Vulnerabilities and Possible Attacks Against the GPRS Backbone Network

  • Christos Xenakis
  • Lazaros Merakos
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4347)


This paper presents the security weaknesses and the possible attacks, which threaten the GPRS backbone network and the data that either reside at the network or are transferred through it. These attacks may be performed by malicious third parties, mobile users, network operators or network operator personnel, which exploit the weaknesses of the employed technology and the security measures applied to the GPRS backbone. The possible attacks against the GPRS backbone may result in the compromise of end-users security, the users over billing, the disclosure or alteration of critical information, the services unavailability, the network breakdown, etc. The analyzed attacks and their consequences increase the risks associated with the usage of GPRS, and, thus, influence its deployment that realizes the concept of the mobile Internet.


Mobile Station Mobile User General Packet Radio Service Visitor Location Register Mobile Subscriber 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    3GPP TS 03.6 (V7.9.0), GPRS Service Description, Stage 2 (September 2002)Google Scholar
  2. 2.
    Pagliusi, P.: A Contemporary Foreword on GSM Security. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol. 2437, pp. 129–144. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  3. 3.
    Mitchell, C.: The security of the GSM air Interface protocol. Technical Report, Royal Holloway University of London (August 2001),
  4. 4.
    3GPP TS 09.60 (V7.10.0), GPRS Tunneling Protocol (GTP) across the Gn and Gp Interface (December 2002)Google Scholar
  5. 5.
    3GPP TS 09.02 (v7.15.0) Mobile Application Part (MAP) specification (March 2004)Google Scholar
  6. 6.
    Srisuresh, P., Holdrege, M.: IP Network Address Translator (NAT) Terminology and Considerations. RFC 2663 (August 1999)Google Scholar
  7. 7.
    Gleeson, B., Lin, A., Heinanen, J., Armitage, G., Malis, A.: A Framework for IP Based Virtual Private Networks. RFC 2764 (February 2000)Google Scholar
  8. 8.
    Xenakis, C., Merakos, L.: Security in third Generation Mobile Networks. Computer Communications 27(7), 638–650 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Christos Xenakis
    • 1
  • Lazaros Merakos
    • 1
  1. 1.Security Group, Communication Networks Laboratory, Department of Informatics & TelecommunicationsUniversity of AthensAthensGreece

Personalised recommendations