2018
DOI: 10.13052/jicts2245-800x.634
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Subscriber Profile DataPrivacy Breach via 4GDiameter Interconnection

Abstract: The interconnection network (IPX) connects telecommunication networks with each other on the globe. The IPX network enables features like voice and data roaming with your mobile device while traveling. Designed as a closed network it is now opening and unauthorized entities now misuse the IPX network for their purposes. The majority of the IPX still runs the Signalling System No 7 (SS7) protocol stack, while the more technically advanced operators roll out and deploy Diameter based LTE roaming. SS7 is known to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Similarly, Holtmann et al [30] have articulated different attacks on interworking function (IWF) between diameter and SS7 networks for LTE. Sharma et al [18] and Holtmann et al [30] have exposed the susceptibilities of the SS7 network and proposed some protection techniques such as the use of closed subscriber group in case of dealing with roaming scenarios or validate the authenticity of the incoming message requests, as protection measures to be implemented by GSMA (Global System for Mobile Communications) but no proof of concept is given. However, the approaches described above remain ineffective, owing to numerous inadequacies such as lack of detection mechanisms without maintaining user states and optimal accuracy and false-positive rates.…”
Section: Machine Learning and Secure Signalling Networkmentioning
confidence: 99%
“…Similarly, Holtmann et al [30] have articulated different attacks on interworking function (IWF) between diameter and SS7 networks for LTE. Sharma et al [18] and Holtmann et al [30] have exposed the susceptibilities of the SS7 network and proposed some protection techniques such as the use of closed subscriber group in case of dealing with roaming scenarios or validate the authenticity of the incoming message requests, as protection measures to be implemented by GSMA (Global System for Mobile Communications) but no proof of concept is given. However, the approaches described above remain ineffective, owing to numerous inadequacies such as lack of detection mechanisms without maintaining user states and optimal accuracy and false-positive rates.…”
Section: Machine Learning and Secure Signalling Networkmentioning
confidence: 99%
“…Holtmanns demonstrates that SS7 vulnerabilities endanger LTE users as well as GSM/UMTS subscribers. Because of their internet-working capabilities, the attacker can monitor LTE subscribers through the Diameter protocol, taking advantage of SS7 vulnerabilities [9]. In [10], Jensen gave a summary of SS7 attacks, including a section on entry points to the SS7 core network.…”
Section: How Vulnerable Is the Ss7 Network?mentioning
confidence: 99%