A survey of threats and security measures for data transmission over GSM/UMTS networks

This paper presents findings of a threat analysis of data transmission over GSM/UMTS networks. We explore typical threats of mobile data transmission and describe their possible consequences related to security objectives like confidentiality, availability, and integrity. Furthermore, we develop a catalog of technical and organizational security measures and consider which threats can be prevented or mitigated by these measures.

[1]  Frank Swiderski,et al.  Threat Modeling , 2018, Hacking Connected Cars.

[2]  Rajeev Shorey,et al.  Mobile, Wireless and Sensor Networks: Technology, Applications and Future Directions , 2005 .

[3]  Farnam Jahanian,et al.  When mobile is harder than fixed (and vice versa): demystifying security challenges in mobile environments , 2010, HotMobile '10.

[4]  Tobias Martin,et al.  Security Mechanisms in UMTS , 2001, Datenschutz und Datensicherheit.

[5]  Lei Liu,et al.  Exploitation and threat analysis of open mobile devices , 2009, ANCS '09.

[6]  Ulrike Meyer,et al.  A man-in-the-middle attack on UMTS , 2004, WiSe '04.

[7]  Thomas Peltier,et al.  Information Security Risk Analysis: A Pedagogic Model Based on a Teaching Hospital , 2006 .

[8]  Safwan El Assad,et al.  UMTS security: Enhancement of identification, authentication and key agreement protocols , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[9]  Martin Raepple Sicherheitskonzepte für das Internet - Grundlagen, Technologien und Lösungskonzepte für die kommerzielle Nutzung , 1998 .

[10]  Sebastian Frosch,et al.  Maßnahmen zur Sicherung von Datenübertragungen in GSM-/UMTS-Mobilfunknetzen , 2011 .

[11]  A. Bais,et al.  Evaluation of UMTS security architecture and services , 2006, 2006 4th IEEE International Conference on Industrial Informatics.

[12]  Ronald D. Williams,et al.  Taxonomies of attacks and vulnerabilities in computer systems , 2008, IEEE Communications Surveys & Tutorials.

[13]  Felix C. Freiling,et al.  Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices , 2011, 2011 IEEE Symposium on Security and Privacy.

[14]  Jie Wang Computer Network Security: Theory and Practice , 2008 .

[15]  Vladimir Cretu,et al.  Threats and Countermeasures in GSM Networks , 2006, J. Networks.