Skip to main content

Vulnerabilities and Possible Attacks Against the GPRS Backbone Network

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNCCN,volume 4347)

Abstract

This paper presents the security weaknesses and the possible attacks, which threaten the GPRS backbone network and the data that either reside at the network or are transferred through it. These attacks may be performed by malicious third parties, mobile users, network operators or network operator personnel, which exploit the weaknesses of the employed technology and the security measures applied to the GPRS backbone. The possible attacks against the GPRS backbone may result in the compromise of end-users security, the users over billing, the disclosure or alteration of critical information, the services unavailability, the network breakdown, etc. The analyzed attacks and their consequences increase the risks associated with the usage of GPRS, and, thus, influence its deployment that realizes the concept of the mobile Internet.

Keywords

  • Mobile Station
  • Mobile User
  • General Packet Radio Service
  • Visitor Location Register
  • Mobile Subscriber

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 3GPP TS 03.6 (V7.9.0), GPRS Service Description, Stage 2 (September 2002)

    Google Scholar 

  2. Pagliusi, P.: A Contemporary Foreword on GSM Security. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol. 2437, pp. 129–144. Springer, Heidelberg (2002)

    CrossRef  Google Scholar 

  3. Mitchell, C.: The security of the GSM air Interface protocol. Technical Report, Royal Holloway University of London (August 2001), http://www.ma.rhul.ac.uk/techreports/

  4. 3GPP TS 09.60 (V7.10.0), GPRS Tunneling Protocol (GTP) across the Gn and Gp Interface (December 2002)

    Google Scholar 

  5. 3GPP TS 09.02 (v7.15.0) Mobile Application Part (MAP) specification (March 2004)

    Google Scholar 

  6. Srisuresh, P., Holdrege, M.: IP Network Address Translator (NAT) Terminology and Considerations. RFC 2663 (August 1999)

    Google Scholar 

  7. Gleeson, B., Lin, A., Heinanen, J., Armitage, G., Malis, A.: A Framework for IP Based Virtual Private Networks. RFC 2764 (February 2000)

    Google Scholar 

  8. Xenakis, C., Merakos, L.: Security in third Generation Mobile Networks. Computer Communications 27(7), 638–650 (2004)

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xenakis, C., Merakos, L. (2006). Vulnerabilities and Possible Attacks Against the GPRS Backbone Network. In: Lopez, J. (eds) Critical Information Infrastructures Security. CRITIS 2006. Lecture Notes in Computer Science, vol 4347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11962977_21

Download citation

  • DOI: https://doi.org/10.1007/11962977_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69083-2

  • Online ISBN: 978-3-540-69084-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics