Vulnerabilities of UMTS access domain security architecture

被引:12
作者
Khan, Muzammil [1 ]
Ahmed, Attiq [1 ]
Cheema, Ahmad Raza [1 ]
机构
[1] NUST Rawalpindi, Coll Telecommun, Rawalpindi, Pakistan
来源
PROCEEDINGS OF NINTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING | 2008年
关键词
D O I
10.1109/SNPD.2008.78
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents vulnerabilities of UMTS access domain security architecture. The security architecture of UMTS offers some protection against known threats including false base station attacks, man-in-the-middle attacks and replay attacks. The system also successfully ensures user data confidentiality and signaling data integrity. However, a few novel vulnerabilities have been identified in this paper. It has been shown that modification of unprotected initial messages prior to the security mode command may result in DoS and man-in-the-middle attacks. Non-integrity protection of rrcConnectionReject message can also be exploited to launch DoS attack. Clear transmission of IMSI on some occasions is a violation of user identity/location confidentiality and user traceability. This exposed IMSI can be exploited for new attacks.
引用
收藏
页码:350 / 355
页数:6
相关论文
共 14 条
[1]  
*3GPP, 2000, 33900120 3GPP TR
[2]  
*3GPP, 2001, 33120400 3GPP TS
[3]  
*3GPP, 2007, 25331800 3GPP TS
[4]  
*3GPP, 2006, 33102710 3GPP TS
[5]  
*3GPP, 2007, 35202700 3GPP TS
[6]  
*3GPP, 2007, 35201700 3GPP TS
[7]  
*3GPP, 2007, 33120750 3GPP TS
[8]  
BAIS A, P IEEE INT C IND INF, P570
[9]  
Barkan E, 2003, LECT NOTES COMPUT SC, V2729, P600
[10]  
*DTSCH BANK RES, 2007, E BANK SNAPSH