A Denial of Service Attack to UMTS Networks Using SIM-Less Devices

被引:23
作者
Merlo, Alessio [1 ]
Migliardi, Mauro [2 ]
Gobbo, Nicola [2 ]
Palmieri, Francesco [3 ]
Castiglione, Aniello [4 ]
机构
[1] Univ Genoa, I-16126 Genoa, Italy
[2] Univ Padua, Dept Informat Engn, I-35100 Padua, Italy
[3] Univ Naples 2, Dept Ind & Informat Engn, Naples, Italy
[4] Univ Salerno, Dept Comp Sci, Salerno, Italy
关键词
Mobile security; UMTS; cellular networks security; HLR; DoS attack; critical infrastructures; PROTECTION;
D O I
10.1109/TDSC.2014.2315198
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
One of the fundamental security elements in cellular networks is the authentication procedure performed by means of the Subscriber Identity Module that is required to grant access to network services and hence protect the network from unauthorized usage. Nonetheless, in this work we present a new kind of denial of service attack based on properly crafted SIM-less devices that, without any kind of authentication and by exploiting some specific features and performance bottlenecks of the UMTS network attachment process, are potentially capable of introducing significant service degradation up to disrupting large sections of the cellular network coverage. The knowledge of this attack can be exploited by several applications both in security and in network equipment manufacturing sectors.
引用
收藏
页码:280 / 291
页数:12
相关论文
共 27 条
[1]  
3GPP, 2012, 25322 3GPP TS
[2]  
3GPP, 2012, 24008 3GPP TS
[3]  
3GPP, 2012, 25214 3GPP TS
[4]  
[Anonymous], HOTNETS
[5]   Breaking and fixing the Android Launching Flow [J].
Armando, Alessandro ;
Merlo, Alessio ;
Migliardi, Mauro ;
Verderame, Luca .
COMPUTERS & SECURITY, 2013, 39 :104-115
[6]   A Computationally Sound Mechanized Prover for Security Protocols [J].
Blanchet, Bruno .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (04) :193-207
[7]   Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels [J].
Capkun, Srdjan ;
Cagalj, Mario ;
Rengaswamy, Ramkumar ;
Tsigkogiannis, Ilias ;
Hubaux, Jean-Pierre ;
Srivastava, Mani .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (04) :208-223
[8]  
Castiglione A., 2006, SPEECH SECURE PERSON, P287, DOI [10.1007/978-3-8348-9195-2_31, DOI 10.1007/978-3-8348-9195-2_31]
[9]  
Castiglione A, 2009, LECT NOTES COMPUT SC, V5692, P50, DOI 10.1007/978-3-642-03964-5_6
[10]  
Derr K., 2007, P IEEE INT C PORT IN, P1