The behavior and performance of a UMTS network are governed by a number of parameter settings that are configured by the network operator, e.g., timeouts. In this letter we show that the actual value of such parameters can be inferred by a conceptually simple set of end-to-end measurements, without any cooperation with the network operator. In principle, such information can be used by researchers to define realistic network scenarios, e.g., for their simulations. Moreover, it can be used by a malicious attacker to fine-tune a large scale attack against the radio access network, e.g., a paging attack.
Description
Welcome to IEEE Xplore 2.0: Discovering Parameter Setting in 3G Networks via Active Measurements
%0 Journal Article
%1 barbuzzi-letter-08
%A Barbuzzi, A.
%A Ricciato, F.
%A Boggia, G.
%D 2008
%J Communications Letters, IEEE
%K 3G UMTS access active attack, attacker, communication, malicious measurements, mobile network network, networks, networks3G operator, paging parameter radio realistic scenarios setting, telecommunication
%N 10
%P 730-732
%R 10.1109/LCOMM.2008.080913
%T Discovering Parameter Setting in 3G Networks via Active Measurements
%V 12
%X The behavior and performance of a UMTS network are governed by a number of parameter settings that are configured by the network operator, e.g., timeouts. In this letter we show that the actual value of such parameters can be inferred by a conceptually simple set of end-to-end measurements, without any cooperation with the network operator. In principle, such information can be used by researchers to define realistic network scenarios, e.g., for their simulations. Moreover, it can be used by a malicious attacker to fine-tune a large scale attack against the radio access network, e.g., a paging attack.
@article{barbuzzi-letter-08,
abstract = {The behavior and performance of a UMTS network are governed by a number of parameter settings that are configured by the network operator, e.g., timeouts. In this letter we show that the actual value of such parameters can be inferred by a conceptually simple set of end-to-end measurements, without any cooperation with the network operator. In principle, such information can be used by researchers to define realistic network scenarios, e.g., for their simulations. Moreover, it can be used by a malicious attacker to fine-tune a large scale attack against the radio access network, e.g., a paging attack.},
added-at = {2009-05-16T00:30:47.000+0200},
author = {Barbuzzi, A. and Ricciato, F. and Boggia, G.},
biburl = {https://www.bibsonomy.org/bibtex/2a1f2683dff752c5073d090f88267a3dd/fabioricciato},
description = {Welcome to IEEE Xplore 2.0: Discovering Parameter Setting in 3G Networks via Active Measurements},
doi = {10.1109/LCOMM.2008.080913},
interhash = {fd4b48bd63cdc7c1143ba098914bee66},
intrahash = {a1f2683dff752c5073d090f88267a3dd},
issn = {1089-7798},
journal = {Communications Letters, IEEE},
keywords = {3G UMTS access active attack, attacker, communication, malicious measurements, mobile network network, networks, networks3G operator, paging parameter radio realistic scenarios setting, telecommunication},
month = {October },
number = 10,
pages = {730-732},
timestamp = {2009-05-16T00:30:47.000+0200},
title = {Discovering Parameter Setting in 3G Networks via Active Measurements},
volume = 12,
year = 2008
}