Filters








2,576 Hits in 5.5 sec

Let Me Answer That for You: Exploiting Broadcast Information in Cellular Networks

Nico Golde, Kevin Redon, Jean-Pierre Seifert
2013 USENIX Security Symposium  
By implementing our own baseband firmware based on OsmocomBB, we violate this trust and are able to evaluate the impact of a rogue device with regard to the usage of broadcast information.  ...  We demonstrate that for at least GSM, it is feasible to hijack the transmission of mobile terminated services such as calls, perform targeted denial of service attacks against single subscribers and as  ...  The authors would like to thank Dieter Spaar, Harald Welte, Holger Freyther, Benjamin Michéle, Alex Dent, and Dmitry Nedospasov for technical discussions and their help in reviewing this paper.  ... 
dblp:conf/uss/GoldeRS13 fatcat:e6bvbgwcxjftljvvu63n3bbhq4

Mitigating denial of service threats in GSM networks

V. Bocan, V. Cretu
2006 First International Conference on Availability, Reliability and Security (ARES'06)  
We propose a way to mitigate the attacks by adding minimal authentication to the GSM channel assignment protocol.  ...  This paper outlines a critical flaw in GSM networks which opens the avenue for distributed denial of service attacks.  ...  Denial of service attack in a GSM network Even though the network would do a minimal authentication against the mobile station by asking the IMEI number or the power levels of the six neighboring cells  ... 
doi:10.1109/ares.2006.81 dblp:conf/IEEEares/BocanC06 fatcat:utfrve37vbb2biqycg2f67lurm

Research of the Effect of Services on the Aggregate Bandwidth of a Cell Radio Access Network UTRAN of UMTS Standard

Voropayeva Viktoriya
2013 American Journal of Electrical and Electronic Engineering  
This paper investigates the impact of service changes on the nature of radio interface UMTS bandwidth. Finally, OPNET simulation models are developed.  ...  The main purpose of modeling was to obtain the dependency of common capacities of the base station for the upward and downward directions on time.  ...  To minimize the impact of the handover, the RNC could play the third role: Drifting RNC (DRNC). DRNC provides ("gives for temporary use") resources to SRNC controller for a specific UE.  ... 
doi:10.12691/ajeee-1-1-3 fatcat:a6wq4iifkvgavcmhnz5brlelnq

Mathematical Optimization Model Technique for Network Congestion Control in Global System for Mobile Communications

Remigius Okeke Aja, Emeka Uchendu Agwu, Sussan Ijeoma Ezeh, Udochi John Stephen
2019 Earthline Journal of Mathematical Sciences  
One of the GSM providers; Mobile Telecommunication of Nigeria (MTN), was used to demonstrate the usefulness of Second Order Necessary Condition to the control of network congestion at Michael Okpara University  ...  In this paper, we applied a Second Order Necessary Condition (a Mathematical Optimization Technique) as a tool in solving the problem of network congestion.  ...  Acknowledgement We are grateful to MTN officers at Umuahia for the data/information they gave us which helped us to carry out this research successfully.  ... 
doi:10.34198/ejms.1119.5161 fatcat:ajxxefis4bakhoam5efftshfhe

Location management methods for third generation mobile systems

S. Tabbane
1997 IEEE Communications Magazine  
This article provides an overview of the means and techniques used for subscriber location management in present cellular mobile networks.  ...  Subsequently, a simple evaluation of the current location updating procedure used in GSM is presented in the context of a PCS framework t o illustrate the load placed on the radio channels and on the MSWLR  ...  The GSM worldwide network, defined as the network made up of all interconnected GSM networks in the world, can be such an example of a large network.  ... 
doi:10.1109/35.606034 fatcat:ce2mjnkkanaujep6knblbrlyle

Securing USIM-based Mobile Communications from Interoperation of SIMbased Communications

Eric Southern, Abdelkader Ouda, Abdallah Shami
2013 International Journal for Information Security Research  
One of the main difficulties in deploying wireless networks is the ability to secure information and resources on a medium that by its very nature broadcasts all information.  ...  It is a requirement that there be interoperation of legacy security frameworks into modern mobile networks.  ...  The next sections will describe the impact of this change on the different network scenarios.  ... 
doi:10.20533/ijisr.2042.4639.2013.0037 fatcat:rmgf3x6lwfds3bhf76sut6pdyq

Threats and Countermeasures in GSM Networks

Valer Bocan, Bocan Cretu
2006 Journal of Networks  
We propose a way to mitigate the attacks by adding minimal authentication to the GSM channel assignment protocol.  ...  This paper outlines a critical flaw in GSM networks which opens the avenue for distributed denial of service attacks.  ...  The SIM card contains the International Mobile Subscriber Identity (IMSI) and a Subscriber Identification Key (K i ), both used to authenticate the client against the GSM network.  ... 
doi:10.4304/jnw.1.6.18-27 fatcat:x74xkvrotbbcpibkv5orsvq4bu

Prioritized Data Calls with Time Threshold Performance Model in GSM

Kuboye B.M., Alese B. K
2014 International Journal of Applied Information Systems  
The impacts of priorities on different subscribers in the network were shown through the graphical display of the results.  ...  This work focuses on how the data calls can be managed on the network in order to minimized congestion experienced on the network.  ...  The effects of each class on the network and its impact on another class are shown.  ... 
doi:10.5120/ijais14-451156 fatcat:odisj2xhzrb5jhp75fnie5hply

IDAMN: an intrusion detection architecture for mobile networks

D. Samfat, R. Molva
1997 IEEE Journal on Selected Areas in Communications  
The algorithms and the components of IDAMN have been designed in order to minimize the overhead incurred in the fixed part of the cellular network.  ...  In this paper we present IDAMN, a distributed system whose main functionality is to track and detect mobile intruders in real-time.  ...  We would like also to thank Raymond Knopp for his assistance during the preparation of this article and Christian Bonnet for the implementation of the GSM simulator WINES.  ... 
doi:10.1109/49.622919 fatcat:4r457pvfsjddfhspstdrlwqg4y

Wireless security: securing mobile UMTS communications from interoperation of GSM

Eric Southern, Abdelkader Ouda, Abdallah Shami
2012 Security and Communication Networks  
This requirement for mobile networks means that integration is required. There are flaws in this integration of GSM into UMTS networks.  ...  Mobile wireless networks have the requirement of allowing old equipment to use the entire network as it is advantageous to allow new mobile equipment to connect to old networking equipment to increase  ...  to run on minimal resources.  ... 
doi:10.1002/sec.674 fatcat:ypdl74ulpvdgrhxyyjdoe3xuvq

INTELLIGENT LOCATION TRACKING SCHEME FOR HANDLING USERS' MOBILITY

Mallikarjun.C.Sarsamba .
2014 International Journal of Research in Engineering and Technology  
The definition of a node depends on the network and protocol layer referred to.  ...  Due to growing the number of mobile users, global connectivity and the small size of cells, one of the most serious matters regarding these networks is position management.  ...  Mobility management is one of the major functions of a GSM or UMTS network that allows mobile phones to work.  ... 
doi:10.15623/ijret.2014.0315173 fatcat:h55ebvpmv5eo3n6prkgewfadcq

Interoperability between UMTS and cdma2000 networks

Soojin Kim, HyungJoon Cho, HeeHyuck Hahm, SangYun Lee, Myung Sung Lee
2003 IEEE wireless communications  
CONCLUSION The objective of this article is to introduce the network architecture for enabling interoperability of a UMTS network with a cdma2000 network in a manner that minimizes impact to both networks  ...  The primary goals of this integration from the network service provider's perspective are to: • Minimize the impact of the existing networks and also minimize the investment cost • Provide nationwide service  ...  Since joining SK Telecom in 1994, she has conducted research in the areas of 3G UMTS core network development and interworking between 3G UMTS and cdma2000 networks.  ... 
doi:10.1109/mwc.2003.1182107 fatcat:wmpie5lz3zcifjd6w4nqvg4ona

The Impact of Cell Site Re-Homing on the Performance of UMTS Core Networks

Ye Ouyang, M. Hosein Fallah
2010 International Journal of Next-Generation Networks  
This paper introduces the cell site re-homing in radio network and analyzes its impact on the performance of GSM/UMTS core network.  ...  The core network, as the parental part of radio network, is inevitably impacted by the re-homing in radio domain.  ...  The paper will study the impact of the re-homing in RAN on the performance of CN in GSM/UMTS networks.  ... 
doi:10.5121/ijngn.2010.2105 fatcat:qbvbpl27gbcp7m53kzepk5gxsm

Testing the Mobile Internet [chapter]

J. Charles Francis
2003 IFIP Advances in Information and Communication Technology  
This paper presents results from the Eurescom P1016 project on Mobile and IP Network Integration Testing (MINIT).  ...  The results consist of Test Suite Structure and Test Purpose documents as weil as Abstract Test Suites and PIXIT specifications addressing GSM, GPRS and UMTS Network Integration Testing.  ...  The views expressed are those of the author and do not necessarily reflect the opinion of these companies.  ... 
doi:10.1007/978-0-387-35673-0_9 fatcat:leemnb2s5fedvomgjcqxhyarda

A Novel Model for Optimized GSM Network Design [article]

Alexei Barbosa de Aguiar, Placido Rogerio Pinheiro, Alvaro de Menezes S. Neto, Ruddy P. P. Cunha, Rebecca F. Pinheiro
2009 arXiv   pre-print
GSM networks are very expensive. The network design process requires too many decisions in a combinatorial explosion.  ...  This work presents an integer programming model and a computational tool for designing GSM (Global System for Mobile Communications) networks, regarding BSS (Base Station Subsystem) with optimized cost  ...  INTRODUCTION The GSM mobile networks have a very sophisticated architecture composed by different kind of equipments [14] .  ... 
arXiv:0909.1045v1 fatcat:bkd5g7mijrdjtpqyohyvcqyuqm
« Previous Showing results 1 — 15 out of 2,576 results