Abstract
In this chapter, the reader will get an insight into one of the most easily employed techniques of voice, SMS, and identification data interception in GSM networks. Using a fake base station that mimics the behavior of a legitimate base station of the mobile phone operator, a malicious entity can convince mobile phones in a given area to handle their communication to it, effectively launching a man in the middle attack. This attack is possible only in GSM networks, since 3G employs mutual authentication, where the base station too has to authenticate its validity to the handset. However, it is relatively easy to use a jammer, jamming the 3G band. Almost every single mobile phone nowadays is multiband capable and as such it will fall back to GSM operation where it can be intercepted using the fake base station method.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
OpenBTS. http://openbts.sourceforge.net
Agilent Technologies 8922M/S GSM test set user guide, Agilent 08922-90211, UK, 1998
Racal 6103B Digital radio test set user manual, Racal Instruments Ltd, UK, 1999
Rohde & Schwarz, Digital radiocommunication tester CMD52/55, operating manual, Germany
Qixiang Electron Science & Technology Co. Ltd (2006) AnyTone AT-400 GSM, Repeater user manual, China, 2006
ITU-T E.212 (2008) The international identification plan for public networks and subscriptions, May 2008
Marcin Wiacek, Marcin’s page on-line. http://www.mwiacek.com/
Digital Cellular Telecommunications System (Phase 2); Mobile radio interface layer 3 specification (GSM 04.08), Doc. ETS 300 557, 1997
Digital Cellular Telecommunications System (Phase 2+); Radio subsystem link control (GSM 05.08 v. 8.5.0 Release 1999), Doc. ETSI TS 100 911 v. 8.5.0 (2000-10), 1999
Digital Cellular Telecommunications System (Phase 2+) Functions related to Mobile Station (MS) in idle mode and group receive mode, (GSM 03.22 v. 8.3.0 Release 1999), Doc. ETSI TS 100 930 v. 8.3.0, (2000-01), 1999
Androulidakis I, Kandus G (2011) Ramifications of mobile phone advanced O/S on security perceptions and practices. In: Proceedings of the 3rd international workshop on cyberspace safety and security (CSS2011), pp 33–38, Sep 2011
ETS 300 977 (GSM 11.11 version 5.5.0), European Telecommunications Standards Institute, Digital cellular telecommunications system (Phase2+); Specification of the Subscriber Identity Module Mobile Equipment (SIM ME) interface, May 1997
ETS 300 506 (GSM 02.09 V4.4.0), European Telecommunications Standards Institute, Digital cellular telecommunications system (Phase 2); Security aspects, July 1997
ETS 300 505 (GSM 02.07 version 4.8.2), European Telecommunications Standards Institute, Digital cellular telecommunications system (Phase 2); Mobile Stations (MS) features, Jan 1998
GSM 11.11 V8.1.0, European Telecommunications Standards Institute, Digital cellular telecommunications system (Phase 2+); Specification of the Subscriber Identity Module Mobile Equipment (SIM ME) interface, Nov 1999
GPP TS 31.102 V6.5.0, 3rd Generation Partnership Project; Technical Specification Group Terminals; Characteristics of the USIM application, Mar 2004
G TS 22.101 V3.8.0, 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects, Service aspects; Service principles, Dec 1999
GPP TS 22.101 V8.11.0, 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects Service aspects; Service principles (Release 8), Mar 2009
Androulidakis I, Pylarinos D, Kandus G (2011) Ciphering indicator approaches and user awareness. Maejo Int J Sci Technol (submitted to MIJST)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media New York
About this chapter
Cite this chapter
Androulidakis, I.I. (2012). Voice, SMS, and Identification Data Interception in GSM. In: Mobile Phone Security and Forensics. SpringerBriefs in Electrical and Computer Engineering(). Springer, Boston, MA. https://doi.org/10.1007/978-1-4614-1650-0_3
Download citation
DOI: https://doi.org/10.1007/978-1-4614-1650-0_3
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4614-1649-4
Online ISBN: 978-1-4614-1650-0
eBook Packages: EngineeringEngineering (R0)