Demonstration of vulnerabilities in GSM security with USRP B200 and open-source penetration tools

A Dubey, D Vohra, K Vachhani… - 2016 22nd Asia-Pacific …, 2016 - ieeexplore.ieee.org
This paper showcases the vulnerabilities in the GSM security architecture through
implementation of an active attack at the Um interface. The attack was carried out by taking …

Recent advances in GSM insecurities

L Perkov, A Klisura, N Pavković - 2011 Proceedings of the 34th …, 2011 - ieeexplore.ieee.org
GSM is one of the most widely used standards in the world with more than 1.5 billion users.
Privacy, interception and theft of service continue to raise significant interest in GSM …

An approach to analyze security of GSM network

M Hadžialić, M Škrbić, K Huseinović… - 2014 22nd …, 2014 - ieeexplore.ieee.org
One of the weaknesses of a GSM network is a lack of two-way authentication. For years, this
weakness has been abused using IMSI catcher. However, due to high prices there were no …

Cross layer attacks on GSM mobile networks using software defined radios

K Hasan, S Shetty, T Oyedare - 2017 14th IEEE Annual …, 2017 - ieeexplore.ieee.org
The ubiquitous adoption of cellular technologies, such as, Long Term Evolution (LTE) and
Wide-band Code Division Multiple Access (WCDMA) has not diminished the impact of …

Attacking GSM networks as a script kiddie using commodity hardware and software

C Ntantogian, G Valtas, N Kapetanakis… - Trust, Privacy and …, 2015 - Springer
With the emergence of widely available hardware and software tools for GSM hacking, the
security of cellular networks is threatened even by script kiddies. In this paper we present …

Sdr-based network impersonation attack in gsm-compatible networks

S Aragon, F Kuhlmann, T Villa - 2015 IEEE 81st Vehicular …, 2015 - ieeexplore.ieee.org
Despite the rapid change in cellular technologies, Mobile Network Operators (MNOs) keep a
high percentage of their deployed infrastructure using Global System for Mobile …

[PDF][PDF] Fake bts attacks of gsm system on software radio platform

Y Song, K Zhou, X Chen - Journal of Networks, 2012 - Citeseer
The 2G GSM communication system only provides one-way authentication mechanism
which just authenticate the identities of mobile users. As we know, this is not resistant to fake …

Analysis and mitigation of recent attacks on mobile communication backend

S Rao - 2015 - aaltodoc.aalto.fi
In the last quarter of 2014, several successful attacks against mobile networks were
demonstrated. They are based on misuse of one of the key signaling protocol, SS7, which is …

[PDF][PDF] Sniffing GSM traffic using RTL-SDR and kali linux OS

A Parmar, KM Pattani - Int. Res. J. Eng. Technol, 2017 - academia.edu
Global System for Mobile communications (GSM) is the most popular telecommunication
protocol used in telecommunication networks. The telecommunications industry uses a …

Analysing GSM Insecurity

E Donald, ON Favour - arXiv preprint arXiv:2109.12408, 2021 - arxiv.org
In the 1990s, GSM emerged as a cutting-edge technology that promised improved services,
mobility, security, and increase in the revenues of companies through improved, secure …