登录
aliaskari
注册时间:
2017-11-30 15:41:32
Ta的资源
IMSI Catcher.zip
In this paper, The authors will discuss the proceeding of this device and the necessary conditions in detail (see Chapter 4). Chapters 2 and 3 will obtain the background knowledge of the network standards GSM and UMTS, which we will need for comprehension. The conclusion is given in Chapter 5.
开发工具:LINUX
大小:401KB
2017-11-30 16:06:26上传
UMTS.zip
Technological and security enhancements in third generation (3G) architecture led to the development of the fourth generation (4G) technology. 4G is developed and standardized by the 3GPP which is a fully IP based topology and also referred to as the future communication technology. 3GPP provided LTE (Long Term Evolution) usually referred to as the standard for fourth generation telecommunications. This paper reviews the core architecture of the 4G network and also reviews the Authentication and key agreement (AKA) protocol as the access mechanism to a 4G network which shows the strong security aspects of the fourth generation technology.
开发工具:LINUX
大小:253KB
2017-11-30 16:04:21上传
Rahnema.zip
Global system for mobile telecommunication (GSM) comprises the CEPT-defined standardization of the services, functional/subsystem interfaces, and protocol architecture, based on the use of worldwide standards produced by CCITT and CCIR, for a pan- European digital land mobile system primarily intended to serve users in motor vehicles. The digital mobile radio networks, for which GSM represents the European standards, provide powerful message signaling capabilities that facilitate and enhance roaming, compared to the first generation analogue systems, through automatic network location detection and registration.
开发工具:LINUX
大小:72KB
2017-11-30 15:55:00上传
A Man-in-the-Middle Attack on UMTS.zip
a paper about UMTS, In this paper authors present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows an intruder to impersonate a valid GSM base station to a UMTS subscriber regardless of the fact that UMTS authentication and key agreement are used. As a result, an intruder can eavesdrop on all mobile-station-initiated traffic
开发工具:LINUX
大小:95KB
2017-11-30 15:47:50上传
1
前往
页