GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier

Size: px
Start display at page:

Download "GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier"

Transcription

1 SysSec System Security Lab. GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier Byeongdo Hong, Sangwook Bae, Yongdae Kim KAIST SysSec Feb. 19, 2018

2 Paging Area in Cellular Network Tracking Area (radius < 10 km) Yongdae Paging: A method to find specific subscriber How? By using subscriber s identifier 2

3 Paging Area in Cellular Network Tracking Area (radius < 10 km) Paging Request Yongdae Paging: A method to find specific subscriber How? By using subscriber s identifier 3

4 Paging Area in Cellular Network Tracking Area (radius < 10 km) Paging Request Paging Response Yongdae Paging: A method to find specific subscriber How? By using subscriber s identifier 4

5 Identifiers in Cellular Networks v Permanent/Unique identifier IMSI (International Mobile Subscriber Identity) Provisioned in the SIM card v Temporary identifier Used to hide subscriber TMSI (Temporary Mobile Subscriber Identity) Used in 2G/3G GUTI (Globally Unique Temporary Identity) Used in LTE 5

6 Location Tracking in Cellular Network Location Area 1 Victim Yongdae TMSI: 0xDEADBEEF 0xDEADBEEF = Yongdae? Attacker Location Area 2 0xDEADBEEF User B User C Kune et al. NDSS

7 Location Tracking in Cellular Network Location Area 1 Victim A TMSI: 0xff xff = A I found A!! Attacker Location Area 2 User B Temporary ID Issue: Unchanged User Identifier C GSM: NDSS 12, LTE: NDSS 16 Repeat dialing 7

8 Phone number-temporary ID mapping v Traffic analysis to find the same TMSI (Kune et al. NDSS 12) Find intersects of identifier s sets Attacker Call trigger Observation Call trigger Call trigger dt dt dt Paging Channel Time v Using Silent Call Terminating call before ringing v Same vulnerability in LTE - unchanged GUTI (Shaik et al. NDSS 16) 8

9 Defense of Location Tracking v Temporary Identifier Reallocation GUTI Reallocation in LTE To prevent between subscriber and ID mapping Q. Is GUTI Reallocation the solution to existing attacks? A. It is Yes But simply changing is not a solution! 9

10 Experiment Setup Device Analysis Broadcast Channel Analysis srslte (Open source) Antenna Diagnostic Monitor Signaling Collection and Analysis Tool (SCAT) [1] USRP B210 Broadcast Channel Receiver [1] B. Hong, S. Park, H. Kim, D. Kim, H. Hong, H. Choi, J.P. Seifert, S. Lee, Y. Kim, Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -, IEEE Transactions on Mobile Computing. 10

11 Worldwide Data Collection Country # of OP. # of USIM # of signalings Country # of OP. # of USIM U.S.A K U.K K Austria K Spain K Belgium K Netherlands K Switzerland K Japan K Germany K South Korea M France K OP: operator, USIM: Universal Subscriber Identity Module, Signaling: control plane message 11 # of signalings Data summary Collection Period: ~ # of countries: 11 # of operators: 28 # of USIMs: 78 # of voice calls: 58K # of signalings: 6.4M

12 Same vs. Fingerprintable IDs NDSS 12, 16: Same ID à Location Tracking!! This work: ID Fingerprinting à Location Tracking!! 12

13 Fixed Bytes in GUTI Reallocation v 19 operators have fixed bytes Allocation Pattern Assigning the same GUTI Three bytes fixed Two bytes fixed One bytes fixed Operators BE-III, DE-II, FR-II, JP-I CH-II, DE-III, NL-I, NL-II BE-II, CH-I, CH-III, ES-I, FR-I, NL-III AT-I, AT-II, AT-III, BE-I, DE-I AT: Austria, BE: Belgium, CH: Switzerland, DE: Germany, ES: Spain, FR: France, JP: Japan, NL: Netherlands 13

14 Case I: Netherlands (NL-I) 14 Hexadecimal value Hexadecimal value FF 192 C FF 192 C (a) 1st byte # of call (c) 3rd byte # of call Hexadecimal value Hexadecimal value F 12 C (b) 2nd byte # of call FF 192 C (d) 4th byte # of call

15 Case I: Netherlands (NL-I) 15 Hexadecimal value Hexadecimal value FF 192 C FF 192 C (a) 1st byte # of call (c) 3rd byte # of call Hexadecimal value Hexadecimal value F 12 C (b) 2nd byte # of call FF 192 C (d) 4th byte # of call

16 Case II: Belgium (BE-II) Hexadecimal value 192 C (a) 1st byte # of call Hexadecimal value (b) 2nd byte # of call 16 Hexadecimal value FF 192 C # of call (c) 3rd byte Hexadecimal value FF 192 C (d) 4th byte # of call

17 Case II: Belgium (BE-II) Hexadecimal value 192 C (a) 1st byte # of call Hexadecimal value (b) 2nd byte # of call 17 Hexadecimal value FF 192 C # of call (c) 3rd byte Hexadecimal value FF 192 C (d) 4th byte # of call

18 Fixed Bytes in GUTI Reallocation v 19 operators have fixed bytes Allocation Pattern Assigning the same GUTI Three bytes fixed Two bytes fixed One bytes fixed Operators BE-III, DE-II, FR-II, JP-I CH-II, DE-III, NL-I, NL-II BE-II, CH-I, CH-III, ES-I, FR-I, NL-III AT-I, AT-II, AT-III, BE-I, DE-I AT: Austria, BE: Belgium, CH: Switzerland, DE: Germany, ES: Spain, FR: France, JP: Japan, NL: Netherlands 18

19 Stress Testing v No noticeable rule of GUTI Reallocation for some operators v Invoking voice call continuously with a short time Two types of test Weak stress testing Hard stress testing Calls at shorter intervals than weak stress test 19

20 Stress Testing Result v Force the network to skip the GUTI reallocation Perform experiments on US and Korean operators Two US and two Korean operators FF Network skips GUTI Reallocation End weak stress testing Operator Weak Stress Testing Hard Stress Testing KR-I O O KR-II X O US-I X O US-II O O O: Reuse GUTI X: No noticeable change Hexadecimal value 192 C # of call 1st Byte 2nd Byte 3rd Byte 4th Byte 20

21 Success Rate of our Attack v Required number of calls covering 99% success rate Call Trial paging / sec 88 paging / sec 160 paging / sec 1 byte fixed 2 bytes fixed 3 bytes fixed

22 Location Tracking with GUTI v Observation of broadcast channels after call invocation Pattern matching (fixed bytes, assigning same GUTI) Location tracking (Tracking Area, Cell) OpenSignal (at KAIST) 22

23 Defenses + Requirements v Frequent refreshing of temporary identifier Per service request v Unpredictable identity allocation Cryptographically secure pseudorandom number generation Hash_DRBG can be used v Collision avoidance v Stress-testing resistance v Low cost implementation 23

24 Conclusion v Predictable reallocation logic GUTI reallocation pattern Fixed bytes (19 operators) Same GUTI By stress test (4 test cases) Assigning same GUTI v Location tracking is still possible in cellular network! v Secure GUTI reallocation mechanism is required 24

25 Thank you Q & A 25

26 BACK UP SLIDES

27 27 GUTI Format

28 Dataset Release? v Our dataset includes somewhat sensitive information. Name of telcos è Vulnerabilities can be linked to telcos. Some IMSIs v Not clear if releasing this dataset may cause any legal issues. v B. Hong, et. al, Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -, IEEE Transactions on Mobile Computing. Finding performance bugs by comparative analysis of call flows v Should we build open-source dataset using crowdsourcing? May help customers to push telcos to build secure and better cellular network! 28

29 29 Stress Testing Result: US-I

30 Probability with Fixed Bytes

31 Attack Flow Obtain target information (Phone number, carrier) Perform GUTI Reallocation? 31

32 Attack Flow Perform GUTI Reallocation? Yes No Find the target (MME area, Tracking area, Cell) Analysis of rules for ID reallocation 32

33 Attack Flow Analysis of rules for ID reallocation Have fixed bytes? No Stress test Yes Find the target (MME area, Tracking area, Cell) 33

34 Paging Distribution in Korea (KR-I) # of paging / sec Max: 88 pagings / sec :10 22:50 2:30 6:10 9:50 13:30 Min: 5 pagings / sec Time of day 34

Peeking over the Cellular Walled Gardens

Peeking over the Cellular Walled Gardens Peeking over the Cellular Walled Gardens A Method for Closed Network Diagnosis Byeongdo Hong 1, Shinjo Park 2 Hongil Kim 1, Dongkwan Kim 1 Hyunwook Hong 1, Hyunwoo Choi 1 Jean-Pierre Seifert 2, Sung-Ju

More information

Privacy through Pseudonymity in Mobile Telephony Systems

Privacy through Pseudonymity in Mobile Telephony Systems Privacy through Pseudonymity in Mobile Telephony Systems Myrto Arapinis 1 Loretta Mancini 2 Eike Ritter 2 Mark Ryan 2 1 School of Informatics, University of Edinburgh 2 School of Computer Science, University

More information

Defeating IMSI Catchers. Fabian van den Broek et al. CCS 2015

Defeating IMSI Catchers. Fabian van den Broek et al. CCS 2015 Defeating IMSI Catchers Fabian van den Broek et al. CCS 2015 Ren-Jay Wang CS598 - COMPUTER SECURITY IN THE PHYSICAL ckground 3GPP 3GPP 3 rd Generation Partnership Project Encompasses: GSM and related 2G

More information

USA and Finland surprise: High and quickly growing mobile data usage

USA and Finland surprise: High and quickly growing mobile data usage Industry analysis #3 2016 Mobile data usage 2015 preliminary USA and Finland surprise: High and quickly growing mobile data usage High usage 20 EUR ARPU Low usage Low revenue per MB High revenue per MB

More information

TotalPatent v. TotalPatent. TotalPatent. TotalPatent

TotalPatent v. TotalPatent. TotalPatent. TotalPatent TotalPatent TotalPatent TotalPatent TotalPatent v TotalPatent TotalPatent TotalPatent TotalPatent v TotalPatent Content 22 Â µ v 74 US 1836; EP 1978; WO 1978; CH 1888; DE 1890; GB 1890; NL 1915 Â Â Additional

More information

Peak data in sight. Industry analysis # H 2014 mobile usage indicates

Peak data in sight. Industry analysis # H 2014 mobile usage indicates Industry analysis #7 2014 1H 2014 mobile usage indicates Peak data in sight This is tefficient s 10 th public analysis on the development of mobile data usage. For the first time, we see clear signs of

More information

Keysight Technologies E6701J GSM/GPRS and E6704A EGPRS Lab Applications For the 8960 (E5515C/E) Wireless Communications Test Set. Technical Overview

Keysight Technologies E6701J GSM/GPRS and E6704A EGPRS Lab Applications For the 8960 (E5515C/E) Wireless Communications Test Set. Technical Overview Keysight Technologies E6701J GSM/GPRS and E6704A EGPRS Lab Applications For the 8960 (E5515C/E) Wireless Communications Test Set Technical Overview Combining the benefits of GSM/GPRS/EGPRS network emulation

More information

Communication and Distributed Systems Seminar on : LTE Security. By Anukriti Shrimal May 09, 2016

Communication and Distributed Systems Seminar on : LTE Security. By Anukriti Shrimal May 09, 2016 Communication and Distributed Systems Seminar on : LTE Security By Anukriti Shrimal May 09, 2016 LTE network with interfaces LTE Security 2 Contents LTE Security : Why, What, How EPS Architecture Design

More information

Rates. Local Call Rates. Overseas Call Rates (v019) Monday to Friday 8:00pm to 7:59am 8 per min Saturday and Sunday All Day

Rates. Local Call Rates. Overseas Call Rates (v019) Monday to Friday 8:00pm to 7:59am 8 per min Saturday and Sunday All Day Rates Local Call Rates Monday to Friday 8:00pm to 7:59am 8 per min Saturday and Sunday All Day Rounded to the nearest cent 16 per min Monday to Friday 8:00am 7:59pm Rounded to the nearest cent Overseas

More information

Pay As You Want: Bypassing Charging System in Operational Cellular Networks

Pay As You Want: Bypassing Charging System in Operational Cellular Networks Pay As You Want: Bypassing Charging System in Operational Cellular Networks Hyunwook Hong ( ), Hongil Kim, Byeongdo Hong, Dongkwan Kim, Hyunwoo Choi, Eunkyu Lee, and Yongdae Kim Korea Advanced Institute

More information

Attacking Mobile-Terminated Services in GSM

Attacking Mobile-Terminated Services in GSM Berlin Institute of Technology FG Security in Telecommunications Weiss Attacking Mobile-Terminated Services in GSM TelcoSecDay 2013 Nico Golde, Kevin Redon, Heidelberg, March 12th 2013 nico@sec.t-labs.tu-berlin.de

More information

LTE Security How Good Is It?

LTE Security How Good Is It? SESSION ID: TECH-RO3 LTE Security How Good Is It? Jeffrey Cichonski IT Specialist (Security) National Institute of Standards & Technology @jchonski Joshua Franklin IT Specialist (Security) National Institute

More information

Case study of a high-tech world leader: Republic of Korea Dr Tim Kelly, Head, Strategy and Policy Unit

Case study of a high-tech world leader: Republic of Korea Dr Tim Kelly, Head, Strategy and Policy Unit Case study of a high-tech world leader: Republic of Korea Dr Tim Kelly, Head, Strategy and Policy Unit The views expressed in this presentation are those of the authors and do not necessarily reflect the

More information

Aruba Quick Start Guide

Aruba Quick Start Guide Aruba Quick Start Guide Before you can access the Web-based Web UI tools, which is the primary configuration interface for Aruba WLAN switches, the switch must be configured with basic system information

More information

E-readiness rankings 2007

E-readiness rankings 2007 E-readiness rankings 2007 Countries digital development elopment in global context The Economist Intelligence Unit Prepared for The State of Telecom at Columbia University it 19 October 2007 A 1 About

More information

Fraude dans la Telephonie

Fraude dans la Telephonie Fraude dans la Telephonie Aurélien Francillon Merve Sahin With Monaco Telecom Also with cooperations: NYU Abu Dhabi Georgia Tech Telecom Paris Tech (Marc Relieu) Telephony Fraud A long-standing problem

More information

International Telecommunication Union

International Telecommunication Union 1 The views expressed in this paper are those of the author and do not necessarily reflect the opinions of the ITU or its Membership. Broadband competition: Penetration, speed and price Taylor Reynolds

More information

Session Trace in GPRS/EDGE

Session Trace in GPRS/EDGE Tracing GPRS Signaling and User Plane Activities using MasterClaw Introduction MasterClaw Call and Session Trace is the key application to track signaling procedure and correlate messages over several

More information

Agilent 8960 Series 10 Wireless Communications Test Set

Agilent 8960 Series 10 Wireless Communications Test Set Agilent 8960 Series 10 Wireless Communications Test Set Configuration Guide 8960 Series 10 Wireless Communications Test Set Mainframe, Applications, and Software The building blocks of the 8960 are an

More information

Training and trials on network planning tools for evolving network architectures. Session 3.2

Training and trials on network planning tools for evolving network architectures. Session 3.2 ITU-BDT Training and trials on network planning tools for evolving network architectures Moscow Russian Federation, 4-84 8 June 2007 Session 3.2 Network planning at different time scales, long, medium

More information

E vo lu t io n T ech n o lo g y:

E vo lu t io n T ech n o lo g y: Background Long Term Evolution (LTE) is a 4G wireless broadband technology developed by the Third Generation Partnership Project (3GPP), an industry trade group. 3GPP named the technology Long Term Evolution

More information

Uploading protocols and Assay Control Sets to the QIAsymphony SP via the USB stick

Uploading protocols and Assay Control Sets to the QIAsymphony SP via the USB stick Uploading protocols and Assay Control Sets to the QIAsymphony SP via the USB stick This document describes how to upload protocols and Assay Control Sets to the QIAsymphony SP using the USB stick supplied

More information

Security of Cellular Networks: Man-in-the Middle Attacks

Security of Cellular Networks: Man-in-the Middle Attacks Security of Cellular Networks: Man-in-the Middle Attacks Mario Čagalj University of Split 2013/2014. Security in the GSM system by Jeremy Quirke, 2004 Introduction Nowadays, mobile phones are used by 80-90%

More information

1 01-Jan Jan Jan Jan Jan Jan Jan Feb Feb Feb Feb Feb-14

1 01-Jan Jan Jan Jan Jan Jan Jan Feb Feb Feb Feb Feb-14 All page impressions from the same computer are summarised as one visit. The visits are uniquely identified on the basis of the IP address and the browser ID. As several people may share a computer (e.g.

More information

Wireless Communication

Wireless Communication Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications

More information

COPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA in Third-Generation Systems

COPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA in Third-Generation Systems 1 Introduction Harri Holma and Antti Toskala 1.1 WCDMA in Third-Generation Systems Analog cellular systems are commonly referred to as first-generation systems. The digital systems, such as Global System

More information

POWER-ON AND POWER-OFF PROCEDURES

POWER-ON AND POWER-OFF PROCEDURES POWER-ON AND POWER-OFF PROCEDURES TABLE OF CONTENTS 1. Power-On Sequence 2. Network and Cell Selection 3. RRC Connection Establishment 4. Attach Procedure 5. Detach Procedure 1. POWER-ON SEQUENCE The following

More information

Agilent 8960 Series 10 Wireless Communications Test Set

Agilent 8960 Series 10 Wireless Communications Test Set Agilent 8960 Series 10 Wireless Communications Test Set Configuration Guide 8960 Series 10 Wireless Test Set Mainframe, Applications, and Software The building blocks of the 8960 are an E5515 test set

More information

The mobile broadband revolu0on!

The mobile broadband revolu0on! 09-06-22 The mobile broadband revolu0on! Anders Cajander Head of Innova+on Management TeliaSonera Mobility TeliaSonera Leading Nordic total telecommunications provider 1 21 Mobile Operators in 18 countries

More information

Step 1: New Portal User User ID Created Using IdentityIQ (IIQ)

Step 1: New Portal User User ID Created Using IdentityIQ (IIQ) Rockwell Automation PartnerNetwork Portal Single Sign-on (SSO) Login to Rockwell Automation PartnerNewtork Portal for Commercial Programs Participants Scope: This job aid provides instructions on how to

More information

Telecommunication Regulatory Reform and the WTO Process

Telecommunication Regulatory Reform and the WTO Process Telecommunication Regulatory Reform and the WTO Process Dr Tim Kelly, ITU Session 1: Course on Telecom Policy, Regulation and Management, University of Witwatersrand, 6-7 May, 1999 * The views expressed

More information

Iridium. Roadpost Satellite Service. Customer Care. A free call from your Roadpost satellite phone:

Iridium. Roadpost Satellite Service. Customer Care. A free call from your Roadpost satellite phone: E E ID RVIC GU SE IS OUR TH Y D ING EA US R ORE F BE Roadpost Satellite Service Iridium User Guide Customer Care A free call from your Roadpost satellite phone: customercare@roadpost.com www.roadpost.com

More information

Wireless Communication

Wireless Communication Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications

More information

More Precise Locations for Mobile 999 Calls

More Precise Locations for Mobile 999 Calls More Precise Locations for Mobile 999 Calls 12 December Cambridge Wireless Limited 1 UK Emergency Service 999/112 call handling : Voice + Location - Voice : Mobile, Fixed, VoIP - esms for hearing impaired

More information

GSM security country report: Thailand

GSM security country report: Thailand GSM security country report: Thailand GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin February 2013 Abstract. GSM networks differ widely in their protection capabilities against common

More information

TROVIS 6600 Automation System for industrial processes

TROVIS 6600 Automation System for industrial processes TROVIS 6600 Automation System for industrial processes Graphical Project Management Tool Max. 40 characters for data point names Function blocks (temperature control circuits, autoclave loops, analog programmer,

More information

Cloud PBX: Real world scenarios

Cloud PBX: Real world scenarios Cloud PBX: Real world scenarios Ralph Eckhard Ralph Eckhard IT Architect @ PeopleWare ICT Modern Workplace / M365 www.365dude.nl @ralpje Elements of Skype for Business Online Skype for Business (E1,E3,E5)

More information

Understanding IMSI Privacy!

Understanding IMSI Privacy! Understanding IMSI Privacy Ravishankar Borgaonkar TU Berlin Swapnil Udar Aalto University Email: darshak@sec.t-labs.tu-berlin.de Blackhat USA 2014, Las Vegas, 7 th August 2014 Overview Unresolved Privacy

More information

Incubating ideas in R&D capabilities abroad

Incubating ideas in R&D capabilities abroad Incubating ideas in R&D capabilities abroad European Commission - 21 October 2009 José Valerdi Tormo Head of Orange Labs R&D Spain Local markets develop break through innovations 2 inspired by innovative

More information

Mobile network security report: Ukraine

Mobile network security report: Ukraine Mobile network security report: Ukraine GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin June 2017 Abstract. Mobile networks differ widely in their protection capabilities against common

More information

GSM security country report: Estonia

GSM security country report: Estonia GSM security country report: Estonia GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin September 2014 Abstract. GSM networks differ widely in their protection capabilities against common

More information

How To deploy IoT Gloablly

How To deploy IoT Gloablly How To deploy IoT Gloablly SangWoo Shim Senior IoT Sales Specialist 17 May 2016 Complexity of Global M2M Deployment Numerous countries = numerous networks Country specific SIMs High roaming charges Different

More information

GSM Hacking. Wireless Mobile Phone Communication 30 th January 2014 UNRESTRICTED EXTERNAL

GSM Hacking. Wireless Mobile Phone Communication 30 th January 2014 UNRESTRICTED EXTERNAL GSM Hacking Wireless Mobile Phone Communication 30 th January 2014 Labs.mwrinfosecurity.com MWR Labs 1 Labs.mwrinfosecurity.com MWR Labs Introduction to GSM June 2008 2.9 BILLION subscribers use GSM. Replaced

More information

LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE

LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury, Shagufta Mehnaz*, Elisa Bertino* Purdue University*, University of Iowa Critical Infrastructure

More information

The Cellular Interceptor CC2800 Series

The Cellular Interceptor CC2800 Series The Cellular Interceptor CC2800 Series Operational Parameters The Target Mode enables the user to direct cellular interception by variables such as the IMSI, TMSI, or cellular phone number of the suspect.

More information

GSM. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides) GPRS

GSM. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides) GPRS GSM Example of a PLMN (Public Land Mobile Network) At present most successful cellular mobile system (over 200 million subscribers worldwide) Digital (2 nd Generation) cellular mobile system operating

More information

Temporary Document Page 2 - switches off, the allocated resources and PCC rules information of PDN GWs used by the UE in non- network will not be dele

Temporary Document Page 2 - switches off, the allocated resources and PCC rules information of PDN GWs used by the UE in non- network will not be dele Temporary Document Page 1 - TSG SA WG2 Architecture S2#58 S2-072558 25-29 June 2007 Orlando, FL, USA Source: Huawei Title: Attach Type in attach procedure Document for: Discussion / Approval Agenda Item:

More information

development, return of experience, state of the art

development, return of experience, state of the art CCRCC 2012 Thomas Wesenberg Speaker of the GSM-R Industry Group Lille November 6th, 2012 development, return of experience, state of the art www.gsm-rail.com # Agenda 1. GSM-R IG general update 2. Developing

More information

Keysight Technologies GSM/W-CDMA SMS Testing with Wireless Test Managers (WTMs) Application Note

Keysight Technologies GSM/W-CDMA SMS Testing with Wireless Test Managers (WTMs) Application Note Keysight Technologies GSM/W-CDMA SMS Testing with Wireless Test Managers (WTMs) Application Note Introduction Two Quick Fixed Engineerings (QFEs) for the Keysight Technologies, Inc. Wireless Test Managers

More information

EventBuilder.com. International Audio Conferencing Access Guide. This guide contains: :: International Toll-Free Access Dialing Instructions

EventBuilder.com. International Audio Conferencing Access Guide. This guide contains: :: International Toll-Free Access Dialing Instructions EventBuilder.com International Audio Conferencing Access Guide TM This guide contains: :: International Toll-Free Access Dialing Instructions :: ATFS (Access Toll-Free Service) Dialing Instructions ::

More information

STOC-FX. X100P.com s. World s First Professional Grade VoIP FXS to FXO Converter

STOC-FX. X100P.com s. World s First Professional Grade VoIP FXS to FXO Converter X100P.com s STOC-FX World s First Professional Grade VoIP FXS to FXO Converter Copyright (c) 2006 by X100P.com All rights reserved including the rights of reproduction in whole or in part in any form.

More information

Jiang Wangcheng President of IoT Solution Marketing & Solutions Department

Jiang Wangcheng President of IoT Solution Marketing & Solutions Department Jiang Wangcheng President of IoT Solution Marketing & Solutions Department Large-scale Deployment of NB-IoT Network Has Started 400K Sites 2017 20M Connections 1.5M Sites 2020 National Coverage China MIIT

More information

RPM International Inc. Hotline Instructions

RPM International Inc. Hotline Instructions RPM International Inc. Hotline Instructions While compliance matters can often be resolved at the local level, the RPM International Inc. ( RPM ) Hotline provides another way for you to report concerns

More information

Unlimited moves the needle but it s when mobile addresses slow fixed internet that something happens

Unlimited moves the needle but it s when mobile addresses slow fixed internet that something happens Industry analysis #1 218 Mobile data full year 217 Unlimited moves the needle but it s when mobile addresses slow fixed internet that something happens This is tefficient s 19 th public analysis of the

More information

ETSI TS V4.1.0 ( )

ETSI TS V4.1.0 ( ) TS 122 022 V4.1.0 (2002-06) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Personalisation of Mobile Equipment (ME); Mobile

More information

Kapsch CarrierCom. We drive innovation to drive your business.

Kapsch CarrierCom. We drive innovation to drive your business. Kapsch CarrierCom. We drive innovation to drive your business. always one step ahead 1 Who are we? Presentation heading Presentation subheading 2 The Kapsch Group - 118 Years of Experience We are an operating

More information

8x Independent DMX Controller

8x Independent DMX Controller 8x Independent DMX Controller Thank you for your purchase! The drumlite Independent DMX controller allows you to control each drumlite individually meaning each drum can glow a different color at any time.

More information

Keysight Technologies Multi-Vendor Cellular Networks and Value Driven Optimization. Application Note

Keysight Technologies Multi-Vendor Cellular Networks and Value Driven Optimization. Application Note Keysight Technologies Multi-Vendor Cellular Networks and Value Driven Optimization Application Note Introduction In today s mobile networks, revenue per transported bit is constantly decreasing, while

More information

MANUAL VOICE/DATA SIMCARD CANADA

MANUAL VOICE/DATA SIMCARD CANADA MANUAL VOICE/DATA SIMCARD CANADA Copyright 2018. All rights reserved. The content of this document may not be copied,replaced,distributed,published,displayed, modified,or transferred in any form or by

More information

Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information

Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information Syed Rafiul Hussain, Mitziu Echeverria, Omar Chowdhury, Ninghui Li and Elisa Bertino Purdue University, University

More information

Report on ISO/IEC/JTC1/SC27 Activities in Digital Identities

Report on ISO/IEC/JTC1/SC27 Activities in Digital Identities International Telecommunication Union ITU-T Report on ISO/IEC/JTC1/SC27 Activities in Digital Identities Dick Brackney ISO/SC27 Liaison Officer to ITU-T SG17 Standards Program Manager, U.S. Dept of Defense

More information

Audio Conference. The Two Popular Audio Conferencing Options. Telecom Audio Conferencing Brings People Together, Wherever They Are MEETINGS ON CALL

Audio Conference. The Two Popular Audio Conferencing Options. Telecom Audio Conferencing Brings People Together, Wherever They Are MEETINGS ON CALL Audio Conference MEETINGS ON CALL Telecom Audio Conferencing Brings People Together, Wherever They Are Telecom Audio Conferencing is one of the easiest and most costeffective ways to get people together

More information

S8 AutoScore II System

S8 AutoScore II System Important: Remove this guide before handing the device to the patient. Pressures should only be adjusted by qualified personnel. S8 AutoScore II System Clinical Quick Setup Guide Setup is quick and easy

More information

THE REAL TRUTH BEHIND RANSOMWARE EDDY WILLEMS SECURITY EVANGELIST

THE REAL TRUTH BEHIND RANSOMWARE EDDY WILLEMS SECURITY EVANGELIST THE REAL TRUTH BEHIND RANSOMWARE EDDY WILLEMS SECURITY EVANGELIST TWITTER: @EDDYWILLEMS 1 OFFERING SECURITY SOLUTIONS WORLDWIDE Founded in Bochum, Germany in 1985 First AV solution in 1987 Global head

More information

in focus Statistics Telecommunications in Europe Contents INDUSTRY, TRADE AND SERVICES 8/2005 Author Martti LUMIO

in focus Statistics Telecommunications in Europe Contents INDUSTRY, TRADE AND SERVICES 8/2005 Author Martti LUMIO Telecommunications in Europe Statistics in focus INDUSTRY, TRADE AND SERVICES 8/2005 Author Martti LUMIO Contents The main telephone lines are more and more subject to competition from the mobile telephone

More information

E R T M S COMMUNICATION PLAN

E R T M S COMMUNICATION PLAN U I C E R T M S COMMUNICATION PLAN Paolo de Cicco Senior Advisor ERTMS Platform Paris, 14/03/2007-1 Item 16: UIC Workshop Euro-Interlocking Hazard List Methodology for Railway Signalling WORKSHOP HELD

More information

BEAT - Project Overview Prof Julian Fierrez On behalf of Dr Sébastien Marcel Idiap Research Institute, CH http://www.idiap.ch/~marcel Biometrics Evaluation and Testing (BEAT) Research Projects Conference

More information

Keysight Technologies VoLTE Battery Test, Reference Solution

Keysight Technologies VoLTE Battery Test, Reference Solution Keysight Technologies VoLTE Battery Test, Reference Solution Solution Brochure The VoLTE battery test reference solution implements battery performance test plan and output results to a required test report.

More information

Connect Broadband Fibre Residential Packages

Connect Broadband Fibre Residential Packages Connect Broadband Fibre Residential Packages Introduction & summary The Services are Our white label reseller product that We make available to Communications Providers (CPs) pursuant to the Reseller Agreement

More information

Keysight Technologies Quick Start Guide for ADS in Power Electronics. Demo Guide

Keysight Technologies Quick Start Guide for ADS in Power Electronics. Demo Guide Keysight Technologies Quick Start Guide for ADS in Power Electronics Demo Guide 02 Keysight Quick Start Guide for ADS in Power Electronics - Demo Guide Why Evaluate ADS? Trends in Switched Mode Power Supplies

More information

3GPP TR V ( )

3GPP TR V ( ) TR 22.950 V10.0.0 (2011-03) Technical Report 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Priority Service feasibility study (Release 10) The present document

More information

Wireless Security Security problems in Wireless Networks

Wireless Security Security problems in Wireless Networks Wireless Security Security problems in Wireless Networks Security of Wireless Networks Wireless networks are everywhere more and more electronic devices are becoming wireless However, ensuring security

More information

Yong Hak, Jung / Onnet Technologies Tel :

Yong Hak, Jung / Onnet Technologies Tel : - Procedure 2008. 11. 05 Yong Hak, Jung / Onnet Technologies Tel :016-500-8582 E-Mail : jyhpan@ont.co.kr 차례 Acronyms Specific Procedure Attach Detach Tracking Area Updating connection management Procedure

More information

GSM HOME SECURITY SYSTEM

GSM HOME SECURITY SYSTEM Cell /Mobile phone home security system GSM HOME SECURITY SYSTEM Model : BS120 TABLE OF CONTENTS 1. FEATURES... 1 2. APPLICATION... 2 3. SPECIFICATIONS... 3 4. FRONT PANEL & LAYOUT DESCRIPTION...6 5. BASIC

More information

Rural broadband and its implications for the future of Universal Service. The Israeli Case

Rural broadband and its implications for the future of Universal Service. The Israeli Case Rural broadband and its implications for the future of Universal Service The Israeli Case OECD, Porto, October 2004 Uri Olenik Director General Presentation Agenda Broadband & universal service regulation

More information

THE GLOBAL TRANSITION TO DIGITAL ENTERTAINMENT

THE GLOBAL TRANSITION TO DIGITAL ENTERTAINMENT THE GLOBAL TRANSITION TO DIGITAL ENTERTAINMENT Ph.D. Mathias Giloth Digital Media Pipeline 17 New York GfK 2017 Digital Media Pipeline 17 New York 1 Who we are - Charts and Insights in more than 20 countries

More information

Service withdrawal: Selected IBM ServicePac offerings

Service withdrawal: Selected IBM ServicePac offerings Announcement ZS09-0086, dated April 21, 2009 Service withdrawal: Selected IBM offerings Table of contents 1 Overview 9 Announcement countries 8 Withdrawal date Overview Effective April 21, 2009, IBM will

More information

Connect Broadband Fibre Residential Packages

Connect Broadband Fibre Residential Packages Connect Broadband Fibre Residential Packages Introduction & summary The Services are Our white label reseller product that We make available to Communications Providers (CPs) pursuant to the Reseller Agreement

More information

Keysight Technologies E6950A ecall/era-glonass Conformance Test Solution

Keysight Technologies E6950A ecall/era-glonass Conformance Test Solution Keysight Technologies E6950A ecall/era-glonass Conformance Test Solution Introduction Emergency Call (ecall) is an in-vehicle road safety system developed to reduce fatalities, injuries and property loss

More information

Information Package for Reviewers

Information Package for Reviewers Information Package for Reviewers Author: Customer Care Team Date of publication: April 2014 Latest update: June 2015 Table of contents 1 Introduction A. Document purpose B. Compatible browsers with review.cogen.com

More information

Connect Broadband Fibre Residential Packages

Connect Broadband Fibre Residential Packages Connect Broadband Fibre Residential Packages Introduction & summary The Services are Our white label reseller product that We make available to Communications Providers (CPs) pursuant to the Reseller Agreement

More information

VDSL The way to Next Generation Access Networks

VDSL The way to Next Generation Access Networks WIK Conference VDSL The way to Next Generation Access Networks Patrick Dehmer, Swisscom Fixnet Ltd. Swiss Regulatory framework Telecom Act 1997 aims at lean regulation of former monopoly SUSTAINABLE COMPETITION

More information

IMSI/IMEI Catching & Localization System. (IMSI/IMEI Catcher + Direction Finder)

IMSI/IMEI Catching & Localization System. (IMSI/IMEI Catcher + Direction Finder) IMSI/IMEI Catching & Localization System (IMSI/IMEI Catcher + Direction Finder) About Us Our intelligent, integrated and highly mobile IMSI/IMEI Catching & Localization system is used for identifying the

More information

Quarterly report 01-Jul Oct Visits. 1&1 SiteAnalytics for all domains and subdomains

Quarterly report 01-Jul Oct Visits. 1&1 SiteAnalytics for all domains and subdomains All page impressions from the same computer are summarised as one visit. The visits are uniquely identified on the basis of the IP address and the browser ID. As several people may share a computer (e.g.

More information

Keysight E7515A UXM Wireless Test Set. Coniguration Guide

Keysight E7515A UXM Wireless Test Set. Coniguration Guide Keysight E7515A UXM Wireless Test Set Coniguration Guide 02 Keysight E7515A UXM Wireless Test Set - Coniguration Guide Make a Clear Call The team looks to you: will a new chipset or UE pass the crucial

More information

Keysight Technologies T4020S LTE RRM Test System. Technical Overview

Keysight Technologies T4020S LTE RRM Test System. Technical Overview Keysight Technologies T4020S LTE RRM Test System Technical Overview 02 Keysight T4020S LTE RRM Test System - Technical Overview Overview The T4020S LTE RRM test system is the Keysight Technologies, Inc.

More information

Device Settings Database

Device Settings Database Device Settings Database 26.10.2017 Issues Open Market Devices > 60% of devices shipped. VoLTE / ViLTE launches are increasing making device configuration a major issue driving up OPEX / CAPEX costs due

More information

E-Seminar. Wireless LAN. Internet Technical Solution Seminar

E-Seminar. Wireless LAN. Internet Technical Solution Seminar E-Seminar Wireless LAN Internet Technical Solution Seminar Wireless LAN Internet Technical Solution Seminar 3 Welcome 4 Objectives 5 Definition 6 Uses 7 LAN Network Layout 8 Operation 9 Building - to -

More information

Device Settings Database

Device Settings Database Device Settings Database 07.12.2017 Issues Open Market Devices > 60% of devices shipped. VoLTE / ViLTE launches are increasing; making device configuration a major issue driving up operational costs due

More information

N7624B Signal Studio for LTE Technical Overview

N7624B Signal Studio for LTE Technical Overview N7624B Signal Studio for LTE Technical Overview Easily Create Sophisticated LTE Test Waveforms 3GPP Long Term Evolution (LTE) defines improvements to UMTS to provide increased system efficiency, including

More information

System Architecture Evolution

System Architecture Evolution System Architecture Evolution Contents 2.1 Architecture of LTE 2.2 Communication Protocols 2.3 Example Information Flows 2.4 Bearer Management 2.5 State Diagrams 2.6 Spectrum Allocation 2.1 Architecture

More information

Leica EM KMR3. Balanced-break Glass Knife Maker

Leica EM KMR3. Balanced-break Glass Knife Maker Leica EM KMR3 Balanced-break Glass Knife Maker The First True Balanced-break Knife Maker Since the introduction of the world s first glass knife maker in 1962, Leica Microsystems has continuously refined

More information

Agilent 8960 Series 10 Wireless Communications Test Set

Agilent 8960 Series 10 Wireless Communications Test Set Agilent 8960 Series 10 Wireless Communications Test Set Configuration Guide 8960 Series 10 Wireless Communications Test Set Mainframe, Applications, and Software The building blocks of the 8960 are an

More information

3G/4G Mobile Communications Systems. Dr. Stefan Brück Qualcomm Corporate R&D Center Germany

3G/4G Mobile Communications Systems. Dr. Stefan Brück Qualcomm Corporate R&D Center Germany 3G/4G Mobile Communications Systems Dr. Stefan Brück Qualcomm Corporate R&D Center Germany Chapter IX: Mobility Control 2 Slide 2 Mobility Control Handover Types Mobility Measurements in UMTS Mobility

More information

INTERDIGITAL. 4 th Quarter 2013 Investor Presentation. invention collaboration contribution InterDigital, Inc. All rights reserved.

INTERDIGITAL. 4 th Quarter 2013 Investor Presentation. invention collaboration contribution InterDigital, Inc. All rights reserved. INTERDIGITAL 4 th Quarter 2013 Investor Presentation invention collaboration contribution 1 2013 InterDigital, Inc. All rights reserved. Forward-Looking Statements 2 2013 InterDigital, Inc. All rights

More information

VOICE/DATA SIMCARD USA UNLIMITED

VOICE/DATA SIMCARD USA UNLIMITED VOICE/DATA SIMCARD USA UNLIMITED Copyright 2018. All rights reserved. The content of this document may not be copied,replaced,distributed,published,displayed, modified,or transferred in any form or by

More information

Mobile Security Fall 2013

Mobile Security Fall 2013 Mobile Security 14-829 Fall 2013 Patrick Tague Class #4 Telecom System Security General Vulnerabilities Service interruption vulnerabilities Due to increased capacity offered by high speed communication

More information

BRIDGE TO GLOBAL MARKET FOR MVNOs. Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers

BRIDGE TO GLOBAL MARKET FOR MVNOs. Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers 1 BRIDGE TO GLOBAL MARKET FOR MVNOs Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers How to compete with big MNOs on equal terms 2 Your

More information

Security functions in mobile communication systems

Security functions in mobile communication systems Security functions in mobile communication systems Dr. Hannes Federrath University of Technology Dresden Security demands Security functions of GSM Known attacks on GSM Security functions of UMTS Concepts

More information

Big Picture. ~10 years between generations

Big Picture. ~10 years between generations Big Picture ~10 years between generations 7 Who is Who? Mobile Operators ITU Members ITU GSM, W-CDMA, UMTS IS-95), IS-41, IS- 2000, IS-835 Third Generation Patnership Project (3GPP) CWTS (China) Third

More information