Skip to main content

Vulnerabilities and Possible Attacks Against the GPRS Backbone Network

  • Conference paper
Critical Information Infrastructures Security (CRITIS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4347))

Abstract

This paper presents the security weaknesses and the possible attacks, which threaten the GPRS backbone network and the data that either reside at the network or are transferred through it. These attacks may be performed by malicious third parties, mobile users, network operators or network operator personnel, which exploit the weaknesses of the employed technology and the security measures applied to the GPRS backbone. The possible attacks against the GPRS backbone may result in the compromise of end-users security, the users over billing, the disclosure or alteration of critical information, the services unavailability, the network breakdown, etc. The analyzed attacks and their consequences increase the risks associated with the usage of GPRS, and, thus, influence its deployment that realizes the concept of the mobile Internet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 3GPP TS 03.6 (V7.9.0), GPRS Service Description, Stage 2 (September 2002)

    Google Scholar 

  2. Pagliusi, P.: A Contemporary Foreword on GSM Security. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol. 2437, pp. 129–144. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  3. Mitchell, C.: The security of the GSM air Interface protocol. Technical Report, Royal Holloway University of London (August 2001), http://www.ma.rhul.ac.uk/techreports/

  4. 3GPP TS 09.60 (V7.10.0), GPRS Tunneling Protocol (GTP) across the Gn and Gp Interface (December 2002)

    Google Scholar 

  5. 3GPP TS 09.02 (v7.15.0) Mobile Application Part (MAP) specification (March 2004)

    Google Scholar 

  6. Srisuresh, P., Holdrege, M.: IP Network Address Translator (NAT) Terminology and Considerations. RFC 2663 (August 1999)

    Google Scholar 

  7. Gleeson, B., Lin, A., Heinanen, J., Armitage, G., Malis, A.: A Framework for IP Based Virtual Private Networks. RFC 2764 (February 2000)

    Google Scholar 

  8. Xenakis, C., Merakos, L.: Security in third Generation Mobile Networks. Computer Communications 27(7), 638–650 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xenakis, C., Merakos, L. (2006). Vulnerabilities and Possible Attacks Against the GPRS Backbone Network. In: Lopez, J. (eds) Critical Information Infrastructures Security. CRITIS 2006. Lecture Notes in Computer Science, vol 4347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11962977_21

Download citation

  • DOI: https://doi.org/10.1007/11962977_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69083-2

  • Online ISBN: 978-3-540-69084-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics