DocumentCode :
2990937
Title :
SDR-Based Network Impersonation Attack in GSM-Compatible Networks
Author :
Aragon, Santiago ; Kuhlmann, Federico ; Villa, Tania
Author_Institution :
Dept. of Digital Syst., Inst. Tecnolοgico Autοnomo de Mexico, Mexico City, Mexico
fYear :
2015
fDate :
11-14 May 2015
Firstpage :
1
Lastpage :
5
Abstract :
Despite the rapid change in cellular technologies, Mobile Network Operators (MNOs) keep a high percentage of their deployed infrastructure using Global System for Mobile communications (GSM) technologies. With about 3.5 billion subscribers, GSM remains as the de facto standard for cellular communications. However, the security criteria envisioned 30 years ago, when the standard was designed, are no longer sufficient to ensure the security and privacy of the users. Furthermore, even with the newest fourth generation (4G) cellular technologies starting to be deployed, these networks could never achieve strong security guarantees because the MNOs keep backwards- compatibility given the huge amount of GSM subscribers. In this paper, we present and describe the tools and necessary steps to perform an active attack against a GSM-compatible network, by exploiting the GSM protocol lack of mutual authentication between the subscribers and the network. The attack consists of a so-called man-in-the- middle attack implementation. By using Software Defined Radio (SDR), open-source libraries and open- source hardware, we setup a fake GSM base station to impersonate the network and therefore eavesdrop any communications that are being routed through it and extract information from their victims. Finally, we point out some implications of the protocol vulnerabilities and how these can not be mitigated in the short term since 4G deployments will take long time to entirely replace the current GSM infrastructure.
Keywords :
4G mobile communication; cellular radio; routing protocols; software radio; telecommunication network management; telecommunication security; 4G cellular technologies; 4G deployments; GSM base station; GSM infrastructure; GSM protocol; GSM subscribers; GSM technologies; GSM-compatible networks; Global System for Mobile communications; MNO; SDR; cellular communications; fourth generation cellular technologies; man-in-the- middle attack implementation; mobile network operators; network impersonation attack; open- source hardware; open-source libraries; security criteria; software defined radio; Authentication; Encryption; GSM; Mobile communication; Protocols; Standards;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Vehicular Technology Conference (VTC Spring), 2015 IEEE 81st
Conference_Location :
Glasgow
Type :
conf
DOI :
10.1109/VTCSpring.2015.7146071
Filename :
7146071
Link To Document :
بازگشت