scholarly journals YAICD: Yet Another IMSI Catcher Detector in GSM

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Parimah Ziayi ◽  
Seyed Mostafa Farmanbar ◽  
Mohsen Rezvani

In GSM, the network is not authenticated which allows for man-in-the-middle (MITM) attacks. Attackers can track traffic and trace users of cellular networks by creating a rogue base transceiver station (BTS). Such a defect in addition to the need for backward compatibility of mobile networks makes all GSM, UMTS, and LTE networks susceptible to MITMs. These attacks are conducted using IMSI-Catchers (ICs). Most of the solutions proposed for detecting ICs in the literature are based on using specific mobile devices with root access. Also, they cannot identify ICs to which users are not connected. In this paper, we propose an approach called YAICD for detecting ICs in the GSM network. YAICD consists of a sensor that can be installed on Android mobile devices. It detects ICs by extracting 15 parameters from signals received from BTSs. We also established a lab-scale testbed to evaluate YAICD for various detection parameters and for comparing it against existing solutions in the literature. The experimental results show that YAICD not only successfully detects ICs using the parameters but also identifies ICs to which users are not yet connected to the network.

Author(s):  
Adel Agamy ◽  
Ahmed M. Mohamed

Modern mobile internet networks are becoming heavier and denser. Also it is not regularly planned, and becoming more heterogeneous. The explosive growth in the usage of smartphones poses numerous challenges for LTE cellular networks design and implementation. The performance of LTE networks with bursty and self-similar traffic has become a major challenge. Accurate modeling of the data generated by each connected wireless device is important for properly investigating the performance of LTE networks. This paper presents a mathematical model for LTE networks using queuing theory considering the influence of various application types. Using sporadic source traffic feeding to the queue of the evolved node B and with the exponential service time assumption, we construct a queuing model to estimate the performance of LTE networks. We use the performance model presented in this paper to study the influence of various application categories on the performance of LTE cellular networks. Also we validate our model with simulation using NS3 simulator with different scenarios.


2021 ◽  
Author(s):  
Deniss Brodņevs

The Thesis is concerned with assessing the suitability of LTE (4G) cellular networks for the remote control of low-flying UAVs. To solve this problem, an approach to the analysis of the delay values in cellular networks has been developed, which makes it possible to estimate the delays of individual cells and overall cellular network. Requirements for delays in the UAV control channel were developed, conclusions were drawn about the suitability of the LTE network as a communication solution for the UAV remote control. A method for calculating the effect of parallel redundancy is proposed, and an experimental assessment of the possibility of using two existing solutions for parallel redundancy in LTE networks is carried out. In addition, a compact technical solution for analyzing the level of base station signals was demonstrated.


2019 ◽  
Vol 2019 ◽  
pp. 1-10
Author(s):  
Chuan Yu ◽  
Shuhui Chen ◽  
Zhiping Cai

Phone number is a unique identity code of a mobile subscriber, which plays a more important role in the mobile social network life than another identification number IMSI. Unlike the IMSI, a mobile device never transmits its own phone number to the network side in the radio. However, the mobile network may send a user’s phone number to another mobile terminal when this user initiating a call or SMS service. Based on the above facts, with the help of an IMSI catcher and 2G man-in-the-middle attack, this paper implemented a practicable and effective phone number catcher prototype targeting at LTE mobile phones. We caught the LTE user’s phone number within a few seconds after the device camped on our rogue station. This paper intends to verify that mobile privacy is also quite vulnerable even in LTE networks as long as the legacy GSM still exists. Moreover, we demonstrated that anyone with basic programming skills and the knowledge of GSM/LTE specifications can easily build a phone number catcher using SDR tools and commercial off-the-shelf devices. Hence, we hope the operators worldwide can completely disable the GSM mobile networks in the areas covered by 3G and 4G networks as soon as possible to reduce the possibility of attacks on higher-generation cellular networks. Several potential countermeasures are also discussed to temporarily or permanently defend the attack.


Author(s):  
Naglaa Kamel Bahgaat ◽  
Nariman Abdel Salam ◽  
Monika Mady Roshdy ◽  
Sandy Abd Elrasheed Sakr

Rapid growth in mobile networks and the increase of the number of cellular base stations requires more energy sources, but the traditional sources of energy cause pollution and environmental problems. Therefore, modern facilities tend to use renewable energy sources instead of traditional sources. One renewable source is the photovoltaic panel, which made from semiconductor materials which absorb sunlight to generate electricity. This article discusses the importance of using solar panels to produce energy for mobile stations and also a solution to some environmental problems such as pollution. This article provides a design for a solar-power plant to feed the mobile station. Also, in this article is a prediction of all loads, the power consumed, the number of solar panels used, and solar batteries can be used to store electrical energy. Finally, an estimation of the costs of all components will be presented. Good discussion and conclusion will be presented about the results obtained. The results obtained are promising. In addition, a future plan is described to complete this important study.


2017 ◽  
Vol 11 (5) ◽  
pp. 1101-1114 ◽  
Author(s):  
Jingyu Zhang ◽  
Zhi-Jie Wang ◽  
Zhe Quan ◽  
Jian Yin ◽  
Yuanyi Chen ◽  
...  

2018 ◽  
Vol 30 (3) ◽  
pp. 438-444
Author(s):  
Jomah Alzoubi ◽  
Shadi A Alboon ◽  
Amin Alqudah

In the last decade, the applications of nano- and micro-technology are widely used in many fields. In the modern mobile devices, such as digital cameras, there is an increased demand to achieve fast and precise positioning for some parts such as the recording sensor. Therefore, a smart material (piezoelectric) is used to achieve this requirement. This article discusses the feed-forward control for a piezoelectric actuator using differential flatness approach. The differential flatness approach is used to calculate the required voltage to control the piezoelectric actuator movement. The control voltage will be applied to the real actuator. The simulation and experimental results are compared for the actuator. The aim of this article is to verify the feed-forward control for second eigenfrequency using the differential flatness approach for the piezoelectric actuator.


2011 ◽  
Vol 1 (1) ◽  
pp. 41-53 ◽  
Author(s):  
Fudong Li ◽  
Nathan Clarke ◽  
Maria Papadaki ◽  
Paul Dowland

Mobile devices have become essential to modern society; however, as their popularity has grown, so has the requirement to ensure devices remain secure. This paper proposes a behaviour-based profiling technique using a mobile user’s application usage to detect abnormal activities. Through operating transparently to the user, the approach offers significant advantages over traditional point-of-entry authentication and can provide continuous protection. The experiment employed the MIT Reality dataset and a total of 45,529 log entries. Four experiments were devised based on an application-level dataset containing the general application; two application-specific datasets combined with telephony and text message data; and a combined dataset that included both application-level and application-specific. Based on the experiments, a user’s profile was built using either static or dynamic profiles and the best experimental results for the application-level applications, telephone, text message, and multi-instance applications were an EER (Equal Error Rate) of 13.5%, 5.4%, 2.2%, and 10%, respectively.


2015 ◽  
Vol 2015 ◽  
pp. 1-18 ◽  
Author(s):  
Na Yu ◽  
Qi Han

Sensor-equipped mobile devices have allowed users to participate in various social networking services. We focus on proximity-based mobile social networking environments where users can share information obtained from different places via their mobile devices when they are in proximity. Since people are more likely to share information if they can benefit from the sharing or if they think the information is of interest to others, there might exist community structures where users who share information more often are grouped together. Communities in proximity-based mobile networks represent social groups where connections are built when people are in proximity. We consider information influence (i.e., specify who shares information with whom) as the connection and the space and time related to the shared information as the contexts. To model the potential information influences, we construct an influence graph by integrating the space and time contexts into the proximity-based contacts of mobile users. Further, we propose a two-phase strategy to detect and track context-aware communities based on the influence graph and show how the context-aware community structure improves the performance of two types of mobile social applications.


2021 ◽  
Vol 20 ◽  
pp. 15-24
Author(s):  
Taha Ahmadi ◽  
Hernández Cristian ◽  
Cubillos Neil

This article presents a review of the most relevant manual techniques and technologies developed from the field of artificial vision aimed at identifying biomechanical alterations. The purpose is to describe the most important aspects of each technology, focused on the description of each of its stages and experimental results, which suggest the integration of mobile devices with artificial vision techniques, in addition to the different computer programs used for such end. Finally, the results showed that the identification of the crook index for alterations in posture turns out to be a technique currently used by most specialists. The great challenge is to develop portable devices through mobile applications that allow the detection of the corvo index and the barometric analysis, as well as for other types of applications that depend on visual analysis by experts.


Author(s):  
Mark Bilandzic ◽  
Marcus Foth

The increasing ubiquity of location and context-aware mobile devices and applications, geographic information systems (GIS) and sophisticated 3D representations of the physical world accessible by lay users is enabling more people to use and manipulate information relevant to their current surroundings (Scharl & Tochtermann, 2007). The relationship between users, their current geographic location and their devices are summarised by the term “mobile spatial interaction” (MSI), and stands for the emerging opportunities and affordances that location sensitive and Internet capable devices provide to its users. The first major academic event which coined the term in its current usage was a workshop on MSI (see http://msi.ftw.at/) at the CHI 2007 (Fröhlich et al., 2007). Mobile spatial interaction is grounded in a number of technologies that recently started to converge. First, the development of mobile networks and mobile Internet technologies enables people to request and exchange specific information from anywhere at anytime. Using their handheld devices people can, for example, check the latest news, request recent stock exchange values or communicate via mobile instant messaging. The second enabler is global positioning technology. Mobile devices with integrated Global Positioning System (GPS) receivers—soon to be joined by the Russian Global Navigation Satellite System (GLONASS) and the European Galileo system—are aware of their current latitude and longitude coordinates and can use this data as value added information for context-aware services, that is, mobile applications that refer to information relevant to the current location of the user. A possible use scenario for such an information request would be, for example, “find all clubs and pubs in a radius of 500 meters from my current position.” The focus of this work is to enrich the opportunities given by such location aware services with selected Web 2.0 design paradigms (Beer & Burrows, 2007; Kolbitsch & Maurer, 2006) toward mobile social networking services that are bound to specific physical places. User participation, folksonomy and geotagging are three design methods that have become popular in Web 2.0 community-platforms and proven to be effective information management tools for various domains (Casey & Savastinuk, 2007; Courtney, 2007; Macgregor & McCulloch, 2006). Applying such a design approach for a mobile information system creates a new experience of collaboration between mobile users, a step toward what Jaokar refers to as the Mobile Web 2.0 (Jaokar & Fish, 2006), that is, a chance for mediated social navigation in physical spaces.


Sign in / Sign up

Export Citation Format

Share Document