23 May 2015 Vulnerabilities in GSM technology and feasibility of selected attacks
Author Affiliations +
Abstract
Global System for Mobile communication (GSM) is the most widespread technology for mobile communications in the world and serving over 7 billion users. Since first publication of system documentation there has been notified a potential safety problem’s occurrence. Selected types of attacks, based on the analysis of the technical feasibility and the degree of risk of these weaknesses, were implemented and demonstrated in laboratory of the VSB-Technical University of Ostrava, Czech Republic. These vulnerabilities were analyzed and afterwards possible attacks were described. These attacks were implemented using open-source tools, software programmable radio USRP (Universal Software RadioPeripheral) and DVB-T (Digital Video Broadcasting – Terrestrial) receiver. GSM security architecture is being scrutinized since first public releases of its specification mainly pointing out weaknesses in authentication and ciphering mechanisms. This contribution also summarizes practically proofed and used scenarios that are performed using opensource software tools and variety of scripts mostly written in Python. Main goal of this paper is in analyzing security issues in GSM network and practical demonstration of selected attacks.
© (2015) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
M. Voznak, M. Voznak, M. Prokes, M. Prokes, L. Sevcik, L. Sevcik, J. Frnda, J. Frnda, Homer Toral-Cruz, Homer Toral-Cruz, Sergej Jakovlev, Sergej Jakovlev, Peppino Fazio, Peppino Fazio, M. Mehic, M. Mehic, M. Mikulec, M. Mikulec, } "Vulnerabilities in GSM technology and feasibility of selected attacks", Proc. SPIE 9456, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security, Defense, and Law Enforcement XIV, 94560T (23 May 2015); doi: 10.1117/12.2177111; https://doi.org/10.1117/12.2177111
PROCEEDINGS
11 PAGES


SHARE
Back to Top