首页> 外文会议>2013 ASE/IEEE International Conference on Social Computing >GSM OTA SIM Cloning Attack and Cloning Resistance in EAP-SIM and USIM
【24h】

GSM OTA SIM Cloning Attack and Cloning Resistance in EAP-SIM and USIM

机译:EAP-SIM和USIM中的GSM OTA SIM克隆攻击和抗克隆性

获取原文
获取原文并翻译 | 示例

摘要

Global System for Mobile communications (GSM) is the most popular telecommunication protocol used in telecommunication networks. The GSM protocol has weaknesses in the security of its unique identifiers which makes possible cloning in various circumstances. This paper will show, by comparison with physical cloning attacks, how an attacker can perform SIM (Subscriber Identity Module) cloning over the air by exploiting weaknesses in standard GSM communication. This paper will describe the requirements and process of over the air (OTA) cloning, including the process of obtaining the ICCID (Integrated Circuit Card Identifier). In addition, this paper will show how EAP-SIM (Extensible Authentication Protocol for GSM SIM) and USIM (Universal Subscriber Identity Module) are more secure from cloning than GSM, and under what circumstances they remain vulnerable to cloning. As a base for comparison this paper will also describe physical cloning.
机译:全球移动通信系统(GSM)是电信网络中使用最广泛的电信协议。 GSM协议在其唯一标识符的安全性方面存在弱点,这使得在各种情况下进行克隆成为可能。通过与物理克隆攻击进行比较,本文将展示攻击者如何利用标准GSM通信中的弱点通过空中执行SIM(用户身份模块)克隆。本文将描述空中(OTA)克隆的要求和过程,包括获得ICCID(集成电路卡标识符)的过程。此外,本文还将说明EAP-SIM(GSM SIM的可扩展身份验证协议)和USIM(通用订户身份模块)如何比GSM更安全地进行克隆,以及在什么情况下它们仍然易于克隆。作为比较的基础,本文还将介绍物理克隆。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号