What is GSM?
What services are offered by GSM?
What are the components of a GSM network?
Where is the long term subscriber key Ki stored?
On the SIM and in the AuC
What are the tasks of the BSC and MSC?
BSC:
- Control multiple BTS
- Manage network resources
- Map radio channel to terrestrial channel
- Perform switching between BTS
MSC:
- Control multiple BSCs
- Route calls in the network
- Manage connections of mobile stations
What is the difference between the VLR and HLR?
VLR:
- Data of all mobile stations currently registered in the network
- Phone number
- IMSI and TMSI
- Location area idenitifier
- Last MSC connected to
- HLR address
- Subscription profile
- Traffic information for billing
HLR:
- Data for each subscriber
- IMSI
- Phone number
- Pre-computed authentication vectors
- Current MSC and VLR
How is the user identified in GSM?
Result: MSC knows IMSI of MS
What is the IMSI and how is it structured?
International Mobile Subscriber Identifier
3 digit country code
2-3 digit mobile network code
9-10 digit mobile subscriber identification number
What is an GSM authentication vector?
Requested by HLR from AuC, stored in HLR
How is authentication and key agreement handled in GSM?
How is traffic encrypted in GSM?
How is a handover done in GSM ?
What are the main vulnerabilities of GSM?
How does an IMSI catcher work in GSM?
The attacker pretends to be BTS of the home network and requests the IMSI from the MS
How does network impersonation work in GSM?
The attacker impersonates a real BTS by selecting A5/0 encryption and choosing a random RAND. After the AKA the attacker can forward the traffic and eavesdrop, since no encryption is used.
This requires the attacker to have impersonate a real MSC to the GSM network
What attacks against A5 algorithms are known?
How is network impersonation combined with broken encryption used in GSM?
How is an bidding down attack done in GSM?
The attacker intercepts the initial cipher capabilities message and sends an A5/0 only message to the BTS. The MSC selects A5/0 after the AKA.
How do handovers affect the security in GSM?
Since the same key Kc is passed on at handover, a single BTS with a broken A5/x algorithm is enough to break Kc