Let Me Answer That for You: Exploiting Broadcast Information in Cellular Networks
نویسندگان
چکیده
Mobile telecommunication has become an important part of our daily lives. Yet, industry standards such as GSM often exclude scenarios with active attackers. Devices participating in communication are seen as trusted and non-malicious. By implementing our own baseband firmware based on OsmocomBB, we violate this trust and are able to evaluate the impact of a rogue device with regard to the usage of broadcast information. Through our analysis we show two new attacks based on the paging procedure used in cellular networks. We demonstrate that for at least GSM, it is feasible to hijack the transmission of mobile terminated services such as calls, perform targeted denial of service attacks against single subscribers and as well against large geographical regions within a metropolitan area.
منابع مشابه
Fuzzy based efficient drone base stations (DBSs) placement in the 5G cellular network
Currently, cellular networks are one of the essential communication methods for people. Providing proper coverage for the users and also offering high-quality services to them are two of the most important issues of concern in cellular networks. The fifth-generation cellular communication networks can provide higher data transmission rates, which lead to a higher quality of service but this hig...
متن کاملEffects of Sowing Methods on the Quality and Quantity Traits of Three Annual Medicago Species
ABSTRACT- Annual Medicago species (Medicago spp.) are native to the Mediterranean region and widely used in fields and pastures in Iran. There are several methods of sowing annual Medicago species, each with different effects on the performance. However, there is currently no sufficient information about the appropriate methods for sowing Medicago species. In order to evaluate methods of sowing...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملCan Patterns Be Harmful
Let me answer this question unequivocally. It depends. Figured out I’m a consultant yet? Actually, let me explain. It does depend. It depends on what you think patterns are. Many people have a misunderstanding of patterns, and for those people, patterns can be harmful. However, when people get past their early understanding of patterns and come to comprehend them in a richer way, patterns canno...
متن کاملTherapeutic CPR or consent DNR--a dilemma looking for an answer.
Doctor: As you know, you have severe emphysema and you will need to be on oxygen around the clock. JW: Yes, I know that. I am hardly able to move. I can’t finish a sentence without getting short of breath. Doctor: You must stop smoking. JW: I cannot and I will not. This is the only source of joy for me now. I know it is killing me. But I want you to know that I do not want to be placed on the v...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013