GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier
|
|
- Loren Gordon
- 6 years ago
- Views:
Transcription
1 SysSec System Security Lab. GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier Byeongdo Hong, Sangwook Bae, Yongdae Kim KAIST SysSec Feb. 19, 2018
2 Paging Area in Cellular Network Tracking Area (radius < 10 km) Yongdae Paging: A method to find specific subscriber How? By using subscriber s identifier 2
3 Paging Area in Cellular Network Tracking Area (radius < 10 km) Paging Request Yongdae Paging: A method to find specific subscriber How? By using subscriber s identifier 3
4 Paging Area in Cellular Network Tracking Area (radius < 10 km) Paging Request Paging Response Yongdae Paging: A method to find specific subscriber How? By using subscriber s identifier 4
5 Identifiers in Cellular Networks v Permanent/Unique identifier IMSI (International Mobile Subscriber Identity) Provisioned in the SIM card v Temporary identifier Used to hide subscriber TMSI (Temporary Mobile Subscriber Identity) Used in 2G/3G GUTI (Globally Unique Temporary Identity) Used in LTE 5
6 Location Tracking in Cellular Network Location Area 1 Victim Yongdae TMSI: 0xDEADBEEF 0xDEADBEEF = Yongdae? Attacker Location Area 2 0xDEADBEEF User B User C Kune et al. NDSS
7 Location Tracking in Cellular Network Location Area 1 Victim A TMSI: 0xff xff = A I found A!! Attacker Location Area 2 User B Temporary ID Issue: Unchanged User Identifier C GSM: NDSS 12, LTE: NDSS 16 Repeat dialing 7
8 Phone number-temporary ID mapping v Traffic analysis to find the same TMSI (Kune et al. NDSS 12) Find intersects of identifier s sets Attacker Call trigger Observation Call trigger Call trigger dt dt dt Paging Channel Time v Using Silent Call Terminating call before ringing v Same vulnerability in LTE - unchanged GUTI (Shaik et al. NDSS 16) 8
9 Defense of Location Tracking v Temporary Identifier Reallocation GUTI Reallocation in LTE To prevent between subscriber and ID mapping Q. Is GUTI Reallocation the solution to existing attacks? A. It is Yes But simply changing is not a solution! 9
10 Experiment Setup Device Analysis Broadcast Channel Analysis srslte (Open source) Antenna Diagnostic Monitor Signaling Collection and Analysis Tool (SCAT) [1] USRP B210 Broadcast Channel Receiver [1] B. Hong, S. Park, H. Kim, D. Kim, H. Hong, H. Choi, J.P. Seifert, S. Lee, Y. Kim, Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -, IEEE Transactions on Mobile Computing. 10
11 Worldwide Data Collection Country # of OP. # of USIM # of signalings Country # of OP. # of USIM U.S.A K U.K K Austria K Spain K Belgium K Netherlands K Switzerland K Japan K Germany K South Korea M France K OP: operator, USIM: Universal Subscriber Identity Module, Signaling: control plane message 11 # of signalings Data summary Collection Period: ~ # of countries: 11 # of operators: 28 # of USIMs: 78 # of voice calls: 58K # of signalings: 6.4M
12 Same vs. Fingerprintable IDs NDSS 12, 16: Same ID à Location Tracking!! This work: ID Fingerprinting à Location Tracking!! 12
13 Fixed Bytes in GUTI Reallocation v 19 operators have fixed bytes Allocation Pattern Assigning the same GUTI Three bytes fixed Two bytes fixed One bytes fixed Operators BE-III, DE-II, FR-II, JP-I CH-II, DE-III, NL-I, NL-II BE-II, CH-I, CH-III, ES-I, FR-I, NL-III AT-I, AT-II, AT-III, BE-I, DE-I AT: Austria, BE: Belgium, CH: Switzerland, DE: Germany, ES: Spain, FR: France, JP: Japan, NL: Netherlands 13
14 Case I: Netherlands (NL-I) 14 Hexadecimal value Hexadecimal value FF 192 C FF 192 C (a) 1st byte # of call (c) 3rd byte # of call Hexadecimal value Hexadecimal value F 12 C (b) 2nd byte # of call FF 192 C (d) 4th byte # of call
15 Case I: Netherlands (NL-I) 15 Hexadecimal value Hexadecimal value FF 192 C FF 192 C (a) 1st byte # of call (c) 3rd byte # of call Hexadecimal value Hexadecimal value F 12 C (b) 2nd byte # of call FF 192 C (d) 4th byte # of call
16 Case II: Belgium (BE-II) Hexadecimal value 192 C (a) 1st byte # of call Hexadecimal value (b) 2nd byte # of call 16 Hexadecimal value FF 192 C # of call (c) 3rd byte Hexadecimal value FF 192 C (d) 4th byte # of call
17 Case II: Belgium (BE-II) Hexadecimal value 192 C (a) 1st byte # of call Hexadecimal value (b) 2nd byte # of call 17 Hexadecimal value FF 192 C # of call (c) 3rd byte Hexadecimal value FF 192 C (d) 4th byte # of call
18 Fixed Bytes in GUTI Reallocation v 19 operators have fixed bytes Allocation Pattern Assigning the same GUTI Three bytes fixed Two bytes fixed One bytes fixed Operators BE-III, DE-II, FR-II, JP-I CH-II, DE-III, NL-I, NL-II BE-II, CH-I, CH-III, ES-I, FR-I, NL-III AT-I, AT-II, AT-III, BE-I, DE-I AT: Austria, BE: Belgium, CH: Switzerland, DE: Germany, ES: Spain, FR: France, JP: Japan, NL: Netherlands 18
19 Stress Testing v No noticeable rule of GUTI Reallocation for some operators v Invoking voice call continuously with a short time Two types of test Weak stress testing Hard stress testing Calls at shorter intervals than weak stress test 19
20 Stress Testing Result v Force the network to skip the GUTI reallocation Perform experiments on US and Korean operators Two US and two Korean operators FF Network skips GUTI Reallocation End weak stress testing Operator Weak Stress Testing Hard Stress Testing KR-I O O KR-II X O US-I X O US-II O O O: Reuse GUTI X: No noticeable change Hexadecimal value 192 C # of call 1st Byte 2nd Byte 3rd Byte 4th Byte 20
21 Success Rate of our Attack v Required number of calls covering 99% success rate Call Trial paging / sec 88 paging / sec 160 paging / sec 1 byte fixed 2 bytes fixed 3 bytes fixed
22 Location Tracking with GUTI v Observation of broadcast channels after call invocation Pattern matching (fixed bytes, assigning same GUTI) Location tracking (Tracking Area, Cell) OpenSignal (at KAIST) 22
23 Defenses + Requirements v Frequent refreshing of temporary identifier Per service request v Unpredictable identity allocation Cryptographically secure pseudorandom number generation Hash_DRBG can be used v Collision avoidance v Stress-testing resistance v Low cost implementation 23
24 Conclusion v Predictable reallocation logic GUTI reallocation pattern Fixed bytes (19 operators) Same GUTI By stress test (4 test cases) Assigning same GUTI v Location tracking is still possible in cellular network! v Secure GUTI reallocation mechanism is required 24
25 Thank you Q & A 25
26 BACK UP SLIDES
27 27 GUTI Format
28 Dataset Release? v Our dataset includes somewhat sensitive information. Name of telcos è Vulnerabilities can be linked to telcos. Some IMSIs v Not clear if releasing this dataset may cause any legal issues. v B. Hong, et. al, Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -, IEEE Transactions on Mobile Computing. Finding performance bugs by comparative analysis of call flows v Should we build open-source dataset using crowdsourcing? May help customers to push telcos to build secure and better cellular network! 28
29 29 Stress Testing Result: US-I
30 Probability with Fixed Bytes
31 Attack Flow Obtain target information (Phone number, carrier) Perform GUTI Reallocation? 31
32 Attack Flow Perform GUTI Reallocation? Yes No Find the target (MME area, Tracking area, Cell) Analysis of rules for ID reallocation 32
33 Attack Flow Analysis of rules for ID reallocation Have fixed bytes? No Stress test Yes Find the target (MME area, Tracking area, Cell) 33
34 Paging Distribution in Korea (KR-I) # of paging / sec Max: 88 pagings / sec :10 22:50 2:30 6:10 9:50 13:30 Min: 5 pagings / sec Time of day 34
Peeking over the Cellular Walled Gardens
Peeking over the Cellular Walled Gardens A Method for Closed Network Diagnosis Byeongdo Hong 1, Shinjo Park 2 Hongil Kim 1, Dongkwan Kim 1 Hyunwook Hong 1, Hyunwoo Choi 1 Jean-Pierre Seifert 2, Sung-Ju
More informationPrivacy through Pseudonymity in Mobile Telephony Systems
Privacy through Pseudonymity in Mobile Telephony Systems Myrto Arapinis 1 Loretta Mancini 2 Eike Ritter 2 Mark Ryan 2 1 School of Informatics, University of Edinburgh 2 School of Computer Science, University
More informationDefeating IMSI Catchers. Fabian van den Broek et al. CCS 2015
Defeating IMSI Catchers Fabian van den Broek et al. CCS 2015 Ren-Jay Wang CS598 - COMPUTER SECURITY IN THE PHYSICAL ckground 3GPP 3GPP 3 rd Generation Partnership Project Encompasses: GSM and related 2G
More informationUSA and Finland surprise: High and quickly growing mobile data usage
Industry analysis #3 2016 Mobile data usage 2015 preliminary USA and Finland surprise: High and quickly growing mobile data usage High usage 20 EUR ARPU Low usage Low revenue per MB High revenue per MB
More informationTotalPatent v. TotalPatent. TotalPatent. TotalPatent
TotalPatent TotalPatent TotalPatent TotalPatent v TotalPatent TotalPatent TotalPatent TotalPatent v TotalPatent Content 22 Â µ v 74 US 1836; EP 1978; WO 1978; CH 1888; DE 1890; GB 1890; NL 1915 Â Â Additional
More informationPeak data in sight. Industry analysis # H 2014 mobile usage indicates
Industry analysis #7 2014 1H 2014 mobile usage indicates Peak data in sight This is tefficient s 10 th public analysis on the development of mobile data usage. For the first time, we see clear signs of
More informationKeysight Technologies E6701J GSM/GPRS and E6704A EGPRS Lab Applications For the 8960 (E5515C/E) Wireless Communications Test Set. Technical Overview
Keysight Technologies E6701J GSM/GPRS and E6704A EGPRS Lab Applications For the 8960 (E5515C/E) Wireless Communications Test Set Technical Overview Combining the benefits of GSM/GPRS/EGPRS network emulation
More informationCommunication and Distributed Systems Seminar on : LTE Security. By Anukriti Shrimal May 09, 2016
Communication and Distributed Systems Seminar on : LTE Security By Anukriti Shrimal May 09, 2016 LTE network with interfaces LTE Security 2 Contents LTE Security : Why, What, How EPS Architecture Design
More informationRates. Local Call Rates. Overseas Call Rates (v019) Monday to Friday 8:00pm to 7:59am 8 per min Saturday and Sunday All Day
Rates Local Call Rates Monday to Friday 8:00pm to 7:59am 8 per min Saturday and Sunday All Day Rounded to the nearest cent 16 per min Monday to Friday 8:00am 7:59pm Rounded to the nearest cent Overseas
More informationPay As You Want: Bypassing Charging System in Operational Cellular Networks
Pay As You Want: Bypassing Charging System in Operational Cellular Networks Hyunwook Hong ( ), Hongil Kim, Byeongdo Hong, Dongkwan Kim, Hyunwoo Choi, Eunkyu Lee, and Yongdae Kim Korea Advanced Institute
More informationAttacking Mobile-Terminated Services in GSM
Berlin Institute of Technology FG Security in Telecommunications Weiss Attacking Mobile-Terminated Services in GSM TelcoSecDay 2013 Nico Golde, Kevin Redon, Heidelberg, March 12th 2013 nico@sec.t-labs.tu-berlin.de
More informationLTE Security How Good Is It?
SESSION ID: TECH-RO3 LTE Security How Good Is It? Jeffrey Cichonski IT Specialist (Security) National Institute of Standards & Technology @jchonski Joshua Franklin IT Specialist (Security) National Institute
More informationCase study of a high-tech world leader: Republic of Korea Dr Tim Kelly, Head, Strategy and Policy Unit
Case study of a high-tech world leader: Republic of Korea Dr Tim Kelly, Head, Strategy and Policy Unit The views expressed in this presentation are those of the authors and do not necessarily reflect the
More informationAruba Quick Start Guide
Aruba Quick Start Guide Before you can access the Web-based Web UI tools, which is the primary configuration interface for Aruba WLAN switches, the switch must be configured with basic system information
More informationE-readiness rankings 2007
E-readiness rankings 2007 Countries digital development elopment in global context The Economist Intelligence Unit Prepared for The State of Telecom at Columbia University it 19 October 2007 A 1 About
More informationFraude dans la Telephonie
Fraude dans la Telephonie Aurélien Francillon Merve Sahin With Monaco Telecom Also with cooperations: NYU Abu Dhabi Georgia Tech Telecom Paris Tech (Marc Relieu) Telephony Fraud A long-standing problem
More informationInternational Telecommunication Union
1 The views expressed in this paper are those of the author and do not necessarily reflect the opinions of the ITU or its Membership. Broadband competition: Penetration, speed and price Taylor Reynolds
More informationSession Trace in GPRS/EDGE
Tracing GPRS Signaling and User Plane Activities using MasterClaw Introduction MasterClaw Call and Session Trace is the key application to track signaling procedure and correlate messages over several
More informationAgilent 8960 Series 10 Wireless Communications Test Set
Agilent 8960 Series 10 Wireless Communications Test Set Configuration Guide 8960 Series 10 Wireless Communications Test Set Mainframe, Applications, and Software The building blocks of the 8960 are an
More informationTraining and trials on network planning tools for evolving network architectures. Session 3.2
ITU-BDT Training and trials on network planning tools for evolving network architectures Moscow Russian Federation, 4-84 8 June 2007 Session 3.2 Network planning at different time scales, long, medium
More informationE vo lu t io n T ech n o lo g y:
Background Long Term Evolution (LTE) is a 4G wireless broadband technology developed by the Third Generation Partnership Project (3GPP), an industry trade group. 3GPP named the technology Long Term Evolution
More informationUploading protocols and Assay Control Sets to the QIAsymphony SP via the USB stick
Uploading protocols and Assay Control Sets to the QIAsymphony SP via the USB stick This document describes how to upload protocols and Assay Control Sets to the QIAsymphony SP using the USB stick supplied
More informationSecurity of Cellular Networks: Man-in-the Middle Attacks
Security of Cellular Networks: Man-in-the Middle Attacks Mario Čagalj University of Split 2013/2014. Security in the GSM system by Jeremy Quirke, 2004 Introduction Nowadays, mobile phones are used by 80-90%
More information1 01-Jan Jan Jan Jan Jan Jan Jan Feb Feb Feb Feb Feb-14
All page impressions from the same computer are summarised as one visit. The visits are uniquely identified on the basis of the IP address and the browser ID. As several people may share a computer (e.g.
More informationWireless Communication
Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications
More informationCOPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA in Third-Generation Systems
1 Introduction Harri Holma and Antti Toskala 1.1 WCDMA in Third-Generation Systems Analog cellular systems are commonly referred to as first-generation systems. The digital systems, such as Global System
More informationPOWER-ON AND POWER-OFF PROCEDURES
POWER-ON AND POWER-OFF PROCEDURES TABLE OF CONTENTS 1. Power-On Sequence 2. Network and Cell Selection 3. RRC Connection Establishment 4. Attach Procedure 5. Detach Procedure 1. POWER-ON SEQUENCE The following
More informationAgilent 8960 Series 10 Wireless Communications Test Set
Agilent 8960 Series 10 Wireless Communications Test Set Configuration Guide 8960 Series 10 Wireless Test Set Mainframe, Applications, and Software The building blocks of the 8960 are an E5515 test set
More informationThe mobile broadband revolu0on!
09-06-22 The mobile broadband revolu0on! Anders Cajander Head of Innova+on Management TeliaSonera Mobility TeliaSonera Leading Nordic total telecommunications provider 1 21 Mobile Operators in 18 countries
More informationStep 1: New Portal User User ID Created Using IdentityIQ (IIQ)
Rockwell Automation PartnerNetwork Portal Single Sign-on (SSO) Login to Rockwell Automation PartnerNewtork Portal for Commercial Programs Participants Scope: This job aid provides instructions on how to
More informationTelecommunication Regulatory Reform and the WTO Process
Telecommunication Regulatory Reform and the WTO Process Dr Tim Kelly, ITU Session 1: Course on Telecom Policy, Regulation and Management, University of Witwatersrand, 6-7 May, 1999 * The views expressed
More informationIridium. Roadpost Satellite Service. Customer Care. A free call from your Roadpost satellite phone:
E E ID RVIC GU SE IS OUR TH Y D ING EA US R ORE F BE Roadpost Satellite Service Iridium User Guide Customer Care A free call from your Roadpost satellite phone: customercare@roadpost.com www.roadpost.com
More informationWireless Communication
Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications
More informationMore Precise Locations for Mobile 999 Calls
More Precise Locations for Mobile 999 Calls 12 December Cambridge Wireless Limited 1 UK Emergency Service 999/112 call handling : Voice + Location - Voice : Mobile, Fixed, VoIP - esms for hearing impaired
More informationGSM security country report: Thailand
GSM security country report: Thailand GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin February 2013 Abstract. GSM networks differ widely in their protection capabilities against common
More informationTROVIS 6600 Automation System for industrial processes
TROVIS 6600 Automation System for industrial processes Graphical Project Management Tool Max. 40 characters for data point names Function blocks (temperature control circuits, autoclave loops, analog programmer,
More informationCloud PBX: Real world scenarios
Cloud PBX: Real world scenarios Ralph Eckhard Ralph Eckhard IT Architect @ PeopleWare ICT Modern Workplace / M365 www.365dude.nl @ralpje Elements of Skype for Business Online Skype for Business (E1,E3,E5)
More informationUnderstanding IMSI Privacy!
Understanding IMSI Privacy Ravishankar Borgaonkar TU Berlin Swapnil Udar Aalto University Email: darshak@sec.t-labs.tu-berlin.de Blackhat USA 2014, Las Vegas, 7 th August 2014 Overview Unresolved Privacy
More informationIncubating ideas in R&D capabilities abroad
Incubating ideas in R&D capabilities abroad European Commission - 21 October 2009 José Valerdi Tormo Head of Orange Labs R&D Spain Local markets develop break through innovations 2 inspired by innovative
More informationMobile network security report: Ukraine
Mobile network security report: Ukraine GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin June 2017 Abstract. Mobile networks differ widely in their protection capabilities against common
More informationGSM security country report: Estonia
GSM security country report: Estonia GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin September 2014 Abstract. GSM networks differ widely in their protection capabilities against common
More informationHow To deploy IoT Gloablly
How To deploy IoT Gloablly SangWoo Shim Senior IoT Sales Specialist 17 May 2016 Complexity of Global M2M Deployment Numerous countries = numerous networks Country specific SIMs High roaming charges Different
More informationGSM Hacking. Wireless Mobile Phone Communication 30 th January 2014 UNRESTRICTED EXTERNAL
GSM Hacking Wireless Mobile Phone Communication 30 th January 2014 Labs.mwrinfosecurity.com MWR Labs 1 Labs.mwrinfosecurity.com MWR Labs Introduction to GSM June 2008 2.9 BILLION subscribers use GSM. Replaced
More informationLTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE
LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE Syed Rafiul Hussain*, Omar Chowdhury, Shagufta Mehnaz*, Elisa Bertino* Purdue University*, University of Iowa Critical Infrastructure
More informationThe Cellular Interceptor CC2800 Series
The Cellular Interceptor CC2800 Series Operational Parameters The Target Mode enables the user to direct cellular interception by variables such as the IMSI, TMSI, or cellular phone number of the suspect.
More informationGSM. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides) GPRS
GSM Example of a PLMN (Public Land Mobile Network) At present most successful cellular mobile system (over 200 million subscribers worldwide) Digital (2 nd Generation) cellular mobile system operating
More informationTemporary Document Page 2 - switches off, the allocated resources and PCC rules information of PDN GWs used by the UE in non- network will not be dele
Temporary Document Page 1 - TSG SA WG2 Architecture S2#58 S2-072558 25-29 June 2007 Orlando, FL, USA Source: Huawei Title: Attach Type in attach procedure Document for: Discussion / Approval Agenda Item:
More informationdevelopment, return of experience, state of the art
CCRCC 2012 Thomas Wesenberg Speaker of the GSM-R Industry Group Lille November 6th, 2012 development, return of experience, state of the art www.gsm-rail.com # Agenda 1. GSM-R IG general update 2. Developing
More informationKeysight Technologies GSM/W-CDMA SMS Testing with Wireless Test Managers (WTMs) Application Note
Keysight Technologies GSM/W-CDMA SMS Testing with Wireless Test Managers (WTMs) Application Note Introduction Two Quick Fixed Engineerings (QFEs) for the Keysight Technologies, Inc. Wireless Test Managers
More informationEventBuilder.com. International Audio Conferencing Access Guide. This guide contains: :: International Toll-Free Access Dialing Instructions
EventBuilder.com International Audio Conferencing Access Guide TM This guide contains: :: International Toll-Free Access Dialing Instructions :: ATFS (Access Toll-Free Service) Dialing Instructions ::
More informationSTOC-FX. X100P.com s. World s First Professional Grade VoIP FXS to FXO Converter
X100P.com s STOC-FX World s First Professional Grade VoIP FXS to FXO Converter Copyright (c) 2006 by X100P.com All rights reserved including the rights of reproduction in whole or in part in any form.
More informationJiang Wangcheng President of IoT Solution Marketing & Solutions Department
Jiang Wangcheng President of IoT Solution Marketing & Solutions Department Large-scale Deployment of NB-IoT Network Has Started 400K Sites 2017 20M Connections 1.5M Sites 2020 National Coverage China MIIT
More informationRPM International Inc. Hotline Instructions
RPM International Inc. Hotline Instructions While compliance matters can often be resolved at the local level, the RPM International Inc. ( RPM ) Hotline provides another way for you to report concerns
More informationUnlimited moves the needle but it s when mobile addresses slow fixed internet that something happens
Industry analysis #1 218 Mobile data full year 217 Unlimited moves the needle but it s when mobile addresses slow fixed internet that something happens This is tefficient s 19 th public analysis of the
More informationETSI TS V4.1.0 ( )
TS 122 022 V4.1.0 (2002-06) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Personalisation of Mobile Equipment (ME); Mobile
More informationKapsch CarrierCom. We drive innovation to drive your business.
Kapsch CarrierCom. We drive innovation to drive your business. always one step ahead 1 Who are we? Presentation heading Presentation subheading 2 The Kapsch Group - 118 Years of Experience We are an operating
More information8x Independent DMX Controller
8x Independent DMX Controller Thank you for your purchase! The drumlite Independent DMX controller allows you to control each drumlite individually meaning each drum can glow a different color at any time.
More informationKeysight Technologies Multi-Vendor Cellular Networks and Value Driven Optimization. Application Note
Keysight Technologies Multi-Vendor Cellular Networks and Value Driven Optimization Application Note Introduction In today s mobile networks, revenue per transported bit is constantly decreasing, while
More informationMANUAL VOICE/DATA SIMCARD CANADA
MANUAL VOICE/DATA SIMCARD CANADA Copyright 2018. All rights reserved. The content of this document may not be copied,replaced,distributed,published,displayed, modified,or transferred in any form or by
More informationPrivacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information
Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information Syed Rafiul Hussain, Mitziu Echeverria, Omar Chowdhury, Ninghui Li and Elisa Bertino Purdue University, University
More informationReport on ISO/IEC/JTC1/SC27 Activities in Digital Identities
International Telecommunication Union ITU-T Report on ISO/IEC/JTC1/SC27 Activities in Digital Identities Dick Brackney ISO/SC27 Liaison Officer to ITU-T SG17 Standards Program Manager, U.S. Dept of Defense
More informationAudio Conference. The Two Popular Audio Conferencing Options. Telecom Audio Conferencing Brings People Together, Wherever They Are MEETINGS ON CALL
Audio Conference MEETINGS ON CALL Telecom Audio Conferencing Brings People Together, Wherever They Are Telecom Audio Conferencing is one of the easiest and most costeffective ways to get people together
More informationS8 AutoScore II System
Important: Remove this guide before handing the device to the patient. Pressures should only be adjusted by qualified personnel. S8 AutoScore II System Clinical Quick Setup Guide Setup is quick and easy
More informationTHE REAL TRUTH BEHIND RANSOMWARE EDDY WILLEMS SECURITY EVANGELIST
THE REAL TRUTH BEHIND RANSOMWARE EDDY WILLEMS SECURITY EVANGELIST TWITTER: @EDDYWILLEMS 1 OFFERING SECURITY SOLUTIONS WORLDWIDE Founded in Bochum, Germany in 1985 First AV solution in 1987 Global head
More informationin focus Statistics Telecommunications in Europe Contents INDUSTRY, TRADE AND SERVICES 8/2005 Author Martti LUMIO
Telecommunications in Europe Statistics in focus INDUSTRY, TRADE AND SERVICES 8/2005 Author Martti LUMIO Contents The main telephone lines are more and more subject to competition from the mobile telephone
More informationE R T M S COMMUNICATION PLAN
U I C E R T M S COMMUNICATION PLAN Paolo de Cicco Senior Advisor ERTMS Platform Paris, 14/03/2007-1 Item 16: UIC Workshop Euro-Interlocking Hazard List Methodology for Railway Signalling WORKSHOP HELD
More informationBEAT - Project Overview Prof Julian Fierrez On behalf of Dr Sébastien Marcel Idiap Research Institute, CH http://www.idiap.ch/~marcel Biometrics Evaluation and Testing (BEAT) Research Projects Conference
More informationKeysight Technologies VoLTE Battery Test, Reference Solution
Keysight Technologies VoLTE Battery Test, Reference Solution Solution Brochure The VoLTE battery test reference solution implements battery performance test plan and output results to a required test report.
More informationConnect Broadband Fibre Residential Packages
Connect Broadband Fibre Residential Packages Introduction & summary The Services are Our white label reseller product that We make available to Communications Providers (CPs) pursuant to the Reseller Agreement
More informationKeysight Technologies Quick Start Guide for ADS in Power Electronics. Demo Guide
Keysight Technologies Quick Start Guide for ADS in Power Electronics Demo Guide 02 Keysight Quick Start Guide for ADS in Power Electronics - Demo Guide Why Evaluate ADS? Trends in Switched Mode Power Supplies
More information3GPP TR V ( )
TR 22.950 V10.0.0 (2011-03) Technical Report 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Priority Service feasibility study (Release 10) The present document
More informationWireless Security Security problems in Wireless Networks
Wireless Security Security problems in Wireless Networks Security of Wireless Networks Wireless networks are everywhere more and more electronic devices are becoming wireless However, ensuring security
More informationYong Hak, Jung / Onnet Technologies Tel :
- Procedure 2008. 11. 05 Yong Hak, Jung / Onnet Technologies Tel :016-500-8582 E-Mail : jyhpan@ont.co.kr 차례 Acronyms Specific Procedure Attach Detach Tracking Area Updating connection management Procedure
More informationGSM HOME SECURITY SYSTEM
Cell /Mobile phone home security system GSM HOME SECURITY SYSTEM Model : BS120 TABLE OF CONTENTS 1. FEATURES... 1 2. APPLICATION... 2 3. SPECIFICATIONS... 3 4. FRONT PANEL & LAYOUT DESCRIPTION...6 5. BASIC
More informationRural broadband and its implications for the future of Universal Service. The Israeli Case
Rural broadband and its implications for the future of Universal Service The Israeli Case OECD, Porto, October 2004 Uri Olenik Director General Presentation Agenda Broadband & universal service regulation
More informationTHE GLOBAL TRANSITION TO DIGITAL ENTERTAINMENT
THE GLOBAL TRANSITION TO DIGITAL ENTERTAINMENT Ph.D. Mathias Giloth Digital Media Pipeline 17 New York GfK 2017 Digital Media Pipeline 17 New York 1 Who we are - Charts and Insights in more than 20 countries
More informationService withdrawal: Selected IBM ServicePac offerings
Announcement ZS09-0086, dated April 21, 2009 Service withdrawal: Selected IBM offerings Table of contents 1 Overview 9 Announcement countries 8 Withdrawal date Overview Effective April 21, 2009, IBM will
More informationConnect Broadband Fibre Residential Packages
Connect Broadband Fibre Residential Packages Introduction & summary The Services are Our white label reseller product that We make available to Communications Providers (CPs) pursuant to the Reseller Agreement
More informationKeysight Technologies E6950A ecall/era-glonass Conformance Test Solution
Keysight Technologies E6950A ecall/era-glonass Conformance Test Solution Introduction Emergency Call (ecall) is an in-vehicle road safety system developed to reduce fatalities, injuries and property loss
More informationInformation Package for Reviewers
Information Package for Reviewers Author: Customer Care Team Date of publication: April 2014 Latest update: June 2015 Table of contents 1 Introduction A. Document purpose B. Compatible browsers with review.cogen.com
More informationConnect Broadband Fibre Residential Packages
Connect Broadband Fibre Residential Packages Introduction & summary The Services are Our white label reseller product that We make available to Communications Providers (CPs) pursuant to the Reseller Agreement
More informationVDSL The way to Next Generation Access Networks
WIK Conference VDSL The way to Next Generation Access Networks Patrick Dehmer, Swisscom Fixnet Ltd. Swiss Regulatory framework Telecom Act 1997 aims at lean regulation of former monopoly SUSTAINABLE COMPETITION
More informationIMSI/IMEI Catching & Localization System. (IMSI/IMEI Catcher + Direction Finder)
IMSI/IMEI Catching & Localization System (IMSI/IMEI Catcher + Direction Finder) About Us Our intelligent, integrated and highly mobile IMSI/IMEI Catching & Localization system is used for identifying the
More informationQuarterly report 01-Jul Oct Visits. 1&1 SiteAnalytics for all domains and subdomains
All page impressions from the same computer are summarised as one visit. The visits are uniquely identified on the basis of the IP address and the browser ID. As several people may share a computer (e.g.
More informationKeysight E7515A UXM Wireless Test Set. Coniguration Guide
Keysight E7515A UXM Wireless Test Set Coniguration Guide 02 Keysight E7515A UXM Wireless Test Set - Coniguration Guide Make a Clear Call The team looks to you: will a new chipset or UE pass the crucial
More informationKeysight Technologies T4020S LTE RRM Test System. Technical Overview
Keysight Technologies T4020S LTE RRM Test System Technical Overview 02 Keysight T4020S LTE RRM Test System - Technical Overview Overview The T4020S LTE RRM test system is the Keysight Technologies, Inc.
More informationDevice Settings Database
Device Settings Database 26.10.2017 Issues Open Market Devices > 60% of devices shipped. VoLTE / ViLTE launches are increasing making device configuration a major issue driving up OPEX / CAPEX costs due
More informationE-Seminar. Wireless LAN. Internet Technical Solution Seminar
E-Seminar Wireless LAN Internet Technical Solution Seminar Wireless LAN Internet Technical Solution Seminar 3 Welcome 4 Objectives 5 Definition 6 Uses 7 LAN Network Layout 8 Operation 9 Building - to -
More informationDevice Settings Database
Device Settings Database 07.12.2017 Issues Open Market Devices > 60% of devices shipped. VoLTE / ViLTE launches are increasing; making device configuration a major issue driving up operational costs due
More informationN7624B Signal Studio for LTE Technical Overview
N7624B Signal Studio for LTE Technical Overview Easily Create Sophisticated LTE Test Waveforms 3GPP Long Term Evolution (LTE) defines improvements to UMTS to provide increased system efficiency, including
More informationSystem Architecture Evolution
System Architecture Evolution Contents 2.1 Architecture of LTE 2.2 Communication Protocols 2.3 Example Information Flows 2.4 Bearer Management 2.5 State Diagrams 2.6 Spectrum Allocation 2.1 Architecture
More informationLeica EM KMR3. Balanced-break Glass Knife Maker
Leica EM KMR3 Balanced-break Glass Knife Maker The First True Balanced-break Knife Maker Since the introduction of the world s first glass knife maker in 1962, Leica Microsystems has continuously refined
More informationAgilent 8960 Series 10 Wireless Communications Test Set
Agilent 8960 Series 10 Wireless Communications Test Set Configuration Guide 8960 Series 10 Wireless Communications Test Set Mainframe, Applications, and Software The building blocks of the 8960 are an
More information3G/4G Mobile Communications Systems. Dr. Stefan Brück Qualcomm Corporate R&D Center Germany
3G/4G Mobile Communications Systems Dr. Stefan Brück Qualcomm Corporate R&D Center Germany Chapter IX: Mobility Control 2 Slide 2 Mobility Control Handover Types Mobility Measurements in UMTS Mobility
More informationINTERDIGITAL. 4 th Quarter 2013 Investor Presentation. invention collaboration contribution InterDigital, Inc. All rights reserved.
INTERDIGITAL 4 th Quarter 2013 Investor Presentation invention collaboration contribution 1 2013 InterDigital, Inc. All rights reserved. Forward-Looking Statements 2 2013 InterDigital, Inc. All rights
More informationVOICE/DATA SIMCARD USA UNLIMITED
VOICE/DATA SIMCARD USA UNLIMITED Copyright 2018. All rights reserved. The content of this document may not be copied,replaced,distributed,published,displayed, modified,or transferred in any form or by
More informationMobile Security Fall 2013
Mobile Security 14-829 Fall 2013 Patrick Tague Class #4 Telecom System Security General Vulnerabilities Service interruption vulnerabilities Due to increased capacity offered by high speed communication
More informationBRIDGE TO GLOBAL MARKET FOR MVNOs. Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers
1 BRIDGE TO GLOBAL MARKET FOR MVNOs Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers How to compete with big MNOs on equal terms 2 Your
More informationSecurity functions in mobile communication systems
Security functions in mobile communication systems Dr. Hannes Federrath University of Technology Dresden Security demands Security functions of GSM Known attacks on GSM Security functions of UMTS Concepts
More informationBig Picture. ~10 years between generations
Big Picture ~10 years between generations 7 Who is Who? Mobile Operators ITU Members ITU GSM, W-CDMA, UMTS IS-95), IS-41, IS- 2000, IS-835 Third Generation Patnership Project (3GPP) CWTS (China) Third
More information