Date of Publication :7th July 2016
Abstract: With this era of mass surveillance & cybercrimes, large number of attacks is conducted by government agencies and evil hackers on mobile users. Recent report in the media revealed that one of the major government surveillance agencies is collecting bulk information from the mobile traffic. The attacks are serious because SS7, despite its age, remains the main signaling protocol in the mobile networks and will still long be required for interoperability and background compatibility in international roaming. SS7 is vulnerable to large number of attacks based on number of platforms and factors. Some of them are considered in this research paper.
Reference :
-
- A.&. G. B. Soltani, "New documents show how the NSA infers relationships based on mobile location data.," Washington Post, [Online]. Available: http://wapo.st/1hrSi9F.
- G. Association, "The Mobile Economy 2015," [Online]. Available: http://bit.ly/1Gh19cQ.
- "Telecommunications Act of 1996," US government Publication Office, Public Law 104-104 section 301, 104th Congress, 1996.
- "Telecommunications Act of 1996," Federal Communications Corp, 1996. [Online]. Available: https://transition.fcc.gov/telecom.html.
- "ETSI TR 101.943: Lawful Interception (LI); Concepts of Interception in a Generic Network Architecture," European Telecommunications Standards Institute.
- Y.-C. Hu and H. J. Wang, "A framework for location privacy in wireless networks," inACM SIGCOMM Asia Workshop, 2005.
- 3GPP, "3GPP TS 33.102: 3G security; Security architecture," 3rd Generation Security Project. [8] T. Aura, Lecture notes: Network Security- GSM and 3G Security, Aalto University, 2010.
- 3GPP, "3GPP TS 23.040: Technical realization of the Short Message Service (SMS)," 3rd Geneartion Partnership Project.
- World Bank, "Information and Communications for Development 2012: Maximizing Mobile," World Bank, Washington, DC., 2012.
- Phone Theft in Europe: What Really Happens When Your Phone Gets Grabbed," Lookout, Inc, May 2014. [Online]. Available: https://www.lookout.com/resources/reports/phone-theft-inUK.
- The secret world of stolen smartphones, where business is booming," Wired.com, December 2014. [Online]. Available: http://www.wired.com/2014/12/wherestolen-smart-phones-go
- 3GPP, "3GPP TS 33.204: 3G Security; Network Domain Security (NDS); Transaction Capabilities Application Part (TCAP) user security," 3rd Generation Partnership Project.
- Informit.com, Signaling System No. 7 | SCCP Routing Control (SCRC) | InformIT.
- SR Labs, "SnoopSnitch," Security Research Lab.
- S. Udar and R. Borgaonkar, "Understanding IMSI Privacy," Blackhat USA 2014.