About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

Research Article

Implementing an Affordable and Effective GSM IMSI Catcher with 3G Authentication

Download(Requires a free EAI acccount)
1797 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-319-23829-6_18,
        author={Max Suraev},
        title={Implementing an Affordable and Effective GSM IMSI Catcher with 3G Authentication},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I},
        proceedings_a={SECURECOMM},
        year={2015},
        month={11},
        keywords={Security Mobile Privacy},
        doi={10.1007/978-3-319-23829-6_18}
    }
    
  • Max Suraev
    Year: 2015
    Implementing an Affordable and Effective GSM IMSI Catcher with 3G Authentication
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23829-6_18
Max Suraev1,*
  • 1: Security in Telecommunications,Technische Universität Berlin
*Contact email: max@sec.t-labs.tu-berlin.de

Abstract

Recently revealed information on secret agencies eavesdropping on the politicians’ phone calls all over the world, have shown how common practice it is. Although the insecurity of the mobile telecommunication system GSM has been known in the scientific community, these events made it clear to the public. Particularly, the extent and usage of such techniques demonstrates its relevance in the current society. In this paper, we will demonstrate techniques used to intercept mobile calls and analyze the feasibility of man-in-the-middle attacks in real-life scenarios. We show how to build an affordable and effective IMSI catcher which works even when mutual authentication between phone and a network is enforced. The methods to detect it and other potential countermeasures are discussed as well.

Keywords
Security Mobile Privacy
Published
2015-11-23
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-319-23829-6_18
Copyright © 2014–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL