(U)SimMonitor: A mobile application for security evaluation of cellular networks

被引:4
作者
Xenakis, Christos [1 ]
Ntantogian, Christoforos [1 ]
Panos, Orestis [1 ]
机构
[1] Univ Piraeus, Dept Digital Syst, Piraeus, Greece
基金
欧盟地平线“2020”;
关键词
Cellular networks; Mobile application; Android; AT commands; Security measurements;
D O I
10.1016/j.cose.2016.03.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The lack of precise directives in 3GPP specifications allows mobile operators to configure and deploy security mechanisms at their sole discretion. This may lead to the adoption of bad security practices and insecure configurations. Based on this observation, this paper presents the design and implementation of a novel mobile application named (U)SimMonitor that captures and analyzes the security policy that a cellular operator enforces, i.e., the invocation and employment of the specified security measures to protect its users. (U)SimMonitor achieves this by executing AT commands to extract network related parameters including encryption keys, identities, and location of users. Using (U)SimMonitor as our basic analysis tool, we have conducted a set of experiments for three mobile operators in Greece in a time period of 9 months. The obtained results allow us to quantify, compare and evaluate their applied security as well as pinpoint a set of generic critical observations. Numerical results and security measurements show that mobile networks have poor security configurations and practices, exposing subscribers to several attacks. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:62 / 78
页数:17
相关论文
共 34 条
  • [21] Nohl K., 2010, Attacking phone privacy
  • [22] Raptodimos D, 2013, THESIS
  • [23] Sanglard F, 2010, TRACING BROADBAND 1
  • [24] Savoldi A, 2010, TRACING BROADBAND 2
  • [25] Theoharidou M, 2012, 27TH IFIP TC 11 INFO
  • [26] Traynor P, 2009, 16 ACM C COMP COMM S
  • [27] Vallina-Rodriguez N, 2013, INT MEAS C IMC 2013
  • [28] Vavoulas N., 2010, P 5 INT WORKSH CRIT
  • [29] Security in third Generation Mobile Networks
    Xenakis, C
    Merakos, L
    [J]. COMPUTER COMMUNICATIONS, 2004, 27 (07) : 638 - 650
  • [30] Xenakis C, 2008, P IEEE IFIP INT C EM