The Global Systems for Mobile communications (GSM) is the most widespread mobile communication technology existing nowadays. Despite being a mature technology, its introduction dates back to the late eighties, it suffers from several security vulnerabilities, which have been targeted by many attacks aimed to break the underlying communication protocol. Most of these attacks focuses on the A5/1 algorithm used to protect over-the-air communication between the two parties of a phone call. This algorithm has been superseded by new and more secure algorithms. However, it is still in use in the GSM networks as a fallback option, thus still putting at risk the security of the GSM based conversations. The objective of this work is to review some of the most relevant results in this field and discuss their practical feasibility. To this end, we consider not only the contributions coming from the canonical scientific literature but also those that have been proposed in a more informal context, such as during hacker conferences. © 2013 Springer-Verlag.

A review of security attacks on the GSM standard / Giuseppe, Cattaneo; G., De Maio; Giancarlo, Maio; Pompeo, Faruolo; FERRARO PETRILLO, Umberto; Umberto Ferraro, Petrillo. - STAMPA. - 7804 LNCS:(2013), pp. 507-512. (Intervento presentato al convegno International Conference on Information and Communication Technology, ICT-EurAsia 2013 tenutosi a Yogyakarta; Indonesia nel 25 March 2013 through 29 March 2013) [10.1007/978-3-642-36818-9_58].

A review of security attacks on the GSM standard

FERRARO PETRILLO, UMBERTO;
2013

Abstract

The Global Systems for Mobile communications (GSM) is the most widespread mobile communication technology existing nowadays. Despite being a mature technology, its introduction dates back to the late eighties, it suffers from several security vulnerabilities, which have been targeted by many attacks aimed to break the underlying communication protocol. Most of these attacks focuses on the A5/1 algorithm used to protect over-the-air communication between the two parties of a phone call. This algorithm has been superseded by new and more secure algorithms. However, it is still in use in the GSM networks as a fallback option, thus still putting at risk the security of the GSM based conversations. The objective of this work is to review some of the most relevant results in this field and discuss their practical feasibility. To this end, we consider not only the contributions coming from the canonical scientific literature but also those that have been proposed in a more informal context, such as during hacker conferences. © 2013 Springer-Verlag.
2013
International Conference on Information and Communication Technology, ICT-EurAsia 2013
mobile security; encryption; security attacks; gsm
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
A review of security attacks on the GSM standard / Giuseppe, Cattaneo; G., De Maio; Giancarlo, Maio; Pompeo, Faruolo; FERRARO PETRILLO, Umberto; Umberto Ferraro, Petrillo. - STAMPA. - 7804 LNCS:(2013), pp. 507-512. (Intervento presentato al convegno International Conference on Information and Communication Technology, ICT-EurAsia 2013 tenutosi a Yogyakarta; Indonesia nel 25 March 2013 through 29 March 2013) [10.1007/978-3-642-36818-9_58].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/530728
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 12
  • ???jsp.display-item.citation.isi??? 10
social impact