Femtocells : Inexpensive devices to test UMTS security

Size: px
Start display at page:

Download "Femtocells : Inexpensive devices to test UMTS security"

Transcription

1 .... Femtocells : Inexpensive devices to test UMTS security Kévin Redon, Ravishankar Borgaonkar Technische Universität Berlin, SecT kredon/ravii@sec.t-labs.tu-berlin.de Hackito Ergo Sum 2011, 8 April 2011

2 mobile telecommunication singularity femtocells owning it analyzing 3G security big bang cyberspace telephony telegraph invented in the early 1800s idea of a "speaking telegraph" emerges in 1844 patent for "voice through a telegraphic circuit" filed in 1876 application : speaking instantaneously over long distances R. Borgaonkar, K. Redon HNB.secured?(UMTS) 2 / 37

3 singularity big bang cyberspace 0G/1G need for business people to be reachable at any time, anywhere 0G : not so handy. proprietary attempts 1G : similar to 2G, but with analog voice (like in PSTN) R. Borgaonkar, K. Redon HNB.secured?(UMTS) 3 / 37

4 singularity big bang cyberspace 2G : Global System for Mobile Communications (GSM) mobile standard developed in France in 1991 (Groupe Spécial Mobile) very popular, unexpected by the telcos now used world wide R. Borgaonkar, K. Redon HNB.secured?(UMTS) 4 / 37

5 singularity big bang cyberspace 2G : GSM now broken infrastructure elements now available to the public IMSI catching possible (no network authentication) sniffing possible (A5/1 encryption algorithm broken) MitM possible (A5/2 encryption algorithm broken) R. Borgaonkar, K. Redon HNB.secured?(UMTS) 5 / 37

6 singularity big bang cyberspace 2G+ : data over mobile 2G : "Internet" access with WAP 2.5G : GPRS. Packet Switching capability 2.75G : EDGE. Faster, but still too slow R. Borgaonkar, K. Redon HNB.secured?(UMTS) 6 / 37

7 singularity big bang cyberspace 3G : Universal Mobile Telecommunications System (UMTS) appeared in 2002 voice and data communication the phone becomes a network device required and supported by smartphones R. Borgaonkar, K. Redon HNB.secured?(UMTS) 7 / 37

8 singularity big bang cyberspace 3G+ : usable Internet 3.5G : HSDPA, faster download 3.75G : HSUPA, faster upload 3.9G : LTE/WiMAX attempts R. Borgaonkar, K. Redon HNB.secured?(UMTS) 8 / 37

9 UMTS architecture Home Node B (HNB) HNB Subsystem (HNS) UMTS architecture (complex) R. Borgaonkar, K. Redon HNB.secured?(UMTS) 9 / 37

10 UMTS architecture Home Node B (HNB) HNB Subsystem (HNS) UMTS architecture (simplified) R. Borgaonkar, K. Redon HNB.secured?(UMTS) 10 / 37

11 mobile telecommunication UMTS architecture femtocells owning it Home Node B (HNB) analyzing 3G security HNB Subsystem (HNS) cells R. Borgaonkar, K. Redon HNB.secured?(UMTS) 11 / 37

12 UMTS architecture Home Node B (HNB) HNB Subsystem (HNS) technology What is a femtocell : it's an access point (sometimes called FAP) it connects the mobile phone to the 3G/UMTS network compatible with every UMTS capable mobile phone small cell, with a coverage of less than 20m low power device easy to install, you only have provide power and Internet access technical name : Home Node B (HNB) R. Borgaonkar, K. Redon HNB.secured?(UMTS) 12 / 37

13 UMTS architecture Home Node B (HNB) HNB Subsystem (HNS) user advantages advantages provided to the users : can be installed at home to provide coverage (if not available) provides high bandwidth (not shared with the public) can provide location based services (kids arrived at home) but nothing Wifi can not provide for free, except you don't have to configure the phone. R. Borgaonkar, K. Redon HNB.secured?(UMTS) 13 / 37

14 UMTS architecture Home Node B (HNB) HNB Subsystem (HNS) operator advantages advantages for the operator : extended coverage, near to the users traffic offloads from their public infrastructure cheap hardware, that the user even has to buy no installation cost no maintenance cost new revenue possibilities IP connectivity conclusion : femtocells are a great opportunity for the operators. R. Borgaonkar, K. Redon HNB.secured?(UMTS) 14 / 37

15 UMTS architecture Home Node B (HNB) HNB Subsystem (HNS) HNB in UMTS network R. Borgaonkar, K. Redon HNB.secured?(UMTS) 15 / 37

16 UMTS architecture Home Node B (HNB) HNB Subsystem (HNS) HNB Subsystem R. Borgaonkar, K. Redon HNB.secured?(UMTS) 16 / 37

17 ordering location verification blind dating recovery to failure customizing requirements How to get a femtocell : choose a country from the 12 which deploy them get an address and IP from this country, because usage in only allowed within the country select an operator from the 18 which offer them get a mobile phone subscription from this operator, required to get the femtocell service gently ask for a femtocell get it for free, one time payment, or monthly fee enjoy R. Borgaonkar, K. Redon HNB.secured?(UMTS) 17 / 37

18 ordering location verification blind dating recovery to failure customizing purpose operators have to verify where the femtocell is, for several reasons: prevent you to avoid roaming costs in foreign countries UMTS uses the 2.1 GHz freq. band, a licensed spectrum band. The operators own the radio licenses for the femtocell only for their country location of the users is required for lawful interception R. Borgaonkar, K. Redon HNB.secured?(UMTS) 18 / 37

19 ordering location verification blind dating recovery to failure customizing techniques How to find were the femtocell is located : IP : geoip, even knowing the ISP is enough GNSS : Global Navigation Satellite System (often GPS) macrocell : cells periodically send country, network, and location information (MCC, MNC, LAC) R. Borgaonkar, K. Redon HNB.secured?(UMTS) 19 / 37

20 ordering location verification blind dating recovery to failure customizing attacks R. Borgaonkar, K. Redon HNB.secured?(UMTS) 20 / 37

21 mobile telecommunication ordering location verification femtocells owning it blind dating analyzing 3G security recovery to failure customizing final solution R. Borgaonkar, K. Redon HNB.secured?(UMTS) 21 / 37

22 ordering location verification blind dating recovery to failure customizing under the hood R. Borgaonkar, K. Redon HNB.secured?(UMTS) 22 / 37

23 ordering location verification blind dating recovery to failure customizing first approach sniffing : only DHCP and NTP, then everything goes over IPsec probing ports (nmap) : only port 80 is open (linux has been detected, but the source code is not available) web interface available : protected access, no documentation, even the customer service was unaware serial port : found on PCB, but login prompt is disabled First impression : the device is secure. But the first impression is not the last impression. R. Borgaonkar, K. Redon HNB.secured?(UMTS) 23 / 37

24 ordering location verification blind dating recovery to failure customizing recovery mode and purpose remember : keep femtocells cheap no maintenance cost no local support if something does not work right, do a factory reset. for that, the recovery procedure has been created. this is a critical point R. Borgaonkar, K. Redon HNB.secured?(UMTS) 24 / 37

25 ordering location verification blind dating recovery to failure customizing process overview R. Borgaonkar, K. Redon HNB.secured?(UMTS) 25 / 37

26 ordering location verification blind dating recovery to failure customizing flaws and exploits R. Borgaonkar, K. Redon HNB.secured?(UMTS) 26 / 37

27 ordering location verification blind dating recovery to failure customizing reconfigure the parameter list contains some interesting values : the login prompt or the serial port can be enabled (the root password is the same then in the recovery image, stored in md5) it includes the public key used to verify the signatures it's possible to clone femtocells (except the SIM) [General] pcbid=p04s... imei= mac=00:1b:67:... hwflag=2 serial=p04s... [BootSigning] pubkey=ee:17:c5:f2:... R. Borgaonkar, K. Redon HNB.secured?(UMTS) 27 / 37

28 ordering location verification blind dating recovery to failure customizing reflash the firmware list contains all needed informations : the URLs, encryption keys and signatures are in there you can use the previously obtained images, and modify them you can provide the modified images now it's possible to install anything R. Borgaonkar, K. Redon HNB.secured?(UMTS) 28 / 37

29 authentication & encryption en garde the end testing 3G security features femtocells can be used to check various classmarks supported by mobiles R. Borgaonkar, K. Redon HNB.secured?(UMTS) 29 / 37

30 authentication & encryption en garde the end authentication tuples information in the authentication tuples (RAND, XRES, IK, CK, AUTN) : collect RAND and AUTN check randomness of RAND U. Meyer and S. Wetzel, A man-in-the-middle attack on UMTS, in Proceeding of The ACM Workshop on Wireless Security (WiSe 2004), October 2004 R. Borgaonkar, K. Redon HNB.secured?(UMTS) 30 / 37

31 authentication & encryption en garde the end encryption calls are encrypted up to the antenna then communication is clear text like everything else is telecommunication network R. Borgaonkar, K. Redon HNB.secured?(UMTS) 31 / 37

32 authentication & encryption en garde the end phone capabilities encryption over-the-air can even be turned off helps to identify which phone indicating it (just a few) R. Borgaonkar, K. Redon HNB.secured?(UMTS) 32 / 37

33 authentication & encryption en garde the end the beginning of a story R. Borgaonkar, K. Redon HNB.secured?(UMTS) 33 / 37

34 authentication & encryption en garde the end episode 1 femtocells is an effective technology in terms of offloading the traffic and of new business cases but... the operators need to start thinking about security follow the specifications closely, secure the device and networks some serious threats (ongoing work) : test core network build a MitM test 3G phones R. Borgaonkar, K. Redon HNB.secured?(UMTS) 34 / 37

35 authentication & encryption en garde the end episode 2 4G (LTE Advanced) is coming all IP infrastructure very closely connected elements the network needs to be compatible with old technology HeNB (evolved) are also on the way R. Borgaonkar, K. Redon HNB.secured?(UMTS) 35 / 37

36 authentication & encryption en garde the end thanks Thanks to : Nico Golde, TU Berlin Collin Mulliner, TU Berlin Prof. Jean-Pierre Seifert, TU Berlin Benjamin Michéle, TU Berlin R. Borgaonkar, K. Redon HNB.secured?(UMTS) 36 / 37

37 authentication & encryption en garde the end questions Merci Questions? R. Borgaonkar, K. Redon HNB.secured?(UMTS) 37 / 37

Femtocell: Femtostep to the Holy Grail

Femtocell: Femtostep to the Holy Grail .... Femtocell: Femtostep to the Holy Grail Ravishankar Borgaonkar, Kévin Redon Technische Universität Berlin, SecT ravii/kredon@sec.t-labs.tu-berlin.de TROOPERS 2011, 30 March 2011 3G/UMTS femtocells

More information

Experimental Analysis of the Femtocell Location Verification Techniques

Experimental Analysis of the Femtocell Location Verification Techniques Experimental Analysis of the Femtocell Location Verification Techniques Ravishankar Borgaonkar, Kevin Redon and Jean-Pierre Seifert Security in Telecommunication Technical University Berlin and Deutsche

More information

Femtocells: a Poisonous Needle in the Operator's Hay Stack

Femtocells: a Poisonous Needle in the Operator's Hay Stack .. Femtocells: a Poisonous Needle in the Operator's Hay Stack Ravishankar Borgaonkar, Nico Golde, Kévin Redon Technische Universität Berlin, Security in Telecommunications femtocell@sec.t-labs.tu-berlin.de

More information

Femtocells: a Poisonous Needle in the Operator's Hay Stack

Femtocells: a Poisonous Needle in the Operator's Hay Stack .. Femtocells: a Poisonous Needle in the Operator's Hay Stack Ravishankar Borgaonkar, Nico Golde, Kévin Redon Technische Universität Berlin, Security in Telecommunications femtocell@sec.t-labs.tu-berlin.de

More information

Femtocells: a Poisonous Needle in the Operator's Hay Stack

Femtocells: a Poisonous Needle in the Operator's Hay Stack Femtocells: a Poisonous Needle in the Operator's Hay Stack Ravishankar Borgaonkar, Nico Golde, Kévin Redon Technische Universität Berlin, Security in Telecommunications femtocell@sect-labstu-berlinde Black

More information

Understanding IMSI Privacy!

Understanding IMSI Privacy! Understanding IMSI Privacy Ravishankar Borgaonkar TU Berlin Swapnil Udar Aalto University Email: darshak@sec.t-labs.tu-berlin.de Blackhat USA 2014, Las Vegas, 7 th August 2014 Overview Unresolved Privacy

More information

New Privacy Issues in Mobile Telephony: Fix and Verification

New Privacy Issues in Mobile Telephony: Fix and Verification New Privacy Issues in Mobile Telephony: Fix and Verification Myrto Arapinis, Loretta Mancini, Eike Ritter, Mark Ryan, Kevin Redon, Nico Golde, Ravi Borgaonkar CCS 2012, Raleigh, NC October 2012 In my bag

More information

AIDA ANALYSE IDENTIFY DETECT ALLOCATE GSM/UMTS

AIDA ANALYSE IDENTIFY DETECT ALLOCATE GSM/UMTS AIDA ANALYSE IDENTIFY DETECT ALLOCATE INTERCEPTION DEVICE IN GSM/UMTS NETWORK Pavel Bezpalec, Michal Kašík Department of telecommunication engineering Czech Technical University in Prague Access IT s.r.o.

More information

Big Picture. ~10 years between generations

Big Picture. ~10 years between generations Big Picture ~10 years between generations 7 Who is Who? Mobile Operators ITU Members ITU GSM, W-CDMA, UMTS IS-95), IS-41, IS- 2000, IS-835 Third Generation Patnership Project (3GPP) CWTS (China) Third

More information

4G Mobile Communications

4G Mobile Communications 4G Mobile Communications Welcome to 4G The term 4G is used broadly to include several types of broadband wireless access communication systems, not only cellular telephone systems. One of the terms to

More information

Questioning the Feasibility of UMTS GSM Interworking Attacks

Questioning the Feasibility of UMTS GSM Interworking Attacks Questioning the Feasibility of UMTS GSM Interworking Attacks Christoforos Ntantogian 1, Christos Xenakis 2 1 Department of Informatics and Telecommunications, University of Athens, Greece 2 Department

More information

Network Security: Cellular Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2013

Network Security: Cellular Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2013 Network Security: Cellular Security Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2013 Outline Cellular networks GSM security architecture and protocols Counters UMTS AKA and session

More information

Performance Challenge of 3G over Satellite Methods for Increasing Revenue & Quality of Experience. February 2018

Performance Challenge of 3G over Satellite Methods for Increasing Revenue & Quality of Experience. February 2018 Performance Challenge of 3G over Satellite Methods for Increasing Revenue & Quality of Experience February 2018 Mobile telephony has been in existence for over 40 years. The first generation (1G) developed

More information

INTRODUCTION TO WIRELESS COMMUNICATION

INTRODUCTION TO WIRELESS COMMUNICATION OVERVIEW INTRODUCTION TO WIRELESS COMMUNICATION EVOLUTION FROM 1G TO 4G SYSTEM 5-G WIRELESS SYSTEM FUNCTIONAL ARCHITECTURE FOR 5G MOBILE NETWORKS THE 4A PARADIGM FEATURES OF 5G TECHNOLOGY 5G APPLICATION

More information

Mobile Security Fall 2013

Mobile Security Fall 2013 Mobile Security 14-829 Fall 2013 Patrick Tague Class #3 Telecom Security from 1G to 4G Basics of Telecom Security Different players in the mobile ecosystem have different security concerns Security concerns

More information

Security Analysis of a Femtocell Device

Security Analysis of a Femtocell Device Security Analysis of a Femtocell Device Ravishankar Borgaonkar, Kevin Redon and Jean-Pierre Seifert Technical University of Berlin & Deutsche Telekom Laboratories Ernst-Reuter-Platz 7, 10587-DE Berlin,

More information

ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum

ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum Roaming Service in Sudan improvement & Challenges Zain, MTN & Sudani Content - Telecom

More information

WHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers)

WHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers) WHITE PAPER Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers) Table of Contents About This Document... 1 Chapter 1 Wireless Data Technologies... 2 Wireless Data Technology Overview...

More information

Understanding Carrier Wireless Systems

Understanding Carrier Wireless Systems Understanding Course Description This course provides a detailed scope of modern mobile and cellular network technologies used for second generation, 2G+, 3G and 4G networks. It provides an understanding

More information

I. Introduction The RailBox/24 features a Cellular Radio Network interface and a Position Acquisition System.

I. Introduction The RailBox/24 features a Cellular Radio Network interface and a Position Acquisition System. Addendum to DTFRUS054 and DTUS070 for RailBox/24 Contents I. Introduction... 1 A. Cellular Interface... 1 B. Position Acquisition System... 1 II. Addendum to the RailBox quick start guide DTFRUS054...

More information

TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003

TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003 Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET Bornholm, October 2003

More information

USER MANUAL: 4G. The PiIoT is a WAN communications board which provides a 2G / 3G / 4G

USER MANUAL: 4G. The PiIoT is a WAN communications board which provides a 2G / 3G / 4G USER MANUAL: 4G The PiIoT is a WAN communications board which provides a 2G / 3G / 4G wireless interface for the Raspberry Pi 2 and 3. Conforming to the HAT specification, the PiIoT also provides location

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS How do I connect to a WWAN network? 1. Insert a SIM card into the SIM card slot (read manual for the location) while the laptop is switched off. 2. Boot the OS What is a SIM

More information

Cellular Mobile Systems and Services (TCOM1010) GSM Architecture

Cellular Mobile Systems and Services (TCOM1010) GSM Architecture GSM Architecture 1 GSM NETWORK INFRASTRUCTURE...2 2 NETWORK SWITCHING SUBSYSTEM (NSS)...3 2.1 Home Location Register...4 2.2 Mobile Switching Center and Visitor Location Register...4 2.3 Authentication

More information

KX/3G ADSL2+ ROUTER MAIN FEATURES

KX/3G ADSL2+ ROUTER MAIN FEATURES The KORTEX 3G/ADSL2+, a dual-wan 3G / ADSL2+ firewall router integrated with the 802.11g wireless access point and 4-port switch, is a cutting-edge networking product for SOHO and office users. Uniquely,

More information

LTE : The Future of Mobile Broadband Technology

LTE : The Future of Mobile Broadband Technology LTE : The Future of Mobile Broadband Technology Erick Setiawan tukangbajaksawah@gmail.com 1 Become a necessity today, where the wireless broadband technology needed to meet increasing expectations in terms

More information

Security of Cellular Networks: Man-in-the Middle Attacks

Security of Cellular Networks: Man-in-the Middle Attacks Security of Cellular Networks: Man-in-the Middle Attacks Mario Čagalj University of Split 2013/2014. Security in the GSM system by Jeremy Quirke, 2004 Introduction Nowadays, mobile phones are used by 80-90%

More information

Telecoms: Generational Evolution of Attack Surfaces. HITB Beijing 2018

Telecoms: Generational Evolution of Attack Surfaces. HITB Beijing 2018 Telecoms: Generational Evolution of Attack Surfaces HITB Beijing 2018 Blast from the Past Agenda Brief history of telecoms Generation Zero Generation Fixed Generation Analog Mobile 1G Mobile 2G Mobile

More information

USER MANUAL: Raspberry Pi 2

USER MANUAL: Raspberry Pi 2 USER MANUAL: Raspberry Pi 2 The PiIoT is a WAN communications board which provides an HSPA wireless interface for the Raspberry Pi 2 and 3. Conforming to the HAT specification, the PiIoT also provides

More information

Broadband Wireless Access (BWA) and Satellite Services

Broadband Wireless Access (BWA) and Satellite Services Broadband Wireless Access (BWA) and Satellite Services The Future of C Band in Asia Pacific PITA Annual general Meeting Policy and Regulation Workshop 11 th April 2014 Port Vila, Vanuatu Our Mission The

More information

LTE Security How Good Is It?

LTE Security How Good Is It? SESSION ID: TECH-RO3 LTE Security How Good Is It? Jeffrey Cichonski IT Specialist (Security) National Institute of Standards & Technology @jchonski Joshua Franklin IT Specialist (Security) National Institute

More information

Configuring GPRS Tunneling Protocol Support

Configuring GPRS Tunneling Protocol Support The GPRS Tunneling Protocol Support feature provides firewall support for General Packet Radio Switching (GPRS) Tunneling Protocol (GTP). GPRS is a data network architecture, which integrates with existing

More information

Wireless Wireline Convergence. Tod Sizer, Director Broadband and Wireless Research Center Bell Laboratories

Wireless Wireline Convergence. Tod Sizer, Director Broadband and Wireless Research Center Bell Laboratories Wireless Wireline Convergence Tod Sizer, Director Broadband and Wireless Research Center Bell Laboratories Wireless Wireline Convergence The past decade has seen unprecedented growth in both Wireless and

More information

Roaming with UltraWAPs

Roaming with UltraWAPs Roaming with UltraWs Rob Clark www.freenet-antennas.com July-2006 Summary It is often desired to design a wireless network that supports seamless roaming of mobile computers between Access Point () base

More information

Defeating IMSI Catchers. Fabian van den Broek et al. CCS 2015

Defeating IMSI Catchers. Fabian van den Broek et al. CCS 2015 Defeating IMSI Catchers Fabian van den Broek et al. CCS 2015 Ren-Jay Wang CS598 - COMPUTER SECURITY IN THE PHYSICAL ckground 3GPP 3GPP 3 rd Generation Partnership Project Encompasses: GSM and related 2G

More information

Marcus Wong

Marcus Wong Security Implications and Considerations for Femtocells Marcus Wong mwong@huawei.com www.huawei.com HUAWEI TECHNOLOGIES Co., Ltd. Agenda Introduction Architecture Latest attack Overview Threats and attacks

More information

4G Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India

4G Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India Abstract-Wireless services have the highest demand in internet

More information

Wireless Communication

Wireless Communication Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications

More information

Cellular Communication

Cellular Communication Cellular Communication Cellular Communication Cellular communication is designed to provide communications between two moving units, or between one mobile unit and one stationary phone or land unit (PSTN).

More information

1100 Dexter Avenue N Seattle, WA NetMotion Mobility Architecture A Look Under the Hood

1100 Dexter Avenue N Seattle, WA NetMotion Mobility Architecture A Look Under the Hood TM 1100 Dexter Avenue N Seattle, WA 98109 206.691.5555 www.netmotionwireless.com NetMotion Mobility Architecture A Look Under the Hood NetMotion Mobility Architecture A Look Under the Hood Wireless networking

More information

Interconnection and Roaming. Interconnection Business interfaces in Internet

Interconnection and Roaming. Interconnection Business interfaces in Internet Interconnection and Roaming S-38.041 Networking Business Slide 1 Interconnection Business interfaces in Internet Access ISP Transit ISP 9 4 Peering point/bilateral agreements (Network Access Point, NAP)

More information

Contents VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014

Contents VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014 VULNERABILITIES OF MOBILE INTERNET (GPRS) Dmitry Kurbatov Sergey Puzankov Pavel Novikov 2014 Contents 1. Introduction 2. Summary 3. Mobile network scheme 4. GTP protocol 5. Searching for mobile operator

More information

11:1 Anonymous Internet Access Method for Wireless Systems

11:1 Anonymous Internet Access Method for Wireless Systems 11:1 Anonymous Internet Access Method for Wireless Systems Petri Jokela Juha-Petri Kärnä NomadicLab, Ericsson Research FIN-02420 Jorvas Finland {petri.jokela, juha-petri.karna}@ericsson.com 1 Introduction

More information

Convergence of IP and Mobile Communications. Albert Coronel RedLink Communications Co., Ltd. MMNOG, November 21, 2015

Convergence of IP and Mobile Communications. Albert Coronel RedLink Communications Co., Ltd. MMNOG, November 21, 2015 Convergence of IP and Mobile Communications Albert Coronel RedLink Communications Co., Ltd. MMNOG, November 21, 2015 Mobile terminals Netgear Skype phone first released 2007 Makes and receives Skype calls

More information

Ayrstone AyrMesh Router Setup

Ayrstone AyrMesh Router Setup Ayrstone AyrMesh Router Setup This guide should help you set up AyrMesh Router SP. The setup is relatively simple but should you need more detailed directions, such as slide shows, video, or troubleshooting

More information

User Guide NTC-30WV 3G Outdoor WiFi Router with Voice

User Guide NTC-30WV 3G Outdoor WiFi Router with Voice User Guide NTC-30WV 3G Outdoor WiFi Router with Voice Copyright Copyright 2014 NetComm Wireless Limited. All rights reserved. The information contained herein is proprietary to NetComm Wireless. No part

More information

2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.

2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID. 3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 1 Introduction to IP Mobility Session 3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 3 Agenda IP Mobility Overview Terminology

More information

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Lecture 20: Future trends in mobile computing Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Future topics Improving capacity Dynamic spectrum access Massive MIMO Heterogeneous networks Pervasive

More information

Quick Start Guide. The Automotive Internet Experience

Quick Start Guide. The Automotive Internet Experience Quick Start Guide The Automotive Internet Experience Table of Contents System Requirements Package Contents Overview Wi2U router Vehicle Installation Start-up Display Settings Regulatory Information Technical

More information

M2M in the Real World: Security Best Practices and Lessons Learned

M2M in the Real World: Security Best Practices and Lessons Learned M2M in the Real World: Security Best Practices and Lessons Learned Tyson Macaulay VP Global Telecommunications Strategy & Corporate Development Oct 10, 2013 Agenda and Topics M2M compliance and regulatory

More information

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 1 SYLLABUS GSM General architecture and interfaces of cellular system and the PSTN and Internet networks: BTS, MSC, Internetworking,

More information

Dell NetReady Mobile Broadband Service User's Guide

Dell NetReady Mobile Broadband Service User's Guide Dell NetReady Mobile Broadband Service User's Guide Introduction Quick Start Service Coverage Frequently Asked Questions Glossary Information in this document is subject to change without notice. Introduction:

More information

Ch 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated

Ch 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated Ch 1: The Mobile Risk Ecosystem CNIT 128: Hacking Mobile Devices Updated 1-12-16 The Mobile Ecosystem Popularity of Mobile Devices Insecurity of Mobile Devices The Mobile Risk Model Mobile Network Architecture

More information

AC1200M/MS. User Manual

AC1200M/MS. User Manual AC1200M/MS User Manual Table of Contents User Manual... 1 1 Preface... 1 2 LED Indicators and Connectors... 1 2.1 LED Indicators... 1 2.2 Hardware Installation... 2 3 Voice Prompt (AC1200MS)... 2 4 User

More information

GLOSSARY OF CELLUAR TERMS

GLOSSARY OF CELLUAR TERMS GLOSSARY OF CELLUAR TERMS Air Interface: It is the operating system of a wireless network.. Airtime: The amount of time a person spends talking on their cellular device. AMPS: Advanced mobile phone service

More information

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What

More information

Running Heading: Wireless two aspects. Yu Jiao. George Mason University

Running Heading: Wireless two aspects. Yu Jiao. George Mason University Running Heading: Wireless two aspects Yu Jiao George Mason University "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://academicintegrity.gmu.edu/honorcode/.

More information

Business Drivers for Selecting LTE Technology. HSPA+ & LTE Executive Briefing, Jan 27, 2009 Hank Kafka, Vice President, Network Architecture, AT&T

Business Drivers for Selecting LTE Technology. HSPA+ & LTE Executive Briefing, Jan 27, 2009 Hank Kafka, Vice President, Network Architecture, AT&T Business Drivers for Selecting LTE Technology HSPA+ & LTE Executive Briefing, Jan 27, 2009 Hank Kafka, Vice President, Network Architecture, AT&T Why LTE? HSPA, HSPA+ provides great data speeds with impressive

More information

Ch.16 - Wireless WAN System Architectures

Ch.16 - Wireless WAN System Architectures Ch.16 - Wireless WAN System Architectures 1 Wireless WAN 2 GSM via PSTN 3 GSM via ISDN 4 GPRS 5 Mobitex 6 CDPD 7 PPDC 8 UMTS 9 Future Systems 10 Systems Summary 1 11 Systems Summary 2 1 This section will

More information

Concepts, Technology, and Applications of Mobile Commerce

Concepts, Technology, and Applications of Mobile Commerce Concepts, Technology, and Applications of Mobile Commerce Robert Nickerson Professor and Chair Department of Information Systems Director, Center for Electronic Business College of Business San Francisco

More information

GSM Open-source intelligence

GSM Open-source intelligence GSM Open-source intelligence Kenneth van Rijsbergen 1 1 MSc System and Network Engineering Faculty of Science University of Amsterdam 30 June 2016 Kenneth van Rijsbergen University of Amsterdam GSM OSINT

More information

IMSI/IMEI Catching & Localization System. (IMSI/IMEI Catcher + Direction Finder)

IMSI/IMEI Catching & Localization System. (IMSI/IMEI Catcher + Direction Finder) IMSI/IMEI Catching & Localization System (IMSI/IMEI Catcher + Direction Finder) About Us Our intelligent, integrated and highly mobile IMSI/IMEI Catching & Localization system is used for identifying the

More information

Fixed Mobile Convergence

Fixed Mobile Convergence Cisco Expo 2006 Fixed Mobile Convergence Business Track Bo Finnemann Cisco DK 2006 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda, Fixed Mobile Convergence Market Perspective What

More information

Femtocells Opportunities and Challenges

Femtocells Opportunities and Challenges Femtocells Opportunities and Challenges Chand Gundecha CDG Technology Forum Wednesday, May 2, 2007 Motorola Inc Global Marketing & Strategy, Motorola Networks & Enterprise Business Mobile Telephone (312)

More information

Chapter 3 GSM and Similar Architectures

Chapter 3 GSM and Similar Architectures CSF645 Mobile Computing 行動計算 Chapter 3 GSM and Similar Architectures 吳俊興 國立高雄大學資訊工程學系 Chapter 3 GSM and Similar Architectures 3.1 GSM Services and System Architecture 3.2 Radio Interfaces 3.3 Protocols

More information

Remote Control not only, but also for Energy Distribution Systems. Dr. Dietmar Gollnick CEO e*message Group CMA Spring Meeting 2016

Remote Control not only, but also for Energy Distribution Systems. Dr. Dietmar Gollnick CEO e*message Group CMA Spring Meeting 2016 Remote Control not only, but also for Energy Distribution Systems Dr. Dietmar Gollnick CEO e*message Group CMA Spring Meeting 2016 Remember what is the truth. 1) It is not wise to remember what we know.

More information

User Guide NTC-40WV Industrial Indoor 3G Router with Voice

User Guide NTC-40WV Industrial Indoor 3G Router with Voice User Guide NTC-40WV Industrial Indoor 3G Router with Voice Copyright Copyright 2014 NetComm Wireless Limited. All rights reserved. The information contained herein is proprietary to NetComm Wireless. No

More information

Hands-On Modern Mobile and Long Term Evolution LTE

Hands-On Modern Mobile and Long Term Evolution LTE Hands-On LTE Course Description With 3G mobile technologies already rolled out by over 200 operators in over 80 countries, standards bodies, manufacturers and operators are looking towards the next generation

More information

Leveraging Wi-Fi Calling To Reduced Operator Costs and Improve the Customer Experience

Leveraging Wi-Fi Calling To Reduced Operator Costs and Improve the Customer Experience Leveraging Wi-Fi Calling To Reduced Operator Costs and Improve the Customer Experience Steve Northridge Email: Steve.Northridge@Oracle.com Twitter: @stevenorthridge 3 Photo Source: Boston Public Library

More information

Attacking Mobile-Terminated Services in GSM

Attacking Mobile-Terminated Services in GSM Berlin Institute of Technology FG Security in Telecommunications Weiss Attacking Mobile-Terminated Services in GSM TelcoSecDay 2013 Nico Golde, Kevin Redon, Heidelberg, March 12th 2013 nico@sec.t-labs.tu-berlin.de

More information

Threat patterns in GSM system. Basic threat patterns:

Threat patterns in GSM system. Basic threat patterns: Threat patterns in GSM system Usage of mobile devices in business simpli es, speeds up and optimizes business processes. However, it is necessary to understand that the more complicated the device is the

More information

Wireless Network Introduction

Wireless Network Introduction Wireless Network Introduction Module W.bas.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Wireless network introduction W.bas.1-2

More information

WAH7130. User s Guide. Quick Start Guide. LTE Portable Router. Default Login Details. Version 1.00 Edition 1, 03/2013

WAH7130. User s Guide. Quick Start Guide. LTE Portable Router. Default Login Details. Version 1.00 Edition 1, 03/2013 WAH7130 LTE Portable Router Version 1.00 Edition 1, 03/2013 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.1 Password 1234 www.zyxel.com Copyright 2013 ZyXEL Communications

More information

Home-Mobile. The Cast Devices. The Cast Network Related (2) The Cast Network Related. Voice over IP (VoIP) Dr. Hayden Kwok-Hay So

Home-Mobile. The Cast Devices. The Cast Network Related (2) The Cast Network Related. Voice over IP (VoIP) Dr. Hayden Kwok-Hay So The Cast Devices Home-Mobile Desktop Computer Mostly data Wired network Standard Telephone Mostly voice Wired phone line CCST9015 6th Oct, 2010 Dr. Hayden Kwok-Hay So Notebook Computer Mostly data Wireless

More information

Virtual Access GW6600 Series Router Quick Start Guide

Virtual Access GW6600 Series Router Quick Start Guide Virtual Access GW6600 Series Router Quick Start Guide 1: Preface 1 Preface... 3 1.1 About this document... 3 1.2 Safety instructions... 3 1.3 Electrical safety... 3 1.4 Wireless safety... 4 1.5 Product

More information

Overview. M-commerce vs. E-commerce

Overview. M-commerce vs. E-commerce M-COMMERCE Overview What is M-Commerce? M-commerce vs. E-commerce Classes of M-Commerce Applications Benefits of M-commerce Advantages of M-Commerce Disadvantages of M-Commerce Mobile Computing: Content,

More information

Mobile School Training International Mobile Communication

Mobile School Training International Mobile Communication Mobile School Training International Mobile Communication INTRODUCTION For over 10 years Rabion Consultancy has been providing Mobile School training. In the past the training was offered as in-house training

More information

Basics of GSM in depth

Basics of GSM in depth This document will be helpful for the telecom engineers who deal with GSM as well as for the fresher /interested readers. This document has some advantages over other GSM texts in that it quickly gets

More information

Chapter 5. Voice Network Concepts. Voice Network Concepts. Voice Communication Concepts and Technology

Chapter 5. Voice Network Concepts. Voice Network Concepts. Voice Communication Concepts and Technology Chapter 5 Voice Communication Concepts and Technology Voice Network Concepts Telephone switchboard - Circa 1898 Voice Network Concepts Telephone calls are connected from source via circuit switching. Circuit

More information

WIRELESS TRANSMISSION

WIRELESS TRANSMISSION WIRELESS TRANSMISSION Name: R.A.K.M.Ranaweera. Registration No: 07/AS/CI/O22 Department: Computing and Information Technology. Contact: 0718478566 Date: 25/08/2001 Email: 4kasun@gmail.com Wireless Transmission

More information

COMP327 Mobile Computing Session: Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2

COMP327 Mobile Computing Session: Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2 COMP327 Mobile Computing Session: 2017-2018 Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2 35 Recap from Part 1 Wireless Connection Technologies Wireless Personal Area Networks

More information

INTRODUCTION TO LTE. ECE MOBILE COMMUNICATION Monday, 25 June 2018

INTRODUCTION TO LTE. ECE MOBILE COMMUNICATION Monday, 25 June 2018 INTRODUCTION TO LTE ECE 2526 - MOBILE COMMUNICATION Monday, 25 June 2018 1 WHAT IS LTE? 1. LTE stands for Long Term Evolution and it was started as a project in 2004 by the Third Generation Partnership

More information

2013 National HDT Rally

2013 National HDT Rally 2013 National HDT Rally Caveats Dynamic changing industry What used to be doesn t mean the future How much do you use the Internet? Just for e-mail Or. How much do you use the Internet? E-mail Face Book

More information

Exam Advanced Network Security

Exam Advanced Network Security Exam Advanced Network Security Jaap-Henk Hoepman, Joeri de Ruiter July 2, 2018 NOTE: READ THIS CAREFULLY: This exam consists of two alternatives. The first alternative is the regular exam for students

More information

3GPP TS V ( )

3GPP TS V ( ) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Evolved Packet System (EPS); Sv interface (MME to MSC, and SGSN to MSC) for SRVCC ()

More information

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z This glossary provides definitions of terms and acronyms that are used in Premier as well as informative industry terms. Select the first letter of the word you want to find. A B C D E F G H I J K L M

More information

Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Presented by Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering

More information

Special Provision No. 683S27 June 2017

Special Provision No. 683S27 June 2017 GATEWAY ROUTERS - Item No. Special Provision No. 683S27 June 2017 1. SCOPE This Special Provision covers the requirements for the installation of Gateway Routers with integrated digital subscriber line

More information

Frequently Asked Questions Mobile Access Controller

Frequently Asked Questions Mobile Access Controller Frequently Asked Questions NEC Australia nec.com.au /Frequently Asked Questions General Overview What is MAC? MAC is an integrated communications platform which provides fleet operators with advanced voice

More information

Wireless (Select Models Only) User Guide

Wireless (Select Models Only) User Guide Wireless (Select Models Only) User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its

More information

Mobility: vocabulary

Mobility: vocabulary What is mobility? spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user,

More information

Nexus8610 Traffic Simulation System. Intersystem Handover Simulation. White Paper

Nexus8610 Traffic Simulation System. Intersystem Handover Simulation. White Paper Traffic Simulation System Intersystem Handover Simulation White Paper Notice Every effort has been made to ensure that the information in this document was accurate at the time of printing. However, the

More information

M!DGE2 Release Notes Firmware version xxx

M!DGE2 Release Notes Firmware version xxx M!DGE2 Release Notes Firmware version 4.2.40.xxx Release 4.2.40.101 2018-12-10 Note: The firmware 4.2.40.101 is the first official firmware available on our website and for mass production. If you have

More information

Business Central Wireless Manager Application

Business Central Wireless Manager Application Business Central Wireless Manager Application Quick Start Guide June 2015 201-19279-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. For product updates

More information

4G/LTE VoIP Wireless Router Z-LTE9322

4G/LTE VoIP Wireless Router Z-LTE9322 4G/LTE VoIP Wireless Router Z-LTE9322 Key Features - Dual-WAN ports - 4G LTE and Gigabit Ethernet WAN (EWAN) for broadband connectivity - 4G LTE embedded with a built-in SIM card slot - Gigabit WAN and

More information

FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH

FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH, Abstract In the future of Mobile networks it is important to implement a Femtocell at homes and to improve the domestic network. Even

More information

GSM Hacking. Wireless Mobile Phone Communication 30 th January 2014 UNRESTRICTED EXTERNAL

GSM Hacking. Wireless Mobile Phone Communication 30 th January 2014 UNRESTRICTED EXTERNAL GSM Hacking Wireless Mobile Phone Communication 30 th January 2014 Labs.mwrinfosecurity.com MWR Labs 1 Labs.mwrinfosecurity.com MWR Labs Introduction to GSM June 2008 2.9 BILLION subscribers use GSM. Replaced

More information

The unbundling of international roaming

The unbundling of international roaming The unbundling of international roaming There have been times that automatic international roaming did not exist. Already in the 1980 s some early type of a roaming service was available. The caller needed

More information

Rab Nawaz Jadoon. Cellular Systems - II DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology

Rab Nawaz Jadoon. Cellular Systems - II DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology Cellular Systems - II Rab Nawaz Jadoon DCS Assistant Professor COMSATS IIT, Abbottabad Pakistan COMSATS Institute of Information Technology Mobile Communication UMTS Architecture A UMTS network consist

More information

Wireless Broadband: Does one size fit all? Asimakis Kokkos China Industry Environment

Wireless Broadband: Does one size fit all? Asimakis Kokkos China Industry Environment Wireless Broadband: Does one size fit all? Asimakis Kokkos China Industry Environment 1 Nokia Siemens Networks 3 rd IEEE Broadband Wireless Workshop 19-May-2008 A tale of two industries Mobile Broadband

More information