A Taxonomy of Cyber Attacks on 3G Networks

Early first and second generation (1G and 2G, respectively) wireless telecommunication networks were isolated in the sense that their signaling and control infrastructure was not directly accessible to end subscribers. The vision of the next generation 3G wireless telecommunication network is to use IP technologies for control and transport. The introduction of IP technologies has opened up a new generation of IP-based services that must interwork with traditional 3G wireless telecommunication networks. Cross Network Services will use a combination of Internet-based data and data from the wireless telecommunication network to provide services to the wireless subscriber. They will be multi-vendor, multi-domain, and will cater to a wide variety of needs. An example of such a Cross Network Service is the Email Based Call Forwarding Service (CFS), where the status of the subscriber's email inbox is used to trigger call forwarding in the wireless telecommunication network.

[1]  Tyler Moore,et al.  Signaling system 7 (SS7) network security , 2002, The 2002 45th Midwest Symposium on Circuits and Systems, 2002. MWSCAS-2002..

[2]  Scott D. Lathrop,et al.  Wireless security threat taxonomy , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[3]  M. Walker,et al.  Towards a coherent approach to third generation system security , 2001 .

[4]  Charles R. Hudson,et al.  Wireless Security , 2007, Information Security Management Handbook, 6th ed..

[5]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[6]  C. Clissmann,et al.  Security for mobile users of telecommunication services , 1994, Proceedings of 1994 3rd IEEE International Conference on Universal Personal Communications.

[7]  Pankaj Rohatgi,et al.  Partitioning attacks: or how to rapidly clone some GSM cards , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[8]  C. B. Brookson Security in current systems , 1995 .

[9]  Hank M. Kluepfel Securing a global village and its resources: baseline security for interconnected signaling system #7 telecommunications networks , 1993, CCS '93.

[10]  Upkar Varshney,et al.  Reliability and Survivability of Wireless and Mobile Networks , 2000, Computer.

[11]  Tyler Moore,et al.  Securing SS7 Telecommunications Networks , 2001 .

[12]  G. Manimaran,et al.  Internet infrastructure security: a taxonomy , 2002, IEEE Netw..

[13]  Vaduvur Bharghavan,et al.  Security issues in mobile communications , 1995, Proceedings ISADS 95. Second International Symposium on Autonomous Decentralized Systems.

[14]  Jan C. A. van der Lubbe,et al.  Basic Methods of Cryptography , 1998 .

[15]  Chi-Chun Lo,et al.  Secure communication mechanisms for GSM networks , 1999, IEEE Trans. Consumer Electron..

[16]  Valtteri Niemi,et al.  UMTS security , 2003 .

[17]  Jaesheung Shin,et al.  Mobility management alternatives for migration to mobile Internet session-based services , 2004, IEEE Journal on Selected Areas in Communications.

[18]  H. M. Kluepfel Securing a global village and its resources: Baseline security for interconnected Signaling System #7 telecommunications networks , 1993, 1993 Proceedings of IEEE International Carnahan Conference on Security Technology.

[19]  Nawal A. El-Fishway,et al.  An improvement on secure communication in PCS , 2003, Conference Proceedings of the 2003 IEEE International Performance, Computing, and Communications Conference, 2003..