Exploiting open functionality in SMS-capable cellular networks
TLDR
The ability to deny voice service to cities the size of Washington D.C. and Manhattan with little more than a cable modem is demonstrated and countermeasures that mitigate or eliminate the threats introduced by these attacks are discussed.
GSM Networks: Protocols, Terminology and Implementation
TLDR
This detailed book is a practical handbook for engineers involved with all aspects of the GSM infrastructure — from research and development ( to installation, operation, and on-site management ( to technical support, maintenance, and testing).
Practical cryptography
TLDR
Practical Cryptography is the first hands-on cryptographic product implementation guide, bridging the gap between cryptographic theory and real-world cryptographic applications.
GSM and 3G Security
  • Black Hat Conference Singapore,
  • 2001
Securing the wireless internet
TLDR
New classes for the Java 2 Micro-Edition platform are created that offer fundamental cryptographic operations such as message digests and ciphers as well as higher level security protocols like SSL, showing that SSL is a practical solution for ensuring end-to-end security of wireless Internet transactions even within today's technological constraints.
Cryptography and Network Security: Principles and Practice
William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. In
Network Access and Security Issues in Ubiquitous Computing
TLDR
Infrastructure and security issues and how problems of access, coverage, roaming, end-to-end security, reliability, location management and multicast communications could be addressed in the pervasive and ubiquitous environment are focused on.
Writing Secure Code, 2 nd Edition
  • Writing Secure Code, 2 nd Edition
  • 2003
...
...