Abstract
This paper presents the security weaknesses and the possible attacks, which threaten the GPRS backbone network and the data that either reside at the network or are transferred through it. These attacks may be performed by malicious third parties, mobile users, network operators or network operator personnel, which exploit the weaknesses of the employed technology and the security measures applied to the GPRS backbone. The possible attacks against the GPRS backbone may result in the compromise of end-users security, the users over billing, the disclosure or alteration of critical information, the services unavailability, the network breakdown, etc. The analyzed attacks and their consequences increase the risks associated with the usage of GPRS, and, thus, influence its deployment that realizes the concept of the mobile Internet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
3GPP TS 03.6 (V7.9.0), GPRS Service Description, Stage 2 (September 2002)
Pagliusi, P.: A Contemporary Foreword on GSM Security. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol. 2437, pp. 129–144. Springer, Heidelberg (2002)
Mitchell, C.: The security of the GSM air Interface protocol. Technical Report, Royal Holloway University of London (August 2001), http://www.ma.rhul.ac.uk/techreports/
3GPP TS 09.60 (V7.10.0), GPRS Tunneling Protocol (GTP) across the Gn and Gp Interface (December 2002)
3GPP TS 09.02 (v7.15.0) Mobile Application Part (MAP) specification (March 2004)
Srisuresh, P., Holdrege, M.: IP Network Address Translator (NAT) Terminology and Considerations. RFC 2663 (August 1999)
Gleeson, B., Lin, A., Heinanen, J., Armitage, G., Malis, A.: A Framework for IP Based Virtual Private Networks. RFC 2764 (February 2000)
Xenakis, C., Merakos, L.: Security in third Generation Mobile Networks. Computer Communications 27(7), 638–650 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xenakis, C., Merakos, L. (2006). Vulnerabilities and Possible Attacks Against the GPRS Backbone Network. In: Lopez, J. (eds) Critical Information Infrastructures Security. CRITIS 2006. Lecture Notes in Computer Science, vol 4347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11962977_21
Download citation
DOI: https://doi.org/10.1007/11962977_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69083-2
Online ISBN: 978-3-540-69084-9
eBook Packages: Computer ScienceComputer Science (R0)