A Denial of Service Attack to UMTS Networks Using SIM-Less Devices. IEEE Transactions on Dependable and Secure Computing, 11(3):280–291, May, 2014.
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices [link]Paper  doi  abstract   bibtex   
One of the fundamental security elements in cellular networks is the authentication procedure performed by means of the Subscriber Identity Module that is required to grant access to network services and hence protect the network from unauthorized usage. Nonetheless, in this work we present a new kind of denial of service attack based on properly crafted SIM-less devices that, without any kind of authentication and by exploiting some specific features and performance bottlenecks of the UMTS network attachment process, are potentially capable of introducing significant service degradation up to disrupting large sections of the cellular network coverage. The knowledge of this attack can be exploited by several applications both in security and in network equipment manufacturing sectors.
@article{noauthor_denial_2014,
	title = {A {Denial} of {Service} {Attack} to {UMTS} {Networks} {Using} {SIM}-{Less} {Devices}},
	volume = {11},
	issn = {1545-5971},
	url = {http://ieeexplore.ieee.org/document/6782287/},
	doi = {10.1109/TDSC.2014.2315198},
	abstract = {One of the fundamental security elements in cellular networks is the authentication procedure performed by means of the Subscriber Identity Module that is required to grant access to network services and hence protect the network from unauthorized usage. Nonetheless, in this work we present a new kind of denial of service attack based on properly crafted SIM-less devices that, without any kind of authentication and by exploiting some specific features and performance bottlenecks of the UMTS network attachment process, are potentially capable of introducing significant service degradation up to disrupting large sections of the cellular network coverage. The knowledge of this attack can be exploited by several applications both in security and in network equipment manufacturing sectors.},
	language = {en},
	number = {3},
	urldate = {2020-05-20},
	journal = {IEEE Transactions on Dependable and Secure Computing},
	month = may,
	year = {2014},
	pages = {280--291}
}

Downloads: 0