Mobile Security Fall 2012

Size: px
Start display at page:

Download "Mobile Security Fall 2012"

Transcription

1 Mobile Security Fall 2012 Patrick Tague Class #5 Telecom Infrastructure Attacks

2 Announcements Project teams and topics need to be set soon Project topics must be approved before the proposal can be submitted/presented Each team will have 6-8 minutes to present their proposal in class on Monday Sign up for survey presentations soon Homework #1 is posted, due on September 24

3 Agenda Telecom infrastructure attacks DoS vulnerabilities in SMS and data systems Rogue base stations and MitM attacks

4 SMS, Pkt Data, & DoS Attacks

5 Short Messaging Service Original SMS standard (1985) outlined three types of functionality: Short message mobile terminated 1992: 1 st SMS message Short message mobile originated 2000: 5x10 9 SMS/month Short message cell broadcast 2005: SMS/month

6 SMS Message Delivery SMS SMS SMSC short msg service center Where is X? X not reachable HLR ESME external short messaging entity Message Queue X

7 Message Delivery ESME SMS SMS SMSC short msg service center SMS Where is X? X is at MSC2 MSC1 HLR BTS1 external short messaging entity MSC2 SMS BTS2 Is X active? Yes, at BTS3 BTS3 SMS (TCH) Traffic channel X VLR

8 Message Delivery SMS SMSC Where is X? X is at MSC2 HLR ESME external short messaging entity SMS short msg service center SMS VLR NO Is X active? MSC1 MSC2 X? X? X? Auth X BTS1 BTS2 BTS3 Paging X (PCH) Paging channel Paging X (PCH) Paging X (PCH) X Reply (RACH) Random access channel Ch. Assign (AGCH) Access grant channel Delivery (SDCCH) X Standalone dedicated control channel

9 At the SMSC: SMS Queuing Queues are finite Messages can be lost Dropping/overflow management varies by carrier For details, see [Traynor et al., JSC 2008] At the MS: Queues are finite, batteries are small If MS queue is full, HLR tells SMSC it is unavailable Batteries can be drained...

10 SMS-Based Attacks Two general types of attacks apply to SMS Content-based attacks Phishing, spoofing, malware, ad-ware, Behavior-based attacks Denial-of-Service (DoS), resource depletion,

11 Content-Based SMS Attacks Basic idea: Malicious SMS messages aim to retrieve info from users; wide-spread solicitation, similar to spam ; infect mobile devices (e.g., for mobile botnets!) Similar to web/ -based attacks

12 Targeted SMS DoS Flooding a user with SMS messages: 1.Buffer (@ MS or SMSC) overflow With enough flooding, SMSC will drop valid messages Some devices auto-delete previously read messages when they run out of storage 2.Valid messages are delayed beyond useful lifetime Ex: meeting reminders are useless after the meeting 3.Valid messages are buried in the SMS flood Also a battery-depletion attack...

13 Voice & SMS Sharing BTS3 Paging X (PCH) X Reply (RACH) Random access channel Ch. Assign (AGCH) Access grant channel SMS delivery (SDCCH) X Standalone dedicated control channel Voice & SMS Resources TCH is not used for SMS BTS3 Paging X (PCH) X Reply (RACH) Random access channel Ch. Assign (AGCH) Access grant channel TCH Setup (SDCCH) X Standalone dedicated control channel Voice traffic (TCH) Traffic channel Both SMS and voice init. use RACH, AGCH, and SDCCH SMS flooding also works as DoS against voice calls!

14 Voice & SMS Sharing From [Traynor et al., Security for Telecommunications Networks, 2008]

15 How to DoS a City... How much SMS traffic must be sent to saturate the SDCCHs in a large metro area? SMS Capacity ~ (#Cell Towers) * (#Sectors/Tower) * (#SDCCH/Sector) * (Capacity/SDCCH) Ex: Washington DC 40 cell towers, 3 sectors/tower Either 8, 12, or 24 SDCCH/Sector Each SDCCH supports ~ 900 msgs/hour SMS Capacity ~ 240 msgs/sec (for 8 SDCCH/sector) ~ 2.8 Mbps

16 How to DDoS a Country... How much SMS traffic must be sent to saturate the SDCCHs in a large country? SMS Capacity ~ (Eff. Sector Density) * (Urban pop. Area) Ex: USA ~1.75 sectors / sq. mile 8 SDCCH/Sector * (#SDCCH/Sector) * (Capacity/SDCCH) Each SDCCH supports ~ 900 msgs/hour SMS Capacity ~ Kmsgs/sec ~ 3.8 Gbps Or ~ 380 Mbps for 10x multi-recipient messaging

17 Potential Defenses Elimination of Internet-originated SMS Not economically practical (SMS = $) Doesn't fully solve the problem (attack from within) Separation of voice and data Complete redesign of infrastructure, hw, & sw Doesn't fully solve the problem Add more resources Rate limiting Improved queue management

18 Mitigating SMS Flooding Incorporate fairness and priority management into SMS queuing Weighted Fair Queuing (WFQ): Each flow goes into a separate message queue - users get a proportional share of the queue to handle their messages Weighted Early Random Detection (WRED): Messages are randomly dropped in proportion to queue occupancy variable for different service classes (emergency use, mobile originated, web originated)

19 Mitigating SMS Flooding From [Traynor et al., Security for Telecommunications Networks, 2008]

20 Cellular Data Service Internet Cellular Network Cellular data service acts as a gateway to the Internet Connecting to an open network through a closed network?

21 Internet Data GGSN Data Delivery Where is X? X is at SGSN2 HLR gateway GPRS support node Data SGSN1 X? BTS1 Paging X (PPCH) MS IP Address SGSN IP Address SGSN2 serving GPRS support node X? X? Auth X BTS2 BTS3 Paging X (PPCH) Paging X (PPCH) Temporary Flow ID (TFI) marks each flow X Reply (PRACH) Ch. Assign (PAGCH) ACK (PACCH) Delivery (PDTCH)

22 MS Data Activity State Activity States To save battery, devices do not constantly listen for packets Ready: constantly listening for packets Standby: periodically listens for pages Idle: device is unregistered / unreachable

23 Data-Based DoS Attacks Establishing a data connection is costly! Timeouts are typically delayed to prevent frequent reallocation and reestablishment due to minor variation Timers ~ 5 seconds TFI field is 5 bits If an adversary establishes 32 data sessions in a sector, DoS to everyone else! Capacity ~ (#Sectors) * (#Msgs/Sector) * (Bytes/Msg) Timer duration Ex: Washington DC: 120 sectors, 41 B/Msg 252 kbps Order of magnitude less work to deny data traffic compared to SMS DoS attack on voice

24 Rogue Base Stations & MitM Attacks Slide credit: C. Midler & B. Tello

25 Rogue BTS An adversary can deploy a rogue BTS that attempts to spoof the service provided by a valid BTS, attracting users for various reasons Possible to launch a MitM attack on 2G/3G mobile connections Applies to GPRS, EDGE, UMTS, and HSPA capable devices Cheap

26 Typical Data Flow Device connects to BTS and establishes IP data connection with GGSN, BSC, and SGSN IP packets are tunneled to the GGSN, which (de)encapsulates them and sends them to/from the Internet BTS controls encryption options [Perez & Pico, BlackHat 2011]

27 Lack of Authentication GPRS and EDGE use 2G GSM authentication Devices are required to prove their identity to the BTS BTS is NOT required to prove its identity to the device

28 Null Encryption Support GPRS / EDGE devices are required to support null encryption (i.e., plaintext) BTS can only offer to support null encryption Most devices will accept the offer and send data in the clear

29 Fallback Support Devices running UMTS/HSPA (3G/3.5G) are often configured to fall back to GPRS/EDGE if no UMTS/HSPA service is available Sometimes occurs in network fringes, rural areas, etc. Also, if someone is jamming the UMTS/HSPA frequencies or certain channels

30 Setting up a Rogue BTS [Perez & Pico, BlackHat 2011]

31 Setting up a Rogue BTS GSM + GPRS + EDGE capable BTS Connects to BSC over Ethernet

32 Setting up a Rogue BTS Consumer grade laptop with Internet connection OpenBSC OSMOSGSN OpenGGSN

33 Setting up a Rogue BTS UMTS/HSPA (3G/3.5G) jammer Only required if the attacker wants to target 3G devices $25-500

34 MitM Attack Attacker positions BTS in range of the target Range can be improved by using a high-gain directional antenna or amplifier

35 Attack Details Attacker must use suitable spectrum for the target's (known) carrier network BTS must be configured to operate using these known frequencies/channels BTS configured to accept connections from desired victim phones If intent is MitM, attacker configures SGSN/GGSN to properly route traffic to Internet, otherwise, just intercepts data rather than forwarding Victim will attach to rogue BTS if power is higher than the real BTS

36 Defenses Major modifications would be needed to make GSM/GPRS/EDGE secure against rogue BTS Higher level protections can be used to secure data against MitM attack UMTS/HSPA devices can be configured to not fall back to 2G/2.5G 4G to the rescue?

37 4G Not to the Rescue

38 Next Time September 17: Project Proposals September 19: WiFi Authentication & Access Control WiFi and how it works Security protocols Vulnerabilities

Mobile Security / /

Mobile Security / / Mobile Security 96-835 / 18-639 / 14-829 Patrick Tague 14 Sept 2010 Class #7 Securing Cellular Services Agenda Vulnerabilities in Cellular Services SMS and related attacks Cellular data services and attacks

More information

Mobile Security Fall 2013

Mobile Security Fall 2013 Mobile Security 14-829 Fall 2013 Patrick Tague Class #4 Telecom System Security General Vulnerabilities Service interruption vulnerabilities Due to increased capacity offered by high speed communication

More information

Mobile Security Fall 2014

Mobile Security Fall 2014 Mobile Security Fall 2014 Patrick Tague Class #3 Telecom Security Issues 1 Class #3 Brief history of telecom security Attacks on telecom networks A few project pitches 2 A3 RES A8 Kc RAND K more than And

More information

Mobile Security Fall 2015

Mobile Security Fall 2015 Mobile Security Fall 2015 Patrick Tague #4: Telecom System Security Issues 2015 Patrick Tague 1 Class #4 Finish up our telecom security history lesson Interesting effects of telecom evolution Analysis

More information

CS Computer and Network Security: GSM Overload

CS Computer and Network Security: GSM Overload CS 5410 - Computer and Network Security: GSM Overload Professor Patrick Traynor Fall 2017 Reminders You need to start working on your project! Some of you have not yet built anything. This will be a problem

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Feb 8, 2011 Class #9 Link/MAC layer security Announcements HW #1 is due on Thursday 2/10 If anyone would like Android phones for their course

More information

CSE Computer Security (Fall 2006)

CSE Computer Security (Fall 2006) CSE 543 - Computer Security (Fall 2006) Lecture 25 - Cellular Network Security Guest Lecturer: William Enck November 30, 2006 URL: http://www.cse.psu.edu/~tjaeger/cse543-f06 1 Unintended Consequences The

More information

GPRS System Architecture

GPRS System Architecture 1 LECTURE 6 GPRS What is GPRS? 2 General Packet Radio Service is an overlay on top of GSM physical layer and network entities It extends data capabilities of GSM and provides connection to external packet

More information

10 Call Set-up. Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up.

10 Call Set-up. Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up. 10 Call Set-up Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up. 10.1 INTRODUCTION... 2 10.2 CALL TO MS (MT)... 3 10.3 CALL FROM MS

More information

Mobile Communications

Mobile Communications Mobile Communications 3GPP Public Land Mobile Networks: GSM, GPRS Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 What is the architecture of the GSM network network elements, interfaces,

More information

WIRELESS SYSTEM AND NETWORKING

WIRELESS SYSTEM AND NETWORKING LECTURE 6 WIRELESS SYSTEM AND NETWORKING References: Rappaport (Chapter 9 and 10) Bernhard (Chapter 3, 4 and 5) Garg (Chapter 8 and 9) Kaarenen (Chapter 1-5 and 9) WIRELESS EVOLUTION Japan Europe Americas

More information

FROM GSM TO LTE-ADVANCED: AN INTRODUCTION TO MOBILE NETWORKS AND MOBILE BROADBAND 2. GENERAL PACKET RADIO SERVICE (GPRS) AND EDGE

FROM GSM TO LTE-ADVANCED: AN INTRODUCTION TO MOBILE NETWORKS AND MOBILE BROADBAND 2. GENERAL PACKET RADIO SERVICE (GPRS) AND EDGE FROM GSM TO LTE-ADVANCED: AN INTRODUCTION TO MOBILE NETWORKS AND MOBILE BROADBAND 2. GENERAL PACKET RADIO SERVICE (GPRS) AND EDGE GPRS (General Packet Radio Service) Enhance GSM to transport data in an

More information

General Packet Radio Service (GPRS) 13 年 5 月 17 日星期五

General Packet Radio Service (GPRS) 13 年 5 月 17 日星期五 General Packet Radio Service (GPRS) What is GPRS? GPRS (General Packet Radio Service) A packet oriented data service for IP and X.25 over GSM networks Enables packet-switched services on the resources

More information

GPRS and UMTS T

GPRS and UMTS T GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,

More information

GSM System Overview. Ph.D. Phone Lin.

GSM System Overview. Ph.D. Phone Lin. GSM System Overview Phone Lin Ph.D. Email: plin@csie.ntu.edu.tw 1 Outlines Introduction GSM Architecture Location Tracking and Call Setup Security GSM Data Services Unstructured Supplementary Service Data

More information

GSM. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides) GPRS

GSM. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides) GPRS GSM Example of a PLMN (Public Land Mobile Network) At present most successful cellular mobile system (over 200 million subscribers worldwide) Digital (2 nd Generation) cellular mobile system operating

More information

SMS ATTACKS AND SECURITY IN MOBILE COMPUTING

SMS ATTACKS AND SECURITY IN MOBILE COMPUTING SMS ATTACKS AND SECURITY IN MOBILE COMPUTING N.Janani Dept. Computer Science & Engineering, Karpagam College Of Engineering (KCE) Coimbatore, TamilNadu, India Email: blackmoon318@gmail.com ABSTRACT: Cellular

More information

Dimensioning, configuration and deployment of Radio Access Networks. part 1: General considerations. Mobile Telephony Networks

Dimensioning, configuration and deployment of Radio Access Networks. part 1: General considerations. Mobile Telephony Networks Dimensioning, configuration and deployment of Radio Access Networks. part 1: General considerations Mobile Telephony Networks 1 The Evolution of Mobile Telephony 1st Generation 2nd 3rd 4th Analogue Voice

More information

Attacking Mobile-Terminated Services in GSM

Attacking Mobile-Terminated Services in GSM Berlin Institute of Technology FG Security in Telecommunications Weiss Attacking Mobile-Terminated Services in GSM TelcoSecDay 2013 Nico Golde, Kevin Redon, Heidelberg, March 12th 2013 nico@sec.t-labs.tu-berlin.de

More information

Understand iwag Solution for 3G Mobile Data

Understand iwag Solution for 3G Mobile Data Understand iwag Solution for 3G Mobile Data Contents Introduction Prerequisites Requirements Components Used Background Information Acronyms Explanation of Terminology Used Understand Mobility Services

More information

Mobile Security Fall 2013

Mobile Security Fall 2013 Mobile Security 14-829 Fall 2013 Patrick Tague Class #6 More WiFi Security & Privacy Issues WiFi Security Issues A Scenario Internet Open AP SSID Network X Open OpenAP AP SSID Attacker Network X LaptopLaptop

More information

M2M in the Real World: Security Best Practices and Lessons Learned

M2M in the Real World: Security Best Practices and Lessons Learned M2M in the Real World: Security Best Practices and Lessons Learned Tyson Macaulay VP Global Telecommunications Strategy & Corporate Development Oct 10, 2013 Agenda and Topics M2M compliance and regulatory

More information

Mobile Networks Evolution: Economic Aspects of Evolution towards IMT2000

Mobile Networks Evolution: Economic Aspects of Evolution towards IMT2000 Mobile Networks Evolution: Economic Aspects of Evolution towards IMT2000 ITU-BDT Regional Seminar on Fixed Mobile Convergence and new network architecture for Arab Region Tunis, Tunisia, 21-24 November

More information

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase UNIT-5 GSM System Operations (Traffic Cases) Registration, call setup, and location updating Call setup Interrogation phase For the interrogation phase The initial address message comes outside the GSM

More information

Cellular Networks and Mobility

Cellular Networks and Mobility Cellular Networks and Mobility Daniel Zappala CS 460 Computer Networking Brigham Young University Cellular Networks GSM 2G/3G Architecture 3/20 2G Standard 4/20 GSM: combined FDM/TDM divide into 200 khz

More information

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Background: # wireless (mobile) phone subscribers

More information

GPRS security. Helsinki University of Technology S Security of Communication Protocols

GPRS security. Helsinki University of Technology S Security of Communication Protocols GPRS security Helsinki University of Technology S-38.153 Security of Communication Protocols vrantala@cc.hut.fi 15.4.2003 Structure of the GPRS Network BSS GTP PLMN BSS-Base Station sub-system VLR - Visiting

More information

End-to-end IP Service Quality and Mobility - Lecture #5 -

End-to-end IP Service Quality and Mobility - Lecture #5 - End-to-end IP Service Quality and Mobility - Lecture #5 - Special Course in Networking Technology S-38.215 vilho.raisanen@nokia.com Planned contents & draft schedule 1. Introduction Jan 13th 2. Characteristics

More information

Lecture overview. Modifications and derivatives of GSM Data transmission in GSM: HSCSD GPRS part one EDGE

Lecture overview. Modifications and derivatives of GSM Data transmission in GSM: HSCSD GPRS part one EDGE Lecture overview Modifications and derivatives of GSM Data transmission in GSM: HSCSD GPRS part one EDGE Modifications and derivatives of GSM Introduction of half-rate speech coding (BR 6.5 kb/s) Two users

More information

Nexus8610 Traffic Simulation System. Intersystem Handover Simulation. White Paper

Nexus8610 Traffic Simulation System. Intersystem Handover Simulation. White Paper Traffic Simulation System Intersystem Handover Simulation White Paper Notice Every effort has been made to ensure that the information in this document was accurate at the time of printing. However, the

More information

Attacks on WLAN Alessandro Redondi

Attacks on WLAN Alessandro Redondi Attacks on WLAN Alessandro Redondi Disclaimer Under the Criminal Italian Code, articles 340, 617, 617 bis: Up to 1 year of jail for interrupting public service 6 months to 4 years of jail for installing

More information

GSM Hacking. Wireless Mobile Phone Communication 30 th January 2014 UNRESTRICTED EXTERNAL

GSM Hacking. Wireless Mobile Phone Communication 30 th January 2014 UNRESTRICTED EXTERNAL GSM Hacking Wireless Mobile Phone Communication 30 th January 2014 Labs.mwrinfosecurity.com MWR Labs 1 Labs.mwrinfosecurity.com MWR Labs Introduction to GSM June 2008 2.9 BILLION subscribers use GSM. Replaced

More information

Mobile Security / /

Mobile Security / / Mobile Security 96-835 / 18-639 / 14-829 Patrick Tague 2 Sept 2010 Class #4 Overview of Mobile/Cellular Systems Agenda Overview of mobile cellular systems System architecture and overview 2G, 2.5G, 2.75G,

More information

Mobility: vocabulary

Mobility: vocabulary What is mobility? spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user,

More information

Basics of GSM in depth

Basics of GSM in depth This document will be helpful for the telecom engineers who deal with GSM as well as for the fresher /interested readers. This document has some advantages over other GSM texts in that it quickly gets

More information

NETWORK SECURITY. Ch. 3: Network Attacks

NETWORK SECURITY. Ch. 3: Network Attacks NETWORK SECURITY Ch. 3: Network Attacks Contents 3.1 Network Vulnerabilities 3.1.1 Media-Based 3.1.2 Network Device 3.2 Categories of Attacks 3.3 Methods of Network Attacks 03 NETWORK ATTACKS 2 3.1 Network

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Wireless Networks Cellular & Mobility Sec 7.4 7.8 Lina Battestilli 7.1 Introduction Wireless Chapter 7 Outline Wireless and Mobile Networks 7.2 Wireless

More information

Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks

Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks Abstract The evolution of phone networks from isolated voice carriers to Internet-enabled multipurpose data and voice networks

More information

ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks

ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks 2 WHAT IS A DDOS-ATTACK AND WHY ARE THEY DANGEROUS? Today's global network is a dynamically developing

More information

Lecture 10. Denial of Service Attacks (cont d) Thursday 24/12/2015

Lecture 10. Denial of Service Attacks (cont d) Thursday 24/12/2015 Lecture 10 Denial of Service Attacks (cont d) Thursday 24/12/2015 Agenda DoS Attacks (cont d) TCP DoS attacks DNS DoS attacks DoS via route hijacking DoS at higher layers Mobile Platform Security Models

More information

GSM and Similar Architectures Lesson 13 GPRS

GSM and Similar Architectures Lesson 13 GPRS GSM and Similar Architectures Lesson 13 GPRS 1 Two switching modes Circuit Switching Packet switching 2 Circuit switching A connection first sets up Then the entire data transmits through the path that

More information

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS 1 Introduction Your data and infrastructure are at the heart of your business. Your employees, business partners, and

More information

SIMULATION FRAMEWORK MODELING

SIMULATION FRAMEWORK MODELING CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion

More information

40 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 1, FEBRUARY 2009

40 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 1, FEBRUARY 2009 40 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 1, FEBRUARY 2009 Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks Patrick Traynor, Student Member, IEEE, William Enck, Student

More information

Addressing Current and Future Wireless Demand

Addressing Current and Future Wireless Demand Addressing Current and Future Wireless Demand Dave Wolter Executive Director Radio Technology AT&T Architecture and Planning Rising Demand and The Need to Innovate in the Network 6,732% growth over 13

More information

CSC 4900 Computer Networks: Mobility

CSC 4900 Computer Networks: Mobility CSC 4900 Computer Networks: Mobility Professor Henry Carter Fall 2017 Last Time What is the hidden terminal problem? How do CDMA networks use spectrum differently than TDMA systems? What is a chipping

More information

Chapter 10: Denial-of-Services

Chapter 10: Denial-of-Services Chapter 10: Denial-of-Services Technology Brief This chapter, "Denial-of-Service" is focused on DoS and Distributed Denial-of-Service (DDOS) attacks. This chapter will cover understanding of different

More information

Resources and Credits. Definition. Symptoms. Denial of Service 3/3/2010 COMP Information on Denial of Service attacks can

Resources and Credits. Definition. Symptoms. Denial of Service 3/3/2010 COMP Information on Denial of Service attacks can Resources and Credits Denial of Service COMP620 Information on Denial of Service attacks can be found on Wikipedia. Graphics and some text in these slides was taken from the Wikipedia site The textbook

More information

Kapsch CarrierCom. Challenging limits

Kapsch CarrierCom. Challenging limits Kapsch CarrierCom Challenging limits The Kapsch Group Challenging Limits globally Four independently operating key entities: Kapsch TrafficCom Kapsch CarrierCom Kapsch BusinessCom Kapsch PublicTransportCom

More information

Last time?! Block 3: Lecture 1! Wireless networks! Ingredients 2: Antennas! Ingredients 1: Mobile Phones, PDAs & Co.! 20/05/14. Part 3: lecture 3!

Last time?! Block 3: Lecture 1! Wireless networks! Ingredients 2: Antennas! Ingredients 1: Mobile Phones, PDAs & Co.! 20/05/14. Part 3: lecture 3! 20/05/14 Last time? WiFi Block 3: Lecture 1 Part 3: lecture 3 Wireless s Speed and ranges and channels Specifications DCF mechanisms WiMax Mobile s Ingredients 1: Mobile Phones, PDAs & Co. Ingredients

More information

Real-World Experience with a Mobile Broadband Network

Real-World Experience with a Mobile Broadband Network Real-World Experience with a Mobile Broadband Network Dr. Jin Yang Verizon Wireless jin.yang@ieee.org September 23, 2004 IEEE Communications Society Oakland-East Bay Chapter, CA Outline Introduction Overview

More information

Mobile Security Fall 2013

Mobile Security Fall 2013 Mobile Security 14-829 Fall 2013 Patrick Tague Class #3 Telecom Security from 1G to 4G Basics of Telecom Security Different players in the mobile ecosystem have different security concerns Security concerns

More information

Cell Catcher CC1900 3G Target Identifier + IMSI Catcher + Phone Tracking

Cell Catcher CC1900 3G Target Identifier + IMSI Catcher + Phone Tracking The Cell Catcher model CC1900 tracks criminal cell phones on location, through UMTS networks, collecting and analyzing surveillance data of IMSI and IMEI numbers. 3G UMTS Gateway Technologies The Cell

More information

Link Layer: Retransmissions

Link Layer: Retransmissions Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability

More information

Exploiting Open Functionality in SMS-Capable Cellular Networks

Exploiting Open Functionality in SMS-Capable Cellular Networks 1 Exploiting Open Functionality in SMS-Capable Cellular Networks William Enck, Patrick Traynor, Patrick McDaniel, Thomas La Porta Technical Report NAS-TR-0007-2005 Systems and Internet Infrastructure Security

More information

DNS Security. Ch 1: The Importance of DNS Security. Updated

DNS Security. Ch 1: The Importance of DNS Security. Updated DNS Security Ch 1: The Importance of DNS Security Updated 8-21-17 DNS is Essential Without DNS, no one can use domain names like ccsf.edu Almost every Internet communication begins with a DNS resolution

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #7 WiFi Security 1 Announcements Please do HW#2 in using the stable OMNET++ 4.6, not the beta version. Porting has proven difficult... Form project

More information

INTRODUCTION ON D-DOS. Presentation by RAJKUMAR PATOLIYA

INTRODUCTION ON D-DOS. Presentation by RAJKUMAR PATOLIYA INTRODUCTION ON D-DOS Presentation by RAJKUMAR PATOLIYA What is d-dos??? The full form of the D-DOS is Distributed Denial of Service. The attacks are carried out by flooding site traffic at appoint in

More information

GSM security country report: Estonia

GSM security country report: Estonia GSM security country report: Estonia GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin September 2014 Abstract. GSM networks differ widely in their protection capabilities against common

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 18: Network Attacks Department of Computer Science and Engineering University at Buffalo 1 Lecture Overview Network attacks denial-of-service (DoS) attacks SYN

More information

ETSI TS V ( )

ETSI TS V ( ) TS 143 246 V14.0.0 (201-04) TECHNICAL SPECIFICATION Digital cellular telecommunications system (Phase 2+) (GSM); Multimedia Broadcast/Multicast Service (MBMS) in the GERAN; Stage 2 (3GPP TS 43.246 version

More information

EFFECTIVE DEFENCE In a connected world. Philippe COTELLE, Airbus Defence and Space 2016, Nov 4th

EFFECTIVE DEFENCE In a connected world. Philippe COTELLE, Airbus Defence and Space 2016, Nov 4th EFFECTIVE DEFENCE In a connected world Philippe COTELLE, Airbus Defence and Space 206, Nov 4th Telecommunications Satellites Cybersecurity Threats Telemetry & Command hijack or jamming Data communication

More information

2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.

2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID. 3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 1 Introduction to IP Mobility Session 3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 3 Agenda IP Mobility Overview Terminology

More information

E3-E4 (CM MODULE) CDMA x & EV-DO. For internal circulation of BSNL only

E3-E4 (CM MODULE) CDMA x & EV-DO. For internal circulation of BSNL only E3-E4 (CM MODULE) CDMA 2000 1x & EV-DO WELCOME This is a presentation for the E3-E4 Technical (CM- Module)fortheTopic:CDMA20001x&EV-DO Eligibility: Those who have got the upgradation frome3toe4. This presentation

More information

GSM security country report: Thailand

GSM security country report: Thailand GSM security country report: Thailand GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin February 2013 Abstract. GSM networks differ widely in their protection capabilities against common

More information

Pertemuan 7 GSM Network. DAHLAN ABDULLAH

Pertemuan 7 GSM Network. DAHLAN ABDULLAH Pertemuan 7 GSM Network DAHLAN ABDULLAH Email : dahlan.unimal@gmail.com Contents GSM-Introduction Architecture Technical Specification & Operation Frame Structure Channels Call Routing Security Characteristics

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Jan 18, 2011 Class #3 Wireless vulnerabilities and threats Announcement: Agenda 6 remaining survey slots, 12 students yet to sign up Vulnerabilities,

More information

Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks

Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks Patrick Traynor, William Enck, Patrick McDaniel, and Thomas La Porta Systems and Internet Infrastructure Security Laboratory Networking

More information

Mobile forensics. SMS (Short Message Service) EMS, MMS, CBS

Mobile forensics. SMS (Short Message Service) EMS, MMS, CBS Mobile forensics SMS (Short Message Service) EMS, MMS, CBS How the Mobiles Work The Route of a Mobile Phone Telephone Call, (or SMS or user data traffic) SIM card Radio access network Core network MS/UE

More information

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II Our Narrow Focus 15-441 15-441 Computer Networking 15-641 Lecture 22 Security: DOS Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Yes: Creating a secure channel for communication (Part I) Protecting

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #10 MAC Layer Misbehavior Announcements I'll be in Pittsburgh Feb 28-29 If you or your project team would like to meet, email me to schedule

More information

COPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA technology and deployment status

COPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA technology and deployment status 1 Introduction Harri Holma and Antti Toskala 1.1 WCDMA technology and deployment status The first Third Generation Partnership Project (3GPP) Wideband Code Division Multiple Access (WCDMA) networks were

More information

Wireless systems overview

Wireless systems overview Wireless systems overview Evolution of systems from 1G to 4G 1G, 4G major features Specifications comparison 5G communication systems Summary Wireless Systems 2016 Evolution of cellular networks WiMAX

More information

Rab Nawaz Jadoon. Cellular Systems - II DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology

Rab Nawaz Jadoon. Cellular Systems - II DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology Cellular Systems - II Rab Nawaz Jadoon DCS Assistant Professor COMSATS IIT, Abbottabad Pakistan COMSATS Institute of Information Technology Mobile Communication UMTS Architecture A UMTS network consist

More information

Hands-On Modern Mobile and Long Term Evolution LTE

Hands-On Modern Mobile and Long Term Evolution LTE Hands-On LTE Course Description With 3G mobile technologies already rolled out by over 200 operators in over 80 countries, standards bodies, manufacturers and operators are looking towards the next generation

More information

Abbreviations. Coding Scheme

Abbreviations. Coding Scheme Managing Service Level Quality: Across Wireless And Fixed Networks. Peter Massam Copyright 2003 John Wiley & Sons, Ltd. ISBN: 0-470-84848-0 Abbreviations 3GPP AF AGCH ARM AS ASK ASN AuC 3rd Generation

More information

Cellular Mobile Systems and Services (TCOM1010) GSM Architecture

Cellular Mobile Systems and Services (TCOM1010) GSM Architecture GSM Architecture 1 GSM NETWORK INFRASTRUCTURE...2 2 NETWORK SWITCHING SUBSYSTEM (NSS)...3 2.1 Home Location Register...4 2.2 Mobile Switching Center and Visitor Location Register...4 2.3 Authentication

More information

Mobile Network Challenges (and why LACSEC should care)

Mobile Network Challenges (and why LACSEC should care) Mobile Network Challenges (and why LACSEC should care) Joe Eggleston, Craig Labovitz @monkey.org Z. Morley Mao zmao@eecs.umich.edu University of Michigan Scott Iekel-Johnson scottij@arbor.net

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11

More information

CTS2134 Introduction to Networking. Module 08: Network Security

CTS2134 Introduction to Networking. Module 08: Network Security CTS2134 Introduction to Networking Module 08: Network Security Denial of Service (DoS) DoS (Denial of Service) attack impacts system availability by flooding the target system with traffic or by exploiting

More information

Wireless Security Background

Wireless Security Background Wireless Security Background Wireless Networks The need for mobile computing Laptops, PDAs, Bluetooth devices Smart phones Enabling technology Wireless communication Two important characteristics Wireless

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #7 More WiFi Security 2015 Patrick Tague 1 Class #7 Continuation of WiFi security 2015 Patrick Tague 2 Device Private WiFi Networks AP Local AAA

More information

Smeal College of Business - Central Firewall Rules and Policies

Smeal College of Business - Central Firewall Rules and Policies Smeal College of Business - Central Firewall Rules and Policies 1.0 Purpose The purpose of this policy is to outline the College s use and management of centralized firewall services. This policy will

More information

Cellular Communication

Cellular Communication Cellular Communication Cellular Communication Cellular communication is designed to provide communications between two moving units, or between one mobile unit and one stationary phone or land unit (PSTN).

More information

ENSC 835: HIGH-PERFORMANCE NETWORKS CMPT 885: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS

ENSC 835: HIGH-PERFORMANCE NETWORKS CMPT 885: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS ENSC 835: HIGH-PERFORMANCE NETWORKS CMPT 885: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS GPRS: Wireless links, multiple base transmitter stations, base station controller and cell update Fall 2003 Final

More information

Exploiting Open Functionality in SMS-Capable Cellular Networks

Exploiting Open Functionality in SMS-Capable Cellular Networks Exploiting Open Functionality in SMS-Capable Cellular Networks Patrick Traynor, William Enck, Patrick McDaniel, and Thomas La Porta Systems and Internet Infrastructure Security Laboratory Department of

More information

Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks

Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks Patrick Traynor College of Computing Georgia Institute of Technology traynor@cc.gatech.edu William Enck, Patrick McDaniel, and

More information

Beyond 3G Wireless. K.Raghunandan (RAGHU) Construction Administrator (Wireless) Communication Engineering New York City Transit (MTA)

Beyond 3G Wireless. K.Raghunandan (RAGHU) Construction Administrator (Wireless) Communication Engineering New York City Transit (MTA) Beyond 3G Wireless K.Raghunandan (RAGHU) Construction Administrator (Wireless) Communication Engineering New York City Transit (MTA) 3G Deployments today Rev C? 3G -1X EVDO CDMA2000 Rev A 3G -1XRTT CDMA2000

More information

Running GPRS/EDGE Data Services with Osmocom

Running GPRS/EDGE Data Services with Osmocom Running GPRS/EDGE Data Services with Osmocom Daniel Willmann April 21, 2017 sysmocom - s.f.m.c. GmbH Contents GPRS structure PCU NITB SGSN GGSN Running GPRS Daniel Willmann Running

More information

End-to-End QoS in Mobile Networks

End-to-End QoS in Mobile Networks End-to-End QoS in Mobile Networks an holistic engineering view IEEE ComSoc / IST Paulino Corrêa António Carlos Fernandes 8 th January 2013 Definition ( ) In the field of computer networking and other packet-switched

More information

Module 6: Wireless Mobile Networks

Module 6: Wireless Mobile Networks Module 6: Wireless Mobile Networks SMD123 Computer Communications Kaustubh Phanse Department of Computer Science and Electrical Engineering Luleå University of Technology Lecture Objectives Wireless links

More information

EXPERIMENT N0: 06 AIM:TO DESIGN UMTS NETWORK USING OPNET MODELER APPARATUS: OPNET MODELER 14.0

EXPERIMENT N0: 06 AIM:TO DESIGN UMTS NETWORK USING OPNET MODELER APPARATUS: OPNET MODELER 14.0 EXPERIMENT N0: 06 AIM:TO DESIGN UMTS NETWORK USING OPNET MODELER APPARATUS: OPNET MODELER 14.0 THEORY:Universal Mobile Telecommunications System (UMTS) is a Third Generation (3G) wireless protocol that

More information

Communication Systems for the Mobile Information Society

Communication Systems for the Mobile Information Society Communication Systems for the Mobile Information Society Martin Sauter Nortel Networks, Germany John Wiley Si Sons, Ltd Contents Preface List of Figures List of Tables List of Abbreviations xi xiii xix

More information

Advanced WiFi Attacks Using Commodity Hardware

Advanced WiFi Attacks Using Commodity Hardware Advanced WiFi Attacks Using Commodity Hardware Mathy Vanhoef and Frank Piessens (KU Leuven) ACSAC 2014 Background WiFi assumes each station acts fairly With special hardware this isn t the case Continuous

More information

GSM Open-source intelligence

GSM Open-source intelligence GSM Open-source intelligence Kenneth van Rijsbergen 1 1 MSc System and Network Engineering Faculty of Science University of Amsterdam 30 June 2016 Kenneth van Rijsbergen University of Amsterdam GSM OSINT

More information

Mobile Security Fall 2013

Mobile Security Fall 2013 Mobile Security 14-829 Fall 2013 Patrick Tague Class #7 Personal Area Networks Early Project Tasks Topic Survey Presentation Background summary of your topic area Not too broad, and not too specific to

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #16 Network Privacy & Anonymity 2014 Patrick Tague 1 Network Privacy Issues Network layer interactions in wireless networks often expose

More information

Evolution from GSM to UMTS (IMT-2000)*

Evolution from GSM to UMTS (IMT-2000)* Evolution from GSM to UMTS (IMT-2000)* MARIO BAUMGARTEN Siemens Ltda ICN Sao Paulo - BRAZIL * This presentation is a draft submitted by the author and the final version will be available at: http://www.itu

More information

THREATS TO PACKET CORE SECURITY OF 4G NETWORK

THREATS TO PACKET CORE SECURITY OF 4G NETWORK 07 CONTENTS Terms and abbreviations... : main components and protocols...4 Attack scenarios...5 What is necessary for a successful attack...5 Threats to EPC security...7. Fraud...7. Connection hijacking...8.

More information

Optimizing the Internet Quality of Service and Economics for the Digital Generation. Dr. Lawrence Roberts President and CEO,

Optimizing the Internet Quality of Service and Economics for the Digital Generation. Dr. Lawrence Roberts President and CEO, Optimizing the Internet Quality of Service and Economics for the Digital Generation Dr. Lawrence Roberts President and CEO, lroberts@anagran.com Original Internet Design File Transfer and Remote Computing

More information