Debilities of the UMTS Security Mode Set-Up Procedure and Attacks against UMTS/HSPA Device

Debilities of the UMTS Security Mode Set-Up Procedure and Attacks against UMTS/HSPA Device

Diego Fernández Alonso, Ana Vázquez Alejos, Manuel García Sánchez
Copyright: © 2015 |Pages: 45
ISBN13: 9781466686878|ISBN10: 1466686871|EISBN13: 9781466686885
DOI: 10.4018/978-1-4666-8687-8.ch001
Cite Chapter Cite Chapter

MLA

Alonso, Diego Fernández, et al. "Debilities of the UMTS Security Mode Set-Up Procedure and Attacks against UMTS/HSPA Device." Next Generation Wireless Network Security and Privacy, edited by Kamaljit I. Lakhtaria, IGI Global, 2015, pp. 1-45. https://doi.org/10.4018/978-1-4666-8687-8.ch001

APA

Alonso, D. F., Alejos, A. V., & Sánchez, M. G. (2015). Debilities of the UMTS Security Mode Set-Up Procedure and Attacks against UMTS/HSPA Device. In K. Lakhtaria (Ed.), Next Generation Wireless Network Security and Privacy (pp. 1-45). IGI Global. https://doi.org/10.4018/978-1-4666-8687-8.ch001

Chicago

Alonso, Diego Fernández, Ana Vázquez Alejos, and Manuel García Sánchez. "Debilities of the UMTS Security Mode Set-Up Procedure and Attacks against UMTS/HSPA Device." In Next Generation Wireless Network Security and Privacy, edited by Kamaljit I. Lakhtaria, 1-45. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-8687-8.ch001

Export Reference

Mendeley
Favorite

Abstract

A study and identification of vulnerabilities during the set-up procedure of the Universal Mobile Telecommunication System (UMTS) and how some of them can be exploited. For accomplishment a good understanding of the security messages exchange, a part of UMTS architecture is developed firstly. After the explanation of the security mode set-up procedure debilities, the chapter identify attacks that take advantage of the fact that some messages during their exchange in the process are not protected. The attacks indicated in the chapter are mostly of Denial of Service (DoS) kind, and mainly are performed with a rogue BTS.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.