Proceedings of the 14th International Workshop on Wireless Network Testbeds, Experimental Evaluation &Amp; Characterization 2020
DOI: 10.1145/3411276.3412191
|View full text |Cite
|
Sign up to set email alerts
|

The diverse and variegated reactions of different cellular devices to IMSI catching attacks

Abstract: The goal of this paper is to assess how different User Terminals react to IMSI-catching attacks, namely location privacy attacks aiming at gathering the user's International Mobile Subscriber Identity (IMSI). After having implemented two different attack techniques over two different Software-Defined-Radio (SDR) platforms (OpenAirInterface and srsLTE), we have tested these attacks over different versions of the mobile phone brands, for a total of 19 different radio modems tested. We show that while the majorit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Mobile device security settings can be effective in preventing IMSI catcher attacks by disabling features such as automatic network selection or forcing the device to use specific encryption protocols [45]. However, the effectiveness of these settings relies on user awareness and diligence in managing their device settings.…”
Section: E Mobile Device Security Settingsmentioning
confidence: 99%
“…Mobile device security settings can be effective in preventing IMSI catcher attacks by disabling features such as automatic network selection or forcing the device to use specific encryption protocols [45]. However, the effectiveness of these settings relies on user awareness and diligence in managing their device settings.…”
Section: E Mobile Device Security Settingsmentioning
confidence: 99%
“…In this, the legitimate user doesn't deauthenticate to the legitimate access point if only, if the hacker has a password of the legitimate access point. Even, the hacker send denied of the service, the legitimate user doesn't accept it because hacker doesn't have the password [10][11][12][13][14].…”
Section: Future Attackmentioning
confidence: 99%
“…The attackers can use an application on the user's device to change the contents of a token, steal confidential information, and send malicious packets to the 5G core. Other examples of attacks include Man-In-The-Middle (MITM), stolen verifier, replay, pilot contamination (e.g., non-orthogonal multiple access in 5G mm-Wave massive MIMO networks [Wang et al, 2020a]) [Osorio et al, 2020], pollution attack (e.g., in cooperative MEC caching [Yang et al, 2018]), stolen smart card (enabling offline password guessing [Shin and Kwon, 2018]), jamming (e.g., pulsed based jamming attack [Schinianakis et al, 2019]), signaling storm [Ahmad et al, 2017], byzantine, sinkhole, IMSI catchers [Chlosta et al, 2021;Mjolsnes and Olimid, 2019;Palamà et al, 2020] It is also possible to transmit multiple false PSS to the target 5G NR frame (at higher power), impersonate a BS during the RRC handshake, and conduct masquerading attacks (e.g., focusing on the mobility management entity [Moreira et al, 2018]). Besides, identifiers (e.g., MAC addresses) can be cloned or spoofed, data from the IoT deployment to the 5G BS (or 5G BS to the IoT deployment) can be captured, and node memory extracted to fraudulently use the private key [Bordel et al, 2021].…”
Section: Item Description Item Descriptionmentioning
confidence: 99%