Sdr-based network impersonation attack in gsm-compatible networks

S Aragon, F Kuhlmann, T Villa - 2015 IEEE 81st Vehicular …, 2015 - ieeexplore.ieee.org
Despite the rapid change in cellular technologies, Mobile Network Operators (MNOs) keep a
high percentage of their deployed infrastructure using Global System for Mobile …

Cross layer attacks on GSM mobile networks using software defined radios

K Hasan, S Shetty, T Oyedare - 2017 14th IEEE Annual …, 2017 - ieeexplore.ieee.org
The ubiquitous adoption of cellular technologies, such as, Long Term Evolution (LTE) and
Wide-band Code Division Multiple Access (WCDMA) has not diminished the impact of …

Recent advances in GSM insecurities

L Perkov, A Klisura, N Pavković - 2011 Proceedings of the 34th …, 2011 - ieeexplore.ieee.org
GSM is one of the most widely used standards in the world with more than 1.5 billion users.
Privacy, interception and theft of service continue to raise significant interest in GSM …

Demonstration of vulnerabilities in GSM security with USRP B200 and open-source penetration tools

A Dubey, D Vohra, K Vachhani… - 2016 22nd Asia-Pacific …, 2016 - ieeexplore.ieee.org
This paper showcases the vulnerabilities in the GSM security architecture through
implementation of an active attack at the Um interface. The attack was carried out by taking …

A man-in-the-middle attack on UMTS

U Meyer, S Wetzel - Proceedings of the 3rd ACM workshop on Wireless …, 2004 - dl.acm.org
In this paper we present a man-in-the-middle attack on the Universal Mobile
Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies …

On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks

U Meyer, S Wetzel - … on Personal, Indoor and Mobile Radio …, 2004 - ieeexplore.ieee.org
GSM suffers from various security weaknesses: Just recently, Barkan, Biham and Keller
presented a ciphertext-only attack on the GSM encryption algorithm A5/2 which recovers the …

A denial of service attack to GSM networks via attach procedure

N Gobbo, A Merlo, M Migliardi - … , September 2-6, 2013. Proceedings 8, 2013 - Springer
Abstract Mobile Network Operators (MNOs) keep a strict control over users accessing the
networks by means of the Subscriber Identity Module (SIM). This module grants the user …

Baron: Base-station authentication through core network for mobility management in 5g networks

A Lotto, V Singh, B Ramasubramanian… - Proceedings of the 16th …, 2023 - dl.acm.org
Fifth-generation (5G) cellular communication networks are being deployed on applications
beyond mobile devices, including vehicular networks and industry automation. Despite their …

Retrofitting mutual authentication to GSM using RAND hijacking

MSA Khan, CJ Mitchell - … Workshop, STM 2016, Heraklion, Crete, Greece …, 2016 - Springer
As has been widely discussed, the GSM mobile telephony system only offers unilateral
authentication of the mobile phone to the network; this limitation permits a range of attacks …

[PDF][PDF] Fake Base Station Threats in 5G Non-Public Networks

MH Lee, IH Liu, JS Li - Proceedings of the ICAROB, 2023 - alife-robotics.co.jp
With 5G technology, traditional industrial and business equipment can now be connected
wirelessly in a non-public network separated from public mobile services. Benefit from …