Flash Programming Microcontrollers over the GSM Network

Author(s):  
Lubomir Bogdanov ◽  
Hristo Mitrev
Keyword(s):  
2016 ◽  
Vol 76 ◽  
pp. 02036
Author(s):  
Martin Pospisilik ◽  
Tomas Smekal ◽  
Milan Adamek ◽  
Petr Neumann ◽  
Tomas Dulik
Keyword(s):  

2012 ◽  
Vol 38 (11) ◽  
pp. 3249-3257 ◽  
Author(s):  
Adnan Rashdi ◽  
Rafia Malik ◽  
Sanam Rashid ◽  
Anam Ajmal ◽  
Sulaiman Sadiq

Author(s):  
G. Rajesh ◽  
T. Ramakrishnan ◽  
S. Shreevignesh ◽  
B. Vinayagasundaram ◽  
X. Mercilin Raajini

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Parimah Ziayi ◽  
Seyed Mostafa Farmanbar ◽  
Mohsen Rezvani

In GSM, the network is not authenticated which allows for man-in-the-middle (MITM) attacks. Attackers can track traffic and trace users of cellular networks by creating a rogue base transceiver station (BTS). Such a defect in addition to the need for backward compatibility of mobile networks makes all GSM, UMTS, and LTE networks susceptible to MITMs. These attacks are conducted using IMSI-Catchers (ICs). Most of the solutions proposed for detecting ICs in the literature are based on using specific mobile devices with root access. Also, they cannot identify ICs to which users are not connected. In this paper, we propose an approach called YAICD for detecting ICs in the GSM network. YAICD consists of a sensor that can be installed on Android mobile devices. It detects ICs by extracting 15 parameters from signals received from BTSs. We also established a lab-scale testbed to evaluate YAICD for various detection parameters and for comparing it against existing solutions in the literature. The experimental results show that YAICD not only successfully detects ICs using the parameters but also identifies ICs to which users are not yet connected to the network.


2021 ◽  
pp. 413-421
Author(s):  
Saumya Borwankar ◽  
Rishi Pandya ◽  
Rachna Sharma

Sign in / Sign up

Export Citation Format

Share Document