Dr. Deepak Tyagi,
Singhania University
3G Security Threats
1. Abstract
The aim of the research was to study the 3G (third generation) wireless networks security threats. From the data gathered through observations and literature review, security threats that may be possible in 3G mobile networks were identified and the methods which may be used to minimize such security threats in networks were determined. Recommendations are given to minimize the security threats 3G networks.
2. Introduction
3G or 3rd generation is technology for mobile network is based on the IMT-2000 standards according to specification by International Telecommunication Union (ITU). It helps users in getting greater network capacity through improved spectrum efficiency like video conference support, IPTV (TV through the internet), broadband wireless data, music downloads, receiving streaming video from the Web, sending and receiving faxes, instantly downloading e-mail messages with attachments etc. 3G networks have potential transfer speeds of up to 3 Mbps (it takes around 15 seconds to download a 3-minute MP3 song).
They are intended to provide a global mobility. In 1998 Third Generation Partnership Project (3GPP) was formed for the technical specification work. 3G is a set of technologies and standards that include W-CDMA, WLAN and cellular radio, among others. Figure below shows the UMTS network and its elements:
3. 3G Mobile network are more vulnerable now:
• IMSI is sent in clear-text when allocating TMSI to the user
• 3G mobile network is based on Internet Protocol (IP) which provide high speed wireless connection, allowing user to do more things while connected.
• Evolving of network with IMS, enable interconnected networks running on IP.
• A user can be lured to camp on a false BS. Once the user camps on the radio channels of a false BS, the user is out of reach of the paging signals of SN
• Hijacking outgoing/incoming
References: 9. Hacker Penetrates T-Mobile Systems, SecurityFocus Online, January 11, 2005 (http://www.securityfocus.com/news/10271) 10 11. Mobile Malware Evolution: An Overview, Part 2, Kaspersky Labs, October 10, 2006, Alexander Gostev, Senior Virus Analyst.