Research Article
Implications of Unlicensed Mobile Access (UMA) for GSM security
@INPROCEEDINGS{10.1109/SECURECOMM.2005.23, author={S. Grech and P. Eronen}, title={Implications of Unlicensed Mobile Access (UMA) for GSM security}, proceedings={1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks}, publisher={IEEE}, proceedings_a={SECURECOMM}, year={2006}, month={3}, keywords={}, doi={10.1109/SECURECOMM.2005.23} }
- S. Grech
P. Eronen
Year: 2006
Implications of Unlicensed Mobile Access (UMA) for GSM security
SECURECOMM
IEEE
DOI: 10.1109/SECURECOMM.2005.23
Abstract
Despite its imperfections, GSM security has stood well the test of time. In part, this security success has relied on closed platforms that prevent the end-user from tampering with the GSM protocol stacks. While it is possible to build phones that do not have such restrictions, this is difficult due to, e.g., legislation and technical complexity. Unlicensed Mobile Access (UMA) is a new technology that provides access to GSM services over Wireless LAN or Bluetooth. It also challenges the assumption of closed platforms, since it is relatively easy to implement a UMA phone purely in software running on standard PC hardware and operating systems. This paper examines the security implications of UMA for GSM security, focusing especially on the impact of open terminal platforms. We identify several areas where open platforms may increase risks to both honest users and network operators, and propose countermeasures for mitigating these risks.