Publikasjoner og ansvarsområder
Anatomy of Commercial IMSI Catchers and Detectors
IMSI catchers threaten the privacy of mobile phone users by identi- fying and tracking them. Commercial IMSI catcher products exploit vulnerabilities in cellular network security standards to lure nearby mobile devices. Commercial IMSI catcher’s technical capabilities and operational details are sti...
Privacy Risks in 5G Networks
5G Security & Challenges
New vulnerabilities in 4G and 5G cellular access network protocols : exposing device capabilities
Cellular devices support various technical features and services for 2G, 3G, 4G and upcoming 5G networks. For example, these tech- nical features contain physical layer throughput categories, radio protocol information, security algorithm, carrier aggregation bands and type of services such as GSM-R...
New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols
Mobile communications are used by more than two-thirds of the world population who expect security and privacy guarantees. The 3rd Generation Partnership Project (3GPP) responsible for the worldwide standardization of mobile communication has designed and mandated the use of the AKA protocol to prot...
On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks
Mobile network operators choose Self Organizing Network (SON) concept as a cost-effective method to deploy LTE/4G networks and meet user expectations for high quality of service and bandwidth. The main objective of SON is to introduce automation into network management activities and reduce human in...