SlideShare a Scribd company logo
GSM SECURITY : REVIEW &
ANALYSIS
Presented By : Guided By:
Ankit Mulani Prof. Pratik Patel
Nirali Borad
ABSTRACT
 Survey on security for mobile devices.
 Different kind of connectivity and applications provided
by mobile devices.
 There will be security analysis on satellite phones &
cellular text messaging services, self-powered gps
tracking system for vehicle security, location privacy in
mobile telephony networks, etc.
Outlines
 Introduction
 Literature review
 Connectivity provided by mobile devices
 Security is must for mobile devices
 SMS-based malware infection
 Security analysis of two satphone standards
 Self-powered GPS tracking system
 Location privacy in mobile telephony networks
 EAS over cellular text messaging services
Introduction
 Connectivity Provided by Mobile Devices
 Security is must for Mobile Devices
 SMS-Based Malware Infection Will Get Throttled by the
Wireless Link
 Security Analysis Required for two Satphones
 Self-Powered GPS Tracking System
 Location Privacy in Mobile Telephony Networks
 EAS Over Cellular Text Messaging Services
Literature Review
Name Research Name Journal
Mariantonietta La Polla
Fabio Martinelli
Daniele Sgandurra
A Survey on Security for
Mobile Devices
Communications surveys
& tutorials
Benedikt Driessen
Ralf Hund
Carsten Willems
Christof Paar
Thorsten Holz
A Security Analysis of
Two Satphone Standards
IEEE Symposium on
Security and Privacy
Ilona Murynets
Roger Piqueras Jover
How an SMS-Based
Malware Infection Will
Get Throttled by the
Wireless Link
Communication and
Information Systems
Security Symposium
Connectivity Provided by Mobile Devices
 Current Mobile Devices offer a Large Selection of Connectivity
Options
 Global System for Mobile communications (GSM)
 General Packet Radio Service (GPRS)
 The Universal Mobile Telecommunications System (UMTS)
 Bluetooth is a Standard that Enables Devices to Exchange Data over
a Small area through short Wavelength Radio Transmissions.
Security is must for mobile devices
 By the use of Mobile Devices there are Availability of different kind
of Malwares
 The main Goals of Malware targeted at Smartphones include Theft
of Personal data stored in the Phone or the User’s Credit
 Note that there are different kind of OSes
 There are different methodologies of Attacks in Mobile Devices
 The Main Goals of Attacks are Privacy, Sniffing, Denial of service,
Overbilling
 There are Several kinds of Security Applications who Provides
Security Features
SMS-Based Malware Infection Will Get
Throttled by the Wireless Link
 The Short Messaging Service
Centre (SMSC) is the central
node that handles all SMS
traffic in a network
 A query to a data base node
known as Home Location
Registry (HLR) provides the
address of the Mobile Station
Controller (MSC) to which the
phone is attached and the
message is forwarded
 RNC is one type of node which
controls the multiple Base
Stations
Continue…
Continue…
 The results shows that spreading rate in mobility networks is much
lower than in a regular wired topology.
 The number of transmitted messages is bound to the capacity of the
control channels used to transport SMSs over the wireless link.
 In the case of GSM, the 8 SDCCH channels in each cell will start
clogging when the rate of SMS exceeds 8 transmitted messages
every 5 seconds.
Security Analysis of Two Satphone Standards
Problem :
 Satphones do not use the Intel x86 instruction set architecture
 Security aspects of two Satphone Standards are Poorly Documented &
Proprietary
Solution :
 We perform reverse-engineering of firmware images to understand the
inner working of the phones, developing our own disassembler and tools
to analyze the code, and extending prior work on binary analysis to
efficiently identify cryptographic code.
 We perform a formal cryptanalysis of the extracted algorithms and extend
a known attack on GSM for GMR-1 and introduce an entirely new attack
for GMR-2.
Self-Powered GPS Tracking System for Vehicle
Security
 The work Presented Addresses the issue of the Vulnerability of
Vehicle Security Systems Especially during Power Sabotage
 Methodology of Self Powered GPS Tracking System
 Vehicle Vibration Profile
 Piezoelectric Generators
 Harvester Architecture
 Energy Storage Unit
Shown in Figure the frequency spectrum and the power spectrum both
have 2 peaks at 60Hz and 85Hz respectively. The vibration profile was
replicated in a laboratory environment by using a 300W woofer speaker
 In Continues Tracking
mode where data is sent
successively, the system
requires some value to get
a GPS lock and send the
first data and value for
successive transmissions.
 Primary Storage is fully
charged and that data is
being sent every 10s, the
system will be able to
transmit some data for
some duration before the
primary storage is fully
depleted
Reclaiming location privacy in mobile telephony
networks
Problem :
 Lack of Transparency in Mobile Telephone Network
eg : Location disclosure
Solution:
 Utility based Opponent Model to formalize the conflict between
mobile telephony infrastructure
 User controllable GSM software stack
Locating Mobile Phones
 To cope with subscriber
mobility, the location update
(LU) procedure was introduced
 However, LU procedures
require network resources
 Thus, there is a trade-off for the
service provider between search
costs for signalling and network
load
 Figure Shows, The time lapse
between periodic location
updates is defined by the
network and varies between
infrastructure providers
Network Interaction From a Subscriber’s
Perspective
 Figure Shows resulting
frequently visited places
extracted from the recorded
GPS and GSM (24 LU /
day) data
 While the results show some
minor differences, both
methods reveal the same
general pattern. Especially,
the proportions and ranking
of the most significant
places were preserved.
EAS Over Cellular Text Messaging Services
Problem:
 Not work as a advertised due to limitation of cellular infrastructure
Solution:
 Targeted messaging mechanism as a means of efficiently using currently
deployed infrastructure and third-party EAS
Limitation:
 Increasingly deployed security infrastructure does not achieve its stated
requirement for large populations
Thank You

More Related Content

What's hot

A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications 
2012engg
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
IJMER
 
Modeling and restraining of mobile virus propagation
Modeling and restraining of mobile virus propagationModeling and restraining of mobile virus propagation
Modeling and restraining of mobile virus propagation
Pranav Pinarayi
 
Byzantine Attack & Defense in Cognitive Radio Network
Byzantine Attack & Defense in Cognitive Radio NetworkByzantine Attack & Defense in Cognitive Radio Network
Byzantine Attack & Defense in Cognitive Radio Network
Chandra Sharma
 
Wireless Data Communication Techniques to Coordinate Distributed Rooftop PVs ...
Wireless Data Communication Techniques to Coordinate Distributed Rooftop PVs ...Wireless Data Communication Techniques to Coordinate Distributed Rooftop PVs ...
Wireless Data Communication Techniques to Coordinate Distributed Rooftop PVs ...
TELKOMNIKA JOURNAL
 
Chapter
ChapterChapter
Chapter
Rajat Soni
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
cscpconf
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
IJEEE
 
Optical Network Research Projects Assistance
Optical Network Research Projects AssistanceOptical Network Research Projects Assistance
Optical Network Research Projects Assistance
Network Simulation Tools
 
Machine learning based lightweight interference mitigation scheme for wireles...
Machine learning based lightweight interference mitigation scheme for wireles...Machine learning based lightweight interference mitigation scheme for wireles...
Machine learning based lightweight interference mitigation scheme for wireles...
TELKOMNIKA JOURNAL
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
Aman Gupta
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
journalBEEI
 
Extend life of wireless sensor network
Extend life of wireless sensor networkExtend life of wireless sensor network
Extend life of wireless sensor network
Gaurang Rathod
 
Wireless sensor networks 2016-2017 titles
Wireless sensor networks 2016-2017 titlesWireless sensor networks 2016-2017 titles
Wireless sensor networks 2016-2017 titles
Shakas Technologies
 
Wsn
WsnWsn
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
Neha Kulkarni
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
Rashi Dhagat
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
sofiakhatoon
 

What's hot (20)

A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications 
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
Modeling and restraining of mobile virus propagation
Modeling and restraining of mobile virus propagationModeling and restraining of mobile virus propagation
Modeling and restraining of mobile virus propagation
 
Byzantine Attack & Defense in Cognitive Radio Network
Byzantine Attack & Defense in Cognitive Radio NetworkByzantine Attack & Defense in Cognitive Radio Network
Byzantine Attack & Defense in Cognitive Radio Network
 
40120140503011
4012014050301140120140503011
40120140503011
 
Wireless Data Communication Techniques to Coordinate Distributed Rooftop PVs ...
Wireless Data Communication Techniques to Coordinate Distributed Rooftop PVs ...Wireless Data Communication Techniques to Coordinate Distributed Rooftop PVs ...
Wireless Data Communication Techniques to Coordinate Distributed Rooftop PVs ...
 
Chapter
ChapterChapter
Chapter
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
Optical Network Research Projects Assistance
Optical Network Research Projects AssistanceOptical Network Research Projects Assistance
Optical Network Research Projects Assistance
 
Machine learning based lightweight interference mitigation scheme for wireles...
Machine learning based lightweight interference mitigation scheme for wireles...Machine learning based lightweight interference mitigation scheme for wireles...
Machine learning based lightweight interference mitigation scheme for wireles...
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
Extend life of wireless sensor network
Extend life of wireless sensor networkExtend life of wireless sensor network
Extend life of wireless sensor network
 
Wireless sensor networks 2016-2017 titles
Wireless sensor networks 2016-2017 titlesWireless sensor networks 2016-2017 titles
Wireless sensor networks 2016-2017 titles
 
Wsn
WsnWsn
Wsn
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
 

Viewers also liked

El mártir de las catacumbas anónimo
El mártir de las catacumbas   anónimoEl mártir de las catacumbas   anónimo
El mártir de las catacumbas anónimoYimmy Baez
 
Geometria moderna-moise
Geometria moderna-moiseGeometria moderna-moise
Geometria moderna-moiseJonas Alberto
 
2014 Amy - Perkins Letter of Recommendation
2014 Amy - Perkins Letter of Recommendation2014 Amy - Perkins Letter of Recommendation
2014 Amy - Perkins Letter of RecommendationAmy Seesholtz
 
Resume Tarot Card Reader Angela Lucy
Resume Tarot Card Reader Angela LucyResume Tarot Card Reader Angela Lucy
Resume Tarot Card Reader Angela LucyElizabeth Dobricki
 
Avaliação de impacto e resultados de projetos de cooperação técnica desenvolv...
Avaliação de impacto e resultados de projetos de cooperação técnica desenvolv...Avaliação de impacto e resultados de projetos de cooperação técnica desenvolv...
Avaliação de impacto e resultados de projetos de cooperação técnica desenvolv...
iicabrasil
 
マルチデバイスに対応するためのAuto layout
マルチデバイスに対応するためのAuto layoutマルチデバイスに対応するためのAuto layout
マルチデバイスに対応するためのAuto layout
asakahara
 
Restas horizontales y verticales
Restas horizontales y verticalesRestas horizontales y verticales
Restas horizontales y verticalesCaro San
 
SHoE Co.OfficialLogo
SHoE Co.OfficialLogoSHoE Co.OfficialLogo
SHoE Co.OfficialLogoSyah Adore
 
flafhjUntitled presentation (4)
flafhjUntitled presentation (4)flafhjUntitled presentation (4)
flafhjUntitled presentation (4)
Jaevon Stewart
 
Bài trình diễn
Bài trình diễnBài trình diễn
Bài trình diễn
Quang Codon
 
Day 4 ASSURE
Day 4 ASSUREDay 4 ASSURE
Day 4 ASSURE
Whitney Surface
 
Web quest ci350 dr. seuss
Web quest ci350 dr. seussWeb quest ci350 dr. seuss
Web quest ci350 dr. seuss
cstephens123
 
Abstractions
AbstractionsAbstractions
Abstractions
ArbiterOfLife
 

Viewers also liked (18)

El mártir de las catacumbas anónimo
El mártir de las catacumbas   anónimoEl mártir de las catacumbas   anónimo
El mártir de las catacumbas anónimo
 
Geometria moderna-moise
Geometria moderna-moiseGeometria moderna-moise
Geometria moderna-moise
 
2014 Amy - Perkins Letter of Recommendation
2014 Amy - Perkins Letter of Recommendation2014 Amy - Perkins Letter of Recommendation
2014 Amy - Perkins Letter of Recommendation
 
Resume Tarot Card Reader Angela Lucy
Resume Tarot Card Reader Angela LucyResume Tarot Card Reader Angela Lucy
Resume Tarot Card Reader Angela Lucy
 
Valeria campos
Valeria camposValeria campos
Valeria campos
 
Avaliação de impacto e resultados de projetos de cooperação técnica desenvolv...
Avaliação de impacto e resultados de projetos de cooperação técnica desenvolv...Avaliação de impacto e resultados de projetos de cooperação técnica desenvolv...
Avaliação de impacto e resultados de projetos de cooperação técnica desenvolv...
 
Pontos de coleta_itgreen_definitivo
Pontos de coleta_itgreen_definitivoPontos de coleta_itgreen_definitivo
Pontos de coleta_itgreen_definitivo
 
マルチデバイスに対応するためのAuto layout
マルチデバイスに対応するためのAuto layoutマルチデバイスに対応するためのAuto layout
マルチデバイスに対応するためのAuto layout
 
Restas horizontales y verticales
Restas horizontales y verticalesRestas horizontales y verticales
Restas horizontales y verticales
 
SHoE Co.OfficialLogo
SHoE Co.OfficialLogoSHoE Co.OfficialLogo
SHoE Co.OfficialLogo
 
flafhjUntitled presentation (4)
flafhjUntitled presentation (4)flafhjUntitled presentation (4)
flafhjUntitled presentation (4)
 
Bop1
Bop1Bop1
Bop1
 
Bài trình diễn
Bài trình diễnBài trình diễn
Bài trình diễn
 
Day 4 ASSURE
Day 4 ASSUREDay 4 ASSURE
Day 4 ASSURE
 
Web quest ci350 dr. seuss
Web quest ci350 dr. seussWeb quest ci350 dr. seuss
Web quest ci350 dr. seuss
 
Before
BeforeBefore
Before
 
John Botros
John BotrosJohn Botros
John Botros
 
Abstractions
AbstractionsAbstractions
Abstractions
 

Similar to Wireless Communication - GSM Security

Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
IOSR Journals
 
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
Kumar Goud
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksWilliam Chipman
 
A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )
Joanna Paulsen
 
Computer Wireless Network Pdf - course material 2013
Computer Wireless Network Pdf - course material 2013Computer Wireless Network Pdf - course material 2013
Computer Wireless Network Pdf - course material 2013
vasanthimuniasamy
 
Fb34942946
Fb34942946Fb34942946
Fb34942946
IJERA Editor
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
 
Providing end to-end secure
Providing end to-end secureProviding end to-end secure
Providing end to-end secure
IJNSA Journal
 
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSPROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
IJNSA Journal
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
Rahul Kumar
 
Security model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentationSecurity model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentation
Rotract CLUB of BSAU
 
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
CSCJournals
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission system
Durgarao Gundu
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationiaemedu
 
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networks
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor  NetworksSecure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor  Networks
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networks
IOSR Journals
 

Similar to Wireless Communication - GSM Security (20)

Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
 
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
 
PID3902073
PID3902073PID3902073
PID3902073
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless Networks
 
A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )
 
Computer Wireless Network Pdf - course material 2013
Computer Wireless Network Pdf - course material 2013Computer Wireless Network Pdf - course material 2013
Computer Wireless Network Pdf - course material 2013
 
Fb34942946
Fb34942946Fb34942946
Fb34942946
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
Gsm fundamentals
Gsm fundamentalsGsm fundamentals
Gsm fundamentals
 
40120130405021
4012013040502140120130405021
40120130405021
 
Providing end to-end secure
Providing end to-end secureProviding end to-end secure
Providing end to-end secure
 
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSPROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
 
Security model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentationSecurity model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentation
 
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
 
1678 1683
1678 16831678 1683
1678 1683
 
1678 1683
1678 16831678 1683
1678 1683
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission system
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modification
 
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networks
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor  NetworksSecure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor  Networks
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networks
 

Wireless Communication - GSM Security

  • 1. GSM SECURITY : REVIEW & ANALYSIS Presented By : Guided By: Ankit Mulani Prof. Pratik Patel Nirali Borad
  • 2. ABSTRACT  Survey on security for mobile devices.  Different kind of connectivity and applications provided by mobile devices.  There will be security analysis on satellite phones & cellular text messaging services, self-powered gps tracking system for vehicle security, location privacy in mobile telephony networks, etc.
  • 3. Outlines  Introduction  Literature review  Connectivity provided by mobile devices  Security is must for mobile devices  SMS-based malware infection  Security analysis of two satphone standards  Self-powered GPS tracking system  Location privacy in mobile telephony networks  EAS over cellular text messaging services
  • 4. Introduction  Connectivity Provided by Mobile Devices  Security is must for Mobile Devices  SMS-Based Malware Infection Will Get Throttled by the Wireless Link  Security Analysis Required for two Satphones  Self-Powered GPS Tracking System  Location Privacy in Mobile Telephony Networks  EAS Over Cellular Text Messaging Services
  • 5. Literature Review Name Research Name Journal Mariantonietta La Polla Fabio Martinelli Daniele Sgandurra A Survey on Security for Mobile Devices Communications surveys & tutorials Benedikt Driessen Ralf Hund Carsten Willems Christof Paar Thorsten Holz A Security Analysis of Two Satphone Standards IEEE Symposium on Security and Privacy Ilona Murynets Roger Piqueras Jover How an SMS-Based Malware Infection Will Get Throttled by the Wireless Link Communication and Information Systems Security Symposium
  • 6. Connectivity Provided by Mobile Devices  Current Mobile Devices offer a Large Selection of Connectivity Options  Global System for Mobile communications (GSM)  General Packet Radio Service (GPRS)  The Universal Mobile Telecommunications System (UMTS)  Bluetooth is a Standard that Enables Devices to Exchange Data over a Small area through short Wavelength Radio Transmissions.
  • 7. Security is must for mobile devices  By the use of Mobile Devices there are Availability of different kind of Malwares  The main Goals of Malware targeted at Smartphones include Theft of Personal data stored in the Phone or the User’s Credit  Note that there are different kind of OSes  There are different methodologies of Attacks in Mobile Devices  The Main Goals of Attacks are Privacy, Sniffing, Denial of service, Overbilling  There are Several kinds of Security Applications who Provides Security Features
  • 8. SMS-Based Malware Infection Will Get Throttled by the Wireless Link  The Short Messaging Service Centre (SMSC) is the central node that handles all SMS traffic in a network  A query to a data base node known as Home Location Registry (HLR) provides the address of the Mobile Station Controller (MSC) to which the phone is attached and the message is forwarded  RNC is one type of node which controls the multiple Base Stations
  • 10. Continue…  The results shows that spreading rate in mobility networks is much lower than in a regular wired topology.  The number of transmitted messages is bound to the capacity of the control channels used to transport SMSs over the wireless link.  In the case of GSM, the 8 SDCCH channels in each cell will start clogging when the rate of SMS exceeds 8 transmitted messages every 5 seconds.
  • 11. Security Analysis of Two Satphone Standards Problem :  Satphones do not use the Intel x86 instruction set architecture  Security aspects of two Satphone Standards are Poorly Documented & Proprietary Solution :  We perform reverse-engineering of firmware images to understand the inner working of the phones, developing our own disassembler and tools to analyze the code, and extending prior work on binary analysis to efficiently identify cryptographic code.  We perform a formal cryptanalysis of the extracted algorithms and extend a known attack on GSM for GMR-1 and introduce an entirely new attack for GMR-2.
  • 12. Self-Powered GPS Tracking System for Vehicle Security  The work Presented Addresses the issue of the Vulnerability of Vehicle Security Systems Especially during Power Sabotage  Methodology of Self Powered GPS Tracking System  Vehicle Vibration Profile  Piezoelectric Generators  Harvester Architecture  Energy Storage Unit
  • 13. Shown in Figure the frequency spectrum and the power spectrum both have 2 peaks at 60Hz and 85Hz respectively. The vibration profile was replicated in a laboratory environment by using a 300W woofer speaker
  • 14.  In Continues Tracking mode where data is sent successively, the system requires some value to get a GPS lock and send the first data and value for successive transmissions.  Primary Storage is fully charged and that data is being sent every 10s, the system will be able to transmit some data for some duration before the primary storage is fully depleted
  • 15. Reclaiming location privacy in mobile telephony networks Problem :  Lack of Transparency in Mobile Telephone Network eg : Location disclosure Solution:  Utility based Opponent Model to formalize the conflict between mobile telephony infrastructure  User controllable GSM software stack
  • 16. Locating Mobile Phones  To cope with subscriber mobility, the location update (LU) procedure was introduced  However, LU procedures require network resources  Thus, there is a trade-off for the service provider between search costs for signalling and network load  Figure Shows, The time lapse between periodic location updates is defined by the network and varies between infrastructure providers
  • 17. Network Interaction From a Subscriber’s Perspective  Figure Shows resulting frequently visited places extracted from the recorded GPS and GSM (24 LU / day) data  While the results show some minor differences, both methods reveal the same general pattern. Especially, the proportions and ranking of the most significant places were preserved.
  • 18. EAS Over Cellular Text Messaging Services Problem:  Not work as a advertised due to limitation of cellular infrastructure Solution:  Targeted messaging mechanism as a means of efficiently using currently deployed infrastructure and third-party EAS Limitation:  Increasingly deployed security infrastructure does not achieve its stated requirement for large populations