Femtocells : Inexpensive devices to test UMTS security
|
|
- Vernon Bennett
- 5 years ago
- Views:
Transcription
1 .... Femtocells : Inexpensive devices to test UMTS security Kévin Redon, Ravishankar Borgaonkar Technische Universität Berlin, SecT kredon/ravii@sec.t-labs.tu-berlin.de Hackito Ergo Sum 2011, 8 April 2011
2 mobile telecommunication singularity femtocells owning it analyzing 3G security big bang cyberspace telephony telegraph invented in the early 1800s idea of a "speaking telegraph" emerges in 1844 patent for "voice through a telegraphic circuit" filed in 1876 application : speaking instantaneously over long distances R. Borgaonkar, K. Redon HNB.secured?(UMTS) 2 / 37
3 singularity big bang cyberspace 0G/1G need for business people to be reachable at any time, anywhere 0G : not so handy. proprietary attempts 1G : similar to 2G, but with analog voice (like in PSTN) R. Borgaonkar, K. Redon HNB.secured?(UMTS) 3 / 37
4 singularity big bang cyberspace 2G : Global System for Mobile Communications (GSM) mobile standard developed in France in 1991 (Groupe Spécial Mobile) very popular, unexpected by the telcos now used world wide R. Borgaonkar, K. Redon HNB.secured?(UMTS) 4 / 37
5 singularity big bang cyberspace 2G : GSM now broken infrastructure elements now available to the public IMSI catching possible (no network authentication) sniffing possible (A5/1 encryption algorithm broken) MitM possible (A5/2 encryption algorithm broken) R. Borgaonkar, K. Redon HNB.secured?(UMTS) 5 / 37
6 singularity big bang cyberspace 2G+ : data over mobile 2G : "Internet" access with WAP 2.5G : GPRS. Packet Switching capability 2.75G : EDGE. Faster, but still too slow R. Borgaonkar, K. Redon HNB.secured?(UMTS) 6 / 37
7 singularity big bang cyberspace 3G : Universal Mobile Telecommunications System (UMTS) appeared in 2002 voice and data communication the phone becomes a network device required and supported by smartphones R. Borgaonkar, K. Redon HNB.secured?(UMTS) 7 / 37
8 singularity big bang cyberspace 3G+ : usable Internet 3.5G : HSDPA, faster download 3.75G : HSUPA, faster upload 3.9G : LTE/WiMAX attempts R. Borgaonkar, K. Redon HNB.secured?(UMTS) 8 / 37
9 UMTS architecture Home Node B (HNB) HNB Subsystem (HNS) UMTS architecture (complex) R. Borgaonkar, K. Redon HNB.secured?(UMTS) 9 / 37
10 UMTS architecture Home Node B (HNB) HNB Subsystem (HNS) UMTS architecture (simplified) R. Borgaonkar, K. Redon HNB.secured?(UMTS) 10 / 37
11 mobile telecommunication UMTS architecture femtocells owning it Home Node B (HNB) analyzing 3G security HNB Subsystem (HNS) cells R. Borgaonkar, K. Redon HNB.secured?(UMTS) 11 / 37
12 UMTS architecture Home Node B (HNB) HNB Subsystem (HNS) technology What is a femtocell : it's an access point (sometimes called FAP) it connects the mobile phone to the 3G/UMTS network compatible with every UMTS capable mobile phone small cell, with a coverage of less than 20m low power device easy to install, you only have provide power and Internet access technical name : Home Node B (HNB) R. Borgaonkar, K. Redon HNB.secured?(UMTS) 12 / 37
13 UMTS architecture Home Node B (HNB) HNB Subsystem (HNS) user advantages advantages provided to the users : can be installed at home to provide coverage (if not available) provides high bandwidth (not shared with the public) can provide location based services (kids arrived at home) but nothing Wifi can not provide for free, except you don't have to configure the phone. R. Borgaonkar, K. Redon HNB.secured?(UMTS) 13 / 37
14 UMTS architecture Home Node B (HNB) HNB Subsystem (HNS) operator advantages advantages for the operator : extended coverage, near to the users traffic offloads from their public infrastructure cheap hardware, that the user even has to buy no installation cost no maintenance cost new revenue possibilities IP connectivity conclusion : femtocells are a great opportunity for the operators. R. Borgaonkar, K. Redon HNB.secured?(UMTS) 14 / 37
15 UMTS architecture Home Node B (HNB) HNB Subsystem (HNS) HNB in UMTS network R. Borgaonkar, K. Redon HNB.secured?(UMTS) 15 / 37
16 UMTS architecture Home Node B (HNB) HNB Subsystem (HNS) HNB Subsystem R. Borgaonkar, K. Redon HNB.secured?(UMTS) 16 / 37
17 ordering location verification blind dating recovery to failure customizing requirements How to get a femtocell : choose a country from the 12 which deploy them get an address and IP from this country, because usage in only allowed within the country select an operator from the 18 which offer them get a mobile phone subscription from this operator, required to get the femtocell service gently ask for a femtocell get it for free, one time payment, or monthly fee enjoy R. Borgaonkar, K. Redon HNB.secured?(UMTS) 17 / 37
18 ordering location verification blind dating recovery to failure customizing purpose operators have to verify where the femtocell is, for several reasons: prevent you to avoid roaming costs in foreign countries UMTS uses the 2.1 GHz freq. band, a licensed spectrum band. The operators own the radio licenses for the femtocell only for their country location of the users is required for lawful interception R. Borgaonkar, K. Redon HNB.secured?(UMTS) 18 / 37
19 ordering location verification blind dating recovery to failure customizing techniques How to find were the femtocell is located : IP : geoip, even knowing the ISP is enough GNSS : Global Navigation Satellite System (often GPS) macrocell : cells periodically send country, network, and location information (MCC, MNC, LAC) R. Borgaonkar, K. Redon HNB.secured?(UMTS) 19 / 37
20 ordering location verification blind dating recovery to failure customizing attacks R. Borgaonkar, K. Redon HNB.secured?(UMTS) 20 / 37
21 mobile telecommunication ordering location verification femtocells owning it blind dating analyzing 3G security recovery to failure customizing final solution R. Borgaonkar, K. Redon HNB.secured?(UMTS) 21 / 37
22 ordering location verification blind dating recovery to failure customizing under the hood R. Borgaonkar, K. Redon HNB.secured?(UMTS) 22 / 37
23 ordering location verification blind dating recovery to failure customizing first approach sniffing : only DHCP and NTP, then everything goes over IPsec probing ports (nmap) : only port 80 is open (linux has been detected, but the source code is not available) web interface available : protected access, no documentation, even the customer service was unaware serial port : found on PCB, but login prompt is disabled First impression : the device is secure. But the first impression is not the last impression. R. Borgaonkar, K. Redon HNB.secured?(UMTS) 23 / 37
24 ordering location verification blind dating recovery to failure customizing recovery mode and purpose remember : keep femtocells cheap no maintenance cost no local support if something does not work right, do a factory reset. for that, the recovery procedure has been created. this is a critical point R. Borgaonkar, K. Redon HNB.secured?(UMTS) 24 / 37
25 ordering location verification blind dating recovery to failure customizing process overview R. Borgaonkar, K. Redon HNB.secured?(UMTS) 25 / 37
26 ordering location verification blind dating recovery to failure customizing flaws and exploits R. Borgaonkar, K. Redon HNB.secured?(UMTS) 26 / 37
27 ordering location verification blind dating recovery to failure customizing reconfigure the parameter list contains some interesting values : the login prompt or the serial port can be enabled (the root password is the same then in the recovery image, stored in md5) it includes the public key used to verify the signatures it's possible to clone femtocells (except the SIM) [General] pcbid=p04s... imei= mac=00:1b:67:... hwflag=2 serial=p04s... [BootSigning] pubkey=ee:17:c5:f2:... R. Borgaonkar, K. Redon HNB.secured?(UMTS) 27 / 37
28 ordering location verification blind dating recovery to failure customizing reflash the firmware list contains all needed informations : the URLs, encryption keys and signatures are in there you can use the previously obtained images, and modify them you can provide the modified images now it's possible to install anything R. Borgaonkar, K. Redon HNB.secured?(UMTS) 28 / 37
29 authentication & encryption en garde the end testing 3G security features femtocells can be used to check various classmarks supported by mobiles R. Borgaonkar, K. Redon HNB.secured?(UMTS) 29 / 37
30 authentication & encryption en garde the end authentication tuples information in the authentication tuples (RAND, XRES, IK, CK, AUTN) : collect RAND and AUTN check randomness of RAND U. Meyer and S. Wetzel, A man-in-the-middle attack on UMTS, in Proceeding of The ACM Workshop on Wireless Security (WiSe 2004), October 2004 R. Borgaonkar, K. Redon HNB.secured?(UMTS) 30 / 37
31 authentication & encryption en garde the end encryption calls are encrypted up to the antenna then communication is clear text like everything else is telecommunication network R. Borgaonkar, K. Redon HNB.secured?(UMTS) 31 / 37
32 authentication & encryption en garde the end phone capabilities encryption over-the-air can even be turned off helps to identify which phone indicating it (just a few) R. Borgaonkar, K. Redon HNB.secured?(UMTS) 32 / 37
33 authentication & encryption en garde the end the beginning of a story R. Borgaonkar, K. Redon HNB.secured?(UMTS) 33 / 37
34 authentication & encryption en garde the end episode 1 femtocells is an effective technology in terms of offloading the traffic and of new business cases but... the operators need to start thinking about security follow the specifications closely, secure the device and networks some serious threats (ongoing work) : test core network build a MitM test 3G phones R. Borgaonkar, K. Redon HNB.secured?(UMTS) 34 / 37
35 authentication & encryption en garde the end episode 2 4G (LTE Advanced) is coming all IP infrastructure very closely connected elements the network needs to be compatible with old technology HeNB (evolved) are also on the way R. Borgaonkar, K. Redon HNB.secured?(UMTS) 35 / 37
36 authentication & encryption en garde the end thanks Thanks to : Nico Golde, TU Berlin Collin Mulliner, TU Berlin Prof. Jean-Pierre Seifert, TU Berlin Benjamin Michéle, TU Berlin R. Borgaonkar, K. Redon HNB.secured?(UMTS) 36 / 37
37 authentication & encryption en garde the end questions Merci Questions? R. Borgaonkar, K. Redon HNB.secured?(UMTS) 37 / 37
Femtocell: Femtostep to the Holy Grail
.... Femtocell: Femtostep to the Holy Grail Ravishankar Borgaonkar, Kévin Redon Technische Universität Berlin, SecT ravii/kredon@sec.t-labs.tu-berlin.de TROOPERS 2011, 30 March 2011 3G/UMTS femtocells
More informationExperimental Analysis of the Femtocell Location Verification Techniques
Experimental Analysis of the Femtocell Location Verification Techniques Ravishankar Borgaonkar, Kevin Redon and Jean-Pierre Seifert Security in Telecommunication Technical University Berlin and Deutsche
More informationFemtocells: a Poisonous Needle in the Operator's Hay Stack
.. Femtocells: a Poisonous Needle in the Operator's Hay Stack Ravishankar Borgaonkar, Nico Golde, Kévin Redon Technische Universität Berlin, Security in Telecommunications femtocell@sec.t-labs.tu-berlin.de
More informationFemtocells: a Poisonous Needle in the Operator's Hay Stack
.. Femtocells: a Poisonous Needle in the Operator's Hay Stack Ravishankar Borgaonkar, Nico Golde, Kévin Redon Technische Universität Berlin, Security in Telecommunications femtocell@sec.t-labs.tu-berlin.de
More informationFemtocells: a Poisonous Needle in the Operator's Hay Stack
Femtocells: a Poisonous Needle in the Operator's Hay Stack Ravishankar Borgaonkar, Nico Golde, Kévin Redon Technische Universität Berlin, Security in Telecommunications femtocell@sect-labstu-berlinde Black
More informationUnderstanding IMSI Privacy!
Understanding IMSI Privacy Ravishankar Borgaonkar TU Berlin Swapnil Udar Aalto University Email: darshak@sec.t-labs.tu-berlin.de Blackhat USA 2014, Las Vegas, 7 th August 2014 Overview Unresolved Privacy
More informationNew Privacy Issues in Mobile Telephony: Fix and Verification
New Privacy Issues in Mobile Telephony: Fix and Verification Myrto Arapinis, Loretta Mancini, Eike Ritter, Mark Ryan, Kevin Redon, Nico Golde, Ravi Borgaonkar CCS 2012, Raleigh, NC October 2012 In my bag
More informationAIDA ANALYSE IDENTIFY DETECT ALLOCATE GSM/UMTS
AIDA ANALYSE IDENTIFY DETECT ALLOCATE INTERCEPTION DEVICE IN GSM/UMTS NETWORK Pavel Bezpalec, Michal Kašík Department of telecommunication engineering Czech Technical University in Prague Access IT s.r.o.
More informationBig Picture. ~10 years between generations
Big Picture ~10 years between generations 7 Who is Who? Mobile Operators ITU Members ITU GSM, W-CDMA, UMTS IS-95), IS-41, IS- 2000, IS-835 Third Generation Patnership Project (3GPP) CWTS (China) Third
More information4G Mobile Communications
4G Mobile Communications Welcome to 4G The term 4G is used broadly to include several types of broadband wireless access communication systems, not only cellular telephone systems. One of the terms to
More informationQuestioning the Feasibility of UMTS GSM Interworking Attacks
Questioning the Feasibility of UMTS GSM Interworking Attacks Christoforos Ntantogian 1, Christos Xenakis 2 1 Department of Informatics and Telecommunications, University of Athens, Greece 2 Department
More informationNetwork Security: Cellular Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2013
Network Security: Cellular Security Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2013 Outline Cellular networks GSM security architecture and protocols Counters UMTS AKA and session
More informationPerformance Challenge of 3G over Satellite Methods for Increasing Revenue & Quality of Experience. February 2018
Performance Challenge of 3G over Satellite Methods for Increasing Revenue & Quality of Experience February 2018 Mobile telephony has been in existence for over 40 years. The first generation (1G) developed
More informationINTRODUCTION TO WIRELESS COMMUNICATION
OVERVIEW INTRODUCTION TO WIRELESS COMMUNICATION EVOLUTION FROM 1G TO 4G SYSTEM 5-G WIRELESS SYSTEM FUNCTIONAL ARCHITECTURE FOR 5G MOBILE NETWORKS THE 4A PARADIGM FEATURES OF 5G TECHNOLOGY 5G APPLICATION
More informationMobile Security Fall 2013
Mobile Security 14-829 Fall 2013 Patrick Tague Class #3 Telecom Security from 1G to 4G Basics of Telecom Security Different players in the mobile ecosystem have different security concerns Security concerns
More informationSecurity Analysis of a Femtocell Device
Security Analysis of a Femtocell Device Ravishankar Borgaonkar, Kevin Redon and Jean-Pierre Seifert Technical University of Berlin & Deutsche Telekom Laboratories Ernst-Reuter-Platz 7, 10587-DE Berlin,
More informationITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum
ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum Roaming Service in Sudan improvement & Challenges Zain, MTN & Sudani Content - Telecom
More informationWHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers)
WHITE PAPER Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers) Table of Contents About This Document... 1 Chapter 1 Wireless Data Technologies... 2 Wireless Data Technology Overview...
More informationUnderstanding Carrier Wireless Systems
Understanding Course Description This course provides a detailed scope of modern mobile and cellular network technologies used for second generation, 2G+, 3G and 4G networks. It provides an understanding
More informationI. Introduction The RailBox/24 features a Cellular Radio Network interface and a Position Acquisition System.
Addendum to DTFRUS054 and DTUS070 for RailBox/24 Contents I. Introduction... 1 A. Cellular Interface... 1 B. Position Acquisition System... 1 II. Addendum to the RailBox quick start guide DTFRUS054...
More informationTECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET Bornholm, October 2003
More informationUSER MANUAL: 4G. The PiIoT is a WAN communications board which provides a 2G / 3G / 4G
USER MANUAL: 4G The PiIoT is a WAN communications board which provides a 2G / 3G / 4G wireless interface for the Raspberry Pi 2 and 3. Conforming to the HAT specification, the PiIoT also provides location
More informationFREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS How do I connect to a WWAN network? 1. Insert a SIM card into the SIM card slot (read manual for the location) while the laptop is switched off. 2. Boot the OS What is a SIM
More informationCellular Mobile Systems and Services (TCOM1010) GSM Architecture
GSM Architecture 1 GSM NETWORK INFRASTRUCTURE...2 2 NETWORK SWITCHING SUBSYSTEM (NSS)...3 2.1 Home Location Register...4 2.2 Mobile Switching Center and Visitor Location Register...4 2.3 Authentication
More informationKX/3G ADSL2+ ROUTER MAIN FEATURES
The KORTEX 3G/ADSL2+, a dual-wan 3G / ADSL2+ firewall router integrated with the 802.11g wireless access point and 4-port switch, is a cutting-edge networking product for SOHO and office users. Uniquely,
More informationLTE : The Future of Mobile Broadband Technology
LTE : The Future of Mobile Broadband Technology Erick Setiawan tukangbajaksawah@gmail.com 1 Become a necessity today, where the wireless broadband technology needed to meet increasing expectations in terms
More informationSecurity of Cellular Networks: Man-in-the Middle Attacks
Security of Cellular Networks: Man-in-the Middle Attacks Mario Čagalj University of Split 2013/2014. Security in the GSM system by Jeremy Quirke, 2004 Introduction Nowadays, mobile phones are used by 80-90%
More informationTelecoms: Generational Evolution of Attack Surfaces. HITB Beijing 2018
Telecoms: Generational Evolution of Attack Surfaces HITB Beijing 2018 Blast from the Past Agenda Brief history of telecoms Generation Zero Generation Fixed Generation Analog Mobile 1G Mobile 2G Mobile
More informationUSER MANUAL: Raspberry Pi 2
USER MANUAL: Raspberry Pi 2 The PiIoT is a WAN communications board which provides an HSPA wireless interface for the Raspberry Pi 2 and 3. Conforming to the HAT specification, the PiIoT also provides
More informationBroadband Wireless Access (BWA) and Satellite Services
Broadband Wireless Access (BWA) and Satellite Services The Future of C Band in Asia Pacific PITA Annual general Meeting Policy and Regulation Workshop 11 th April 2014 Port Vila, Vanuatu Our Mission The
More informationLTE Security How Good Is It?
SESSION ID: TECH-RO3 LTE Security How Good Is It? Jeffrey Cichonski IT Specialist (Security) National Institute of Standards & Technology @jchonski Joshua Franklin IT Specialist (Security) National Institute
More informationConfiguring GPRS Tunneling Protocol Support
The GPRS Tunneling Protocol Support feature provides firewall support for General Packet Radio Switching (GPRS) Tunneling Protocol (GTP). GPRS is a data network architecture, which integrates with existing
More informationWireless Wireline Convergence. Tod Sizer, Director Broadband and Wireless Research Center Bell Laboratories
Wireless Wireline Convergence Tod Sizer, Director Broadband and Wireless Research Center Bell Laboratories Wireless Wireline Convergence The past decade has seen unprecedented growth in both Wireless and
More informationRoaming with UltraWAPs
Roaming with UltraWs Rob Clark www.freenet-antennas.com July-2006 Summary It is often desired to design a wireless network that supports seamless roaming of mobile computers between Access Point () base
More informationDefeating IMSI Catchers. Fabian van den Broek et al. CCS 2015
Defeating IMSI Catchers Fabian van den Broek et al. CCS 2015 Ren-Jay Wang CS598 - COMPUTER SECURITY IN THE PHYSICAL ckground 3GPP 3GPP 3 rd Generation Partnership Project Encompasses: GSM and related 2G
More informationMarcus Wong
Security Implications and Considerations for Femtocells Marcus Wong mwong@huawei.com www.huawei.com HUAWEI TECHNOLOGIES Co., Ltd. Agenda Introduction Architecture Latest attack Overview Threats and attacks
More information4G Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India
Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India Abstract-Wireless services have the highest demand in internet
More informationWireless Communication
Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications
More informationCellular Communication
Cellular Communication Cellular Communication Cellular communication is designed to provide communications between two moving units, or between one mobile unit and one stationary phone or land unit (PSTN).
More information1100 Dexter Avenue N Seattle, WA NetMotion Mobility Architecture A Look Under the Hood
TM 1100 Dexter Avenue N Seattle, WA 98109 206.691.5555 www.netmotionwireless.com NetMotion Mobility Architecture A Look Under the Hood NetMotion Mobility Architecture A Look Under the Hood Wireless networking
More informationInterconnection and Roaming. Interconnection Business interfaces in Internet
Interconnection and Roaming S-38.041 Networking Business Slide 1 Interconnection Business interfaces in Internet Access ISP Transit ISP 9 4 Peering point/bilateral agreements (Network Access Point, NAP)
More informationContents VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014
VULNERABILITIES OF MOBILE INTERNET (GPRS) Dmitry Kurbatov Sergey Puzankov Pavel Novikov 2014 Contents 1. Introduction 2. Summary 3. Mobile network scheme 4. GTP protocol 5. Searching for mobile operator
More information11:1 Anonymous Internet Access Method for Wireless Systems
11:1 Anonymous Internet Access Method for Wireless Systems Petri Jokela Juha-Petri Kärnä NomadicLab, Ericsson Research FIN-02420 Jorvas Finland {petri.jokela, juha-petri.karna}@ericsson.com 1 Introduction
More informationConvergence of IP and Mobile Communications. Albert Coronel RedLink Communications Co., Ltd. MMNOG, November 21, 2015
Convergence of IP and Mobile Communications Albert Coronel RedLink Communications Co., Ltd. MMNOG, November 21, 2015 Mobile terminals Netgear Skype phone first released 2007 Makes and receives Skype calls
More informationAyrstone AyrMesh Router Setup
Ayrstone AyrMesh Router Setup This guide should help you set up AyrMesh Router SP. The setup is relatively simple but should you need more detailed directions, such as slide shows, video, or troubleshooting
More informationUser Guide NTC-30WV 3G Outdoor WiFi Router with Voice
User Guide NTC-30WV 3G Outdoor WiFi Router with Voice Copyright Copyright 2014 NetComm Wireless Limited. All rights reserved. The information contained herein is proprietary to NetComm Wireless. No part
More information2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.
3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 1 Introduction to IP Mobility Session 3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 3 Agenda IP Mobility Overview Terminology
More informationLecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday
Lecture 20: Future trends in mobile computing Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Future topics Improving capacity Dynamic spectrum access Massive MIMO Heterogeneous networks Pervasive
More informationQuick Start Guide. The Automotive Internet Experience
Quick Start Guide The Automotive Internet Experience Table of Contents System Requirements Package Contents Overview Wi2U router Vehicle Installation Start-up Display Settings Regulatory Information Technical
More informationM2M in the Real World: Security Best Practices and Lessons Learned
M2M in the Real World: Security Best Practices and Lessons Learned Tyson Macaulay VP Global Telecommunications Strategy & Corporate Development Oct 10, 2013 Agenda and Topics M2M compliance and regulatory
More informationGLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017
GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 1 SYLLABUS GSM General architecture and interfaces of cellular system and the PSTN and Internet networks: BTS, MSC, Internetworking,
More informationDell NetReady Mobile Broadband Service User's Guide
Dell NetReady Mobile Broadband Service User's Guide Introduction Quick Start Service Coverage Frequently Asked Questions Glossary Information in this document is subject to change without notice. Introduction:
More informationCh 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated
Ch 1: The Mobile Risk Ecosystem CNIT 128: Hacking Mobile Devices Updated 1-12-16 The Mobile Ecosystem Popularity of Mobile Devices Insecurity of Mobile Devices The Mobile Risk Model Mobile Network Architecture
More informationAC1200M/MS. User Manual
AC1200M/MS User Manual Table of Contents User Manual... 1 1 Preface... 1 2 LED Indicators and Connectors... 1 2.1 LED Indicators... 1 2.2 Hardware Installation... 2 3 Voice Prompt (AC1200MS)... 2 4 User
More informationGLOSSARY OF CELLUAR TERMS
GLOSSARY OF CELLUAR TERMS Air Interface: It is the operating system of a wireless network.. Airtime: The amount of time a person spends talking on their cellular device. AMPS: Advanced mobile phone service
More informationArea Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low
Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What
More informationRunning Heading: Wireless two aspects. Yu Jiao. George Mason University
Running Heading: Wireless two aspects Yu Jiao George Mason University "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://academicintegrity.gmu.edu/honorcode/.
More informationBusiness Drivers for Selecting LTE Technology. HSPA+ & LTE Executive Briefing, Jan 27, 2009 Hank Kafka, Vice President, Network Architecture, AT&T
Business Drivers for Selecting LTE Technology HSPA+ & LTE Executive Briefing, Jan 27, 2009 Hank Kafka, Vice President, Network Architecture, AT&T Why LTE? HSPA, HSPA+ provides great data speeds with impressive
More informationCh.16 - Wireless WAN System Architectures
Ch.16 - Wireless WAN System Architectures 1 Wireless WAN 2 GSM via PSTN 3 GSM via ISDN 4 GPRS 5 Mobitex 6 CDPD 7 PPDC 8 UMTS 9 Future Systems 10 Systems Summary 1 11 Systems Summary 2 1 This section will
More informationConcepts, Technology, and Applications of Mobile Commerce
Concepts, Technology, and Applications of Mobile Commerce Robert Nickerson Professor and Chair Department of Information Systems Director, Center for Electronic Business College of Business San Francisco
More informationGSM Open-source intelligence
GSM Open-source intelligence Kenneth van Rijsbergen 1 1 MSc System and Network Engineering Faculty of Science University of Amsterdam 30 June 2016 Kenneth van Rijsbergen University of Amsterdam GSM OSINT
More informationIMSI/IMEI Catching & Localization System. (IMSI/IMEI Catcher + Direction Finder)
IMSI/IMEI Catching & Localization System (IMSI/IMEI Catcher + Direction Finder) About Us Our intelligent, integrated and highly mobile IMSI/IMEI Catching & Localization system is used for identifying the
More informationFixed Mobile Convergence
Cisco Expo 2006 Fixed Mobile Convergence Business Track Bo Finnemann Cisco DK 2006 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda, Fixed Mobile Convergence Market Perspective What
More informationFemtocells Opportunities and Challenges
Femtocells Opportunities and Challenges Chand Gundecha CDG Technology Forum Wednesday, May 2, 2007 Motorola Inc Global Marketing & Strategy, Motorola Networks & Enterprise Business Mobile Telephone (312)
More informationChapter 3 GSM and Similar Architectures
CSF645 Mobile Computing 行動計算 Chapter 3 GSM and Similar Architectures 吳俊興 國立高雄大學資訊工程學系 Chapter 3 GSM and Similar Architectures 3.1 GSM Services and System Architecture 3.2 Radio Interfaces 3.3 Protocols
More informationRemote Control not only, but also for Energy Distribution Systems. Dr. Dietmar Gollnick CEO e*message Group CMA Spring Meeting 2016
Remote Control not only, but also for Energy Distribution Systems Dr. Dietmar Gollnick CEO e*message Group CMA Spring Meeting 2016 Remember what is the truth. 1) It is not wise to remember what we know.
More informationUser Guide NTC-40WV Industrial Indoor 3G Router with Voice
User Guide NTC-40WV Industrial Indoor 3G Router with Voice Copyright Copyright 2014 NetComm Wireless Limited. All rights reserved. The information contained herein is proprietary to NetComm Wireless. No
More informationHands-On Modern Mobile and Long Term Evolution LTE
Hands-On LTE Course Description With 3G mobile technologies already rolled out by over 200 operators in over 80 countries, standards bodies, manufacturers and operators are looking towards the next generation
More informationLeveraging Wi-Fi Calling To Reduced Operator Costs and Improve the Customer Experience
Leveraging Wi-Fi Calling To Reduced Operator Costs and Improve the Customer Experience Steve Northridge Email: Steve.Northridge@Oracle.com Twitter: @stevenorthridge 3 Photo Source: Boston Public Library
More informationAttacking Mobile-Terminated Services in GSM
Berlin Institute of Technology FG Security in Telecommunications Weiss Attacking Mobile-Terminated Services in GSM TelcoSecDay 2013 Nico Golde, Kevin Redon, Heidelberg, March 12th 2013 nico@sec.t-labs.tu-berlin.de
More informationThreat patterns in GSM system. Basic threat patterns:
Threat patterns in GSM system Usage of mobile devices in business simpli es, speeds up and optimizes business processes. However, it is necessary to understand that the more complicated the device is the
More informationWireless Network Introduction
Wireless Network Introduction Module W.bas.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Wireless network introduction W.bas.1-2
More informationWAH7130. User s Guide. Quick Start Guide. LTE Portable Router. Default Login Details. Version 1.00 Edition 1, 03/2013
WAH7130 LTE Portable Router Version 1.00 Edition 1, 03/2013 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.1 Password 1234 www.zyxel.com Copyright 2013 ZyXEL Communications
More informationHome-Mobile. The Cast Devices. The Cast Network Related (2) The Cast Network Related. Voice over IP (VoIP) Dr. Hayden Kwok-Hay So
The Cast Devices Home-Mobile Desktop Computer Mostly data Wired network Standard Telephone Mostly voice Wired phone line CCST9015 6th Oct, 2010 Dr. Hayden Kwok-Hay So Notebook Computer Mostly data Wireless
More informationVirtual Access GW6600 Series Router Quick Start Guide
Virtual Access GW6600 Series Router Quick Start Guide 1: Preface 1 Preface... 3 1.1 About this document... 3 1.2 Safety instructions... 3 1.3 Electrical safety... 3 1.4 Wireless safety... 4 1.5 Product
More informationOverview. M-commerce vs. E-commerce
M-COMMERCE Overview What is M-Commerce? M-commerce vs. E-commerce Classes of M-Commerce Applications Benefits of M-commerce Advantages of M-Commerce Disadvantages of M-Commerce Mobile Computing: Content,
More informationMobile School Training International Mobile Communication
Mobile School Training International Mobile Communication INTRODUCTION For over 10 years Rabion Consultancy has been providing Mobile School training. In the past the training was offered as in-house training
More informationBasics of GSM in depth
This document will be helpful for the telecom engineers who deal with GSM as well as for the fresher /interested readers. This document has some advantages over other GSM texts in that it quickly gets
More informationChapter 5. Voice Network Concepts. Voice Network Concepts. Voice Communication Concepts and Technology
Chapter 5 Voice Communication Concepts and Technology Voice Network Concepts Telephone switchboard - Circa 1898 Voice Network Concepts Telephone calls are connected from source via circuit switching. Circuit
More informationWIRELESS TRANSMISSION
WIRELESS TRANSMISSION Name: R.A.K.M.Ranaweera. Registration No: 07/AS/CI/O22 Department: Computing and Information Technology. Contact: 0718478566 Date: 25/08/2001 Email: 4kasun@gmail.com Wireless Transmission
More informationCOMP327 Mobile Computing Session: Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2
COMP327 Mobile Computing Session: 2017-2018 Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2 35 Recap from Part 1 Wireless Connection Technologies Wireless Personal Area Networks
More informationINTRODUCTION TO LTE. ECE MOBILE COMMUNICATION Monday, 25 June 2018
INTRODUCTION TO LTE ECE 2526 - MOBILE COMMUNICATION Monday, 25 June 2018 1 WHAT IS LTE? 1. LTE stands for Long Term Evolution and it was started as a project in 2004 by the Third Generation Partnership
More information2013 National HDT Rally
2013 National HDT Rally Caveats Dynamic changing industry What used to be doesn t mean the future How much do you use the Internet? Just for e-mail Or. How much do you use the Internet? E-mail Face Book
More informationExam Advanced Network Security
Exam Advanced Network Security Jaap-Henk Hoepman, Joeri de Ruiter July 2, 2018 NOTE: READ THIS CAREFULLY: This exam consists of two alternatives. The first alternative is the regular exam for students
More information3GPP TS V ( )
Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Evolved Packet System (EPS); Sv interface (MME to MSC, and SGSN to MSC) for SRVCC ()
More informationA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
This glossary provides definitions of terms and acronyms that are used in Premier as well as informative industry terms. Select the first letter of the word you want to find. A B C D E F G H I J K L M
More informationTalk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks
Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Presented by Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering
More informationSpecial Provision No. 683S27 June 2017
GATEWAY ROUTERS - Item No. Special Provision No. 683S27 June 2017 1. SCOPE This Special Provision covers the requirements for the installation of Gateway Routers with integrated digital subscriber line
More informationFrequently Asked Questions Mobile Access Controller
Frequently Asked Questions NEC Australia nec.com.au /Frequently Asked Questions General Overview What is MAC? MAC is an integrated communications platform which provides fleet operators with advanced voice
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its
More informationMobility: vocabulary
What is mobility? spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user,
More informationNexus8610 Traffic Simulation System. Intersystem Handover Simulation. White Paper
Traffic Simulation System Intersystem Handover Simulation White Paper Notice Every effort has been made to ensure that the information in this document was accurate at the time of printing. However, the
More informationM!DGE2 Release Notes Firmware version xxx
M!DGE2 Release Notes Firmware version 4.2.40.xxx Release 4.2.40.101 2018-12-10 Note: The firmware 4.2.40.101 is the first official firmware available on our website and for mass production. If you have
More informationBusiness Central Wireless Manager Application
Business Central Wireless Manager Application Quick Start Guide June 2015 201-19279-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. For product updates
More information4G/LTE VoIP Wireless Router Z-LTE9322
4G/LTE VoIP Wireless Router Z-LTE9322 Key Features - Dual-WAN ports - 4G LTE and Gigabit Ethernet WAN (EWAN) for broadband connectivity - 4G LTE embedded with a built-in SIM card slot - Gigabit WAN and
More informationFEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH
FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH, Abstract In the future of Mobile networks it is important to implement a Femtocell at homes and to improve the domestic network. Even
More informationGSM Hacking. Wireless Mobile Phone Communication 30 th January 2014 UNRESTRICTED EXTERNAL
GSM Hacking Wireless Mobile Phone Communication 30 th January 2014 Labs.mwrinfosecurity.com MWR Labs 1 Labs.mwrinfosecurity.com MWR Labs Introduction to GSM June 2008 2.9 BILLION subscribers use GSM. Replaced
More informationThe unbundling of international roaming
The unbundling of international roaming There have been times that automatic international roaming did not exist. Already in the 1980 s some early type of a roaming service was available. The caller needed
More informationRab Nawaz Jadoon. Cellular Systems - II DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology
Cellular Systems - II Rab Nawaz Jadoon DCS Assistant Professor COMSATS IIT, Abbottabad Pakistan COMSATS Institute of Information Technology Mobile Communication UMTS Architecture A UMTS network consist
More informationWireless Broadband: Does one size fit all? Asimakis Kokkos China Industry Environment
Wireless Broadband: Does one size fit all? Asimakis Kokkos China Industry Environment 1 Nokia Siemens Networks 3 rd IEEE Broadband Wireless Workshop 19-May-2008 A tale of two industries Mobile Broadband
More information