Exploiting GSM Vulnerabilities: An Experimental Setup And Procedure To Map TMSI And Mobile Number

Main Article Content

sanjeev saharan
Jitender Kumar

Abstract

This research paper aims to correlate mobile phone number and TMSI in the GSM cellular network by incorporating advantage of mobile network operator not updating TMSI so frequently with each new service.Silent call procedure is implemented using Arduino board with gsm module sim900.For each network silent call timing is calculated by measuring call completion time and ringing time.So without alerting on the phone of the victim, its phone is forced to receive paging request and this paging request contains TMSI or IMSI.These silent calls will map to TMSI and TMSI can be used to calculate frame number which further leaks Kc using Kraken and the GSM privacy will be exploited.

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biographies

sanjeev saharan, Deenbandhu Chotu Ram University of Science & Technology,Murthal

M.Tech Scholar

Jitender Kumar, Deenbandhu Chotu Ram University of Science & Technology,Murthal

Assistant Professor

References

GSMA Press Release, “One billion new unique mobile subscribers by 2020, finds new GSMAstudy,†Press Release, Mar.2015.

Dubey, A., Vohra, D., Vachhani, K., & Rao, A. (2016, August). Demonstration of vulnerabilities in GSM security with USRP B200 and open-source penetration tools. In Communications (APCC), 2016 22nd Asia-Pacific Conference on (pp. 496-501). IEEE. Chicago

Hiltgen, A., Kramp, T., & Weigold, T. (2006). Secure internet banking authentication. IEEE Security & Privacy, 4(2), 21-29. Chicago

Androulidakis, I., Vlachos, V., & Chaikalis, C. (2015, July). An application free method to locate a mobile phone in a given area without user consent or provider help. In Information and Digital Technologies (IDT), 2015 International Conference on (pp. 11-15). IEEE.Chicago

Phone number lookup online free

phonenumber-lookup.info - http://phonenumber-lookup.info/

Hadžialić, M., Å krbić, M., Huseinović, K., KoÄan, I., MuÅ¡ović, J., Hebibović, A., & Kasumagić, L. (2014, November). An approach to analyzing the security of GSM network. In Telecommunications Forum Telford (TELFOR), 2014 22nd (pp. 99-102). IEEE.

3GPP. Digital cellular telecommunications system (Phase 2+);Mobile radio interface layer 3 specifications (3GPP TS 04.08 version7.9.1 Release 1998). Tech. rep., 3rd Generation PartnershipProject, 2001. 3GPP TS 04.08 V7.9.1.

J.,ZANG, H., AND BOLOT, J. C. Impact of pagingchannel overloads or attacks on a cellular network. In Proceedings of the 5th ACM workshop on Wireless security (New York, NY, USA, 2006), WiSe ’06, ACM, pp. 75–84.

3GPP. Digital cellular telecommunications system (Phase 2+);Mobile Switching Centre - Base Station system (MSC-BSS) interface;Layer 3 specification (3GPP TS 48.008 version 9.8.0 Release 9). Tech. rep., 3rd Generation Partnership Project, 2012.

3GPP. Digital cellular telecommunications system (Phase 2+);Mobile radio interface layer 3 specification (3GPP TS 04.08 version7.9.1 Release 1998). Tech. rep., 3rd Generation Partnership Project, 2001. 3GPP TS 04.08 V7.9.1.

J. Lackey and S. Makgraf. (2012) Kalibrate README. [Online].Available: https://github.com/steve-m/kalibrate-rtl

WHAT IS ARDUINO?

https://www.arduino.cc/

Download

https://www.wireshark.org/

ptrkrysik/gr-gsm

Ptrkrysik - https://github.com/ptrkrysik/gr-gsm