L Perkov, A Klisura, N Pavković - 2011 Proceedings of the 34th …, 2011 - ieeexplore.ieee.org
GSM is one of the most widely used standards in the world with more than 1.5 billion users. Privacy, interception and theft of service continue to raise significant interest in GSM …
M Hadžialić, M Škrbić, K Huseinović… - 2014 22nd …, 2014 - ieeexplore.ieee.org
One of the weaknesses of a GSM network is a lack of two-way authentication. For years, this weakness has been abused using IMSI catcher. However, due to high prices there were no …
The ubiquitous adoption of cellular technologies, such as, Long Term Evolution (LTE) and Wide-band Code Division Multiple Access (WCDMA) has not diminished the impact of …
C Ntantogian, G Valtas, N Kapetanakis… - Trust, Privacy and …, 2015 - Springer
With the emergence of widely available hardware and software tools for GSM hacking, the security of cellular networks is threatened even by script kiddies. In this paper we present …
S Aragon, F Kuhlmann, T Villa - 2015 IEEE 81st Vehicular …, 2015 - ieeexplore.ieee.org
Despite the rapid change in cellular technologies, Mobile Network Operators (MNOs) keep a high percentage of their deployed infrastructure using Global System for Mobile …
Y Song, K Zhou, X Chen - Journal of Networks, 2012 - Citeseer
The 2G GSM communication system only provides one-way authentication mechanism which just authenticate the identities of mobile users. As we know, this is not resistant to fake …
In the last quarter of 2014, several successful attacks against mobile networks were demonstrated. They are based on misuse of one of the key signaling protocol, SS7, which is …
A Parmar, KM Pattani - Int. Res. J. Eng. Technol, 2017 - academia.edu
Global System for Mobile communications (GSM) is the most popular telecommunication protocol used in telecommunication networks. The telecommunications industry uses a …
E Donald, ON Favour - arXiv preprint arXiv:2109.12408, 2021 - arxiv.org
In the 1990s, GSM emerged as a cutting-edge technology that promised improved services, mobility, security, and increase in the revenues of companies through improved, secure …