2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2013
DOI: 10.1109/infcomw.2013.6562901
|View full text |Cite
|
Sign up to set email alerts
|

Rogue femtocell owners: How mallory can monitor my devices

Abstract: Abstract-Femtocells are small cellular telecommunication base stations that provide improved cellular coverage. These devices provide important improvements in coverage, battery life and throughput, they also present security challenges. We identify a problem which has not been identified in previous studies of femtocell security: rogue owners of femtocells can secretly monitor third-party mobile devices by using the femtocell's access control features. We present traffic analysis of real femtocell traces and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Communication beyond the VPN tunnel remains exposed to malicious adversaries. Because General Packet Radio Service (GPRS) supports only one-way subscriber authentication, it is feasible for a malicious adversary to take control of meter collectors with rogue femtocells [10]. Once forced to attach to a rogue femtocell, the meter collectors as well as associated meters are in great danger [11].…”
Section: Introductionmentioning
confidence: 99%
“…Communication beyond the VPN tunnel remains exposed to malicious adversaries. Because General Packet Radio Service (GPRS) supports only one-way subscriber authentication, it is feasible for a malicious adversary to take control of meter collectors with rogue femtocells [10]. Once forced to attach to a rogue femtocell, the meter collectors as well as associated meters are in great danger [11].…”
Section: Introductionmentioning
confidence: 99%