Paper
31 December 2020 Vulnerabilities in authentication process GSM standard: RF measurements, theoretical and practical aspects
Author Affiliations +
Proceedings Volume 11718, Advanced Topics in Optoelectronics, Microelectronics and Nanotechnologies X; 1171820 (2020) https://doi.org/10.1117/12.2571255
Event: Advanced Topics in Optoelectronics, Microelectronics and Nanotechnologies 2020, 2020, Online Only
Abstract
The rapid development of the telecommunication standards, which are getting close to the implementation of the 5th generation now (5G) leads to us to neglect the GSM standard, where there are still vulnerabilities that can be exploited by attackers. The purpose of this paper is to demonstrate step by step the authentication in GSM, of mobile subscribers, technical parameters and vulnerabilities identified in this process, with practical measurements. In Romania, GSM is used by the Operators as a backup network, or to cover with signal long areas (in the mountains) where there is no specific (high data rate transfer) demands from the users. Based on the results obtained a number of interesting conclusions are drawn.
© (2020) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Cristian Capotă, Octavian Fratu, Eugen Stancu, Mihai Găină, and Dragos Vizireanu "Vulnerabilities in authentication process GSM standard: RF measurements, theoretical and practical aspects", Proc. SPIE 11718, Advanced Topics in Optoelectronics, Microelectronics and Nanotechnologies X, 1171820 (31 December 2020); https://doi.org/10.1117/12.2571255
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Global system for mobile communications

Standards development

Cell phones

Networks

Network security

Receivers

Algorithm development

Back to Top