Security Analysis of Femtocell-Enabled Cellular Network Architecture
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Running a Basic Osmocom GSM Network
Running a basic Osmocom GSM network Harald Welte <[email protected]> What this talk is about Implementing GSM/GPRS network elements as FOSS Applied Protocol Archaeology Doing all of that on top of Linux (in userspace) Running your own Internet-style network use off-the-shelf hardware (x86, Ethernet card) use any random Linux distribution configure Linux kernel TCP/IP network stack enjoy fancy features like netfilter/iproute2/tc use apache/lighttpd/nginx on the server use Firefox/chromium/konqueor/lynx on the client do whatever modification/optimization on any part of the stack Running your own GSM network Until 2009 the situation looked like this: go to Ericsson/Huawei/ZTE/Nokia/Alcatel/… spend lots of time convincing them that you’re an eligible customer spend a six-digit figure for even the most basic full network end up with black boxes you can neither study nor improve WTF? I’ve grown up with FOSS and the Internet. I know a better world. Why no cellular FOSS? both cellular (2G/3G/4G) and TCP/IP/HTTP protocol specs are publicly available for decades. Can you believe it? Internet protocol stacks have lots of FOSS implementations cellular protocol stacks have no FOSS implementations for the first almost 20 years of their existence? it’s the classic conflict classic circuit-switched telco vs. the BBS community ITU-T/OSI/ISO vs. Arpanet and TCP/IP Enter Osmocom In 2008, some people (most present in this room) started to write FOSS for GSM to boldly go where no FOSS hacker has gone before where protocol stacks are deep and acronyms are -
Femtocells and Health This Brochure Has Been Designed to Answer Questions You May Have About Femtocells
Femtocells and Health This brochure has been designed to answer questions you may have about femtocells. We have all read or heard about concerns raised from time to time regarding the safe use of radio waves and wireless communications equipment. The wireless industry takes these concerns seriously and welcomes ongoing research. The consensus of international health authorities today is that there are no established health effects from low power wireless communications devices such as femtocells. What are Femtocells? Femtocells are low-power access points that can combine mobile and Internet technologies within the home. The femtocell unit generates a personal mobile phone signal in the home and connects this to the operator’s network through the Internet. This will allow improved coverage and capacity for each user within their home. Femtocells have an output power less than 0.1 Watt, similar to other What research has wireless home network equipment, been undertaken? and will typically allow up to about 4 simultaneous calls/data sessions Femtocells emit very low at any time. Mobile phones levels of radio waves (also connected to a femtocell will known as radiofrequency (RF) typically operate at levels similar electromagnetic fields) when to other wireless phones used being used. The safety of radio in the home. waves has been extensively studied for more than 50 years. Numerous independent scientific expert panels, health agencies and standard-setting organisations around the world regularly review limits have been established by this large and growing body of the International Commission on research. These organisations Non-Ionizing Radiation Protection have all reached the same general (ICNIRP). -
Anti-Terrorism Authority Under the Laws of the United Kingdom and the United States
Order Code RL33726 CRS Report for Congress Received through the CRS Web Anti-Terrorism Authority Under the Laws of the United Kingdom and the United States September 7, 2006 Clare Feikert Foreign Law Specialist Law Library of Congress Charles Doyle Senior Specialist American Law Division Congressional Research Service ˜ The Library of Congress Anti-Terrorism Authority Under the Laws of the United Kingdom and the United States Summary This is a comparison of the laws of the United Kingdom and of the United States that govern criminal and intelligence investigations of terrorist activities. Both systems rely upon a series of statutory authorizations: in the case of the United States primarily the Foreign Intelligence Surveillance Act and the Electronic Communications Privacy Act; in the case of the United Kingdom, the Regulation of Investigatory Powers Act, the Police Act, the Intelligence Services Act. Among other differences, the U.S. procedures rely more heavily upon judicial involvement and supervision, while those of the UK employ other safeguards. The UK procedures afford greater latitude to arrest, detain and supervise suspected terrorists than those available in the United States. Contents Introduction ......................................................1 Police Stop and Search Powers .......................................3 Police Arrest Powers ...............................................5 Detention of Suspected Terrorists.....................................5 Control Orders....................................................8 -
Femtocell Network Synchronization
180 Chapter 10 Femtocell Network Synchronization Mohammad Hasan International Islamic University Malaysia, Malaysia Rashid A. Saeed International Islamic University Malaysia, Malaysia Aisha A. Hassan International Islamic University Malaysia, Malaysia ABSTRACT Presently, femtocell technology is emerging for cellular wireless networks, which have rapidly en- grossed the cellular industry. The main advantage of femtocell to the mobile operators is a reduction of cost and an improvement of the signal quality in indoor coverage, which is also considered a possible path to the Fixed–Mobile Convergence (FMC) goal. Femtocell extends network coverage and delivers high-quality mobile services inside residential and business buildings through broadband networks (i.e. ADSL). Femtocell Access Points (FAP) or Home Base Stations (HBS) are intended to serve small number of users (i.e. 4 users) and cover about 30-square meters, similar to existing WiFi access points. However, femtocell introduces new challenges to the telecom industries in terms of handoff between femto and microcells, interference management, localization, and synchronization. Among all of these challenges, synchronization is considered as the cornerstone for the femtocells to function properly. The problematic issue in femtocell synchronization is that all the data and control traffic travels through an IP broadband network. The IP broadband network is usually owned and managed by a third party and not by the mobile operator which can complicate the synchronization. Unsynchronized FAPs may cause harmful interference and wrong handover dictions. In this chapter, the authors investigate and overview the current femtocell synchronization techniques and make comparisons between them. Possible improvements and recommendations for each method have been identified. -
Lawful Interception of IP Traffic
LawfulLawful InterceptionInterception ofof IPIP Traffic:Traffic: TheThe EuropeanEuropean ContextContext Jaya Baloo Draft 1 ContentsContents § Introduction to Lawful Interception § Interception of Internet services § Origins in The European Community § The European Interception Legislation in Brief § ETSI § The Dutch TIIT specifications § Interception Suppliers & Discussion of Techniques § Future Developments & Issues IntroductionIntroduction toto LawfulLawful InterceptionInterception § ETSI definition of (lawful) interception: § interception: action (based on the law), performed by an network operator/access provider/service provider (NWO/AP/SvP), of making available certain information and providing that information to a law enforcement monitoring facility. LI Law order Enforcement Network Operator, Agency (LEA) Access Provider or Service Provider Deliver requested Law Enforcement information Monitoring Facility LILIÕÕss RaisonRaison DDÕÕetreetre §§ WhyWhy intercept?intercept? § Terrorism § Pedophilia rings § Cyber stalking § Data theft ÐIndustrial espionage § Drug dealers on the internet §§ WhyWhy not?not? § Privacy § Security LegalLegal IssuesIssues inin LILI § Judge: "Am I not to hear the truth?" Objecting Counsel: "No, Your Lordship is to hear the evidence." § Some characteristics of evidence- relevance to LI § Admissible Ð can evidence be considered in courtÐ *differs per country § Authentic Ð explicitly link data to individuals § Accurate Ð reliability of surveillance process over content of intercept § Complete Ð tells a ÒcompleteÓ story of a particular circumstance § Convincing to juries Ð probative value, and subjective practical test of presentation AdmissibilityAdmissibility ofof SurveillanceSurveillance EvidenceEvidence § Virtual Locus Delecti § Hard to actually find criminals in delicto flagrante § How to handle expert evidence? Juries are not composed of network specialists. Legal not scientific decision making. § Case for treating Intercepted evidence as secondary and not primary evidence § Primary Ð is the best possible evidence Ð e.g. -
Dynamic SLA Negotiation Using Bandwidth Broker for Femtocell Networks
Dynamic SLA Negotiation using Bandwidth Broker for Femtocell Networks Mostafa Zaman Chowdhury*, Sunwoong Choi*, Yeong Min Jang*, Kap-Suk Park**, and Geun Il Yoo** *Kookmin University, Korea **Korea Telecom (KT), Korea *{mzceee, schoi, yjang}@kookmin.ac.k Abstract— Satisfaction level of femtocell users’ depends on the bandwidth. Most of the non-femtocell services are not delay availability of requested bandwidth. But the xDSL line that can sensitive and can be assumed as background traffic whereas be used for the backhauling of femtocell traffic cannot always most of the femtocell services like voice and video calls are provide sufficient bandwidth due to the inequality between the delay sensitive. Thus, the quality of voice and other real- xDSL capacity and demanded bandwidth of home applications time calls degrade significantly as well as users’ satisfaction like, IPTV, PC, Wi-Fi, and others. A Service Level Agreement level also decreases. Limitation of xDSL backhaul capacity (SLA) between xDSL and femtocell operator (mobile operator) can degrade the QoS in terms of packet loss, jitter, delay, to reserve some bandwidth for the upcoming femtocell calls can and throughput. increase the satisfaction level for femtocell users. In this paper we propose a SLA negotiation procedure for femtocell networks. The Bandwidth Broker controls the allocated bandwidth for femtocell users. Then we propose the dynamically reserve bandwidth scheme to increase the femtocell user’s satisfaction level. Finally, we present our simulation results to validate the proposed scheme. Keywords— xDSL, FAP, femtocell, QoS, Bandwidth Broker, SLA, and bandwidth. I. Introduction Home based wireless networks will be the key element to support large demand of multimedia traffics for IMT- Advanced networks. -
Mass Surveillance
Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof. -
Getting Started with Openbts BUILD OPEN SOURCE MOBILE NETWORKS
Compliments of Getting Michael Iedema Started with Foreword by Harvind Samra OpenBTS BUILD OPEN SOURCE MOBILE NETWORKS Getting Started with OpenBTS Michael Iedema Getting Started with OpenBTS by Michael Iedema Copyright © 2015 Range Networks. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://safaribooksonline.com). For more information, contact our corporate/ institutional sales department: 800-998-9938 or [email protected]. Editor: Brian MacDonald Indexer: WordCo Indexing Services Production Editor: Melanie Yarbrough Cover Designer: Karen Montgomery Copyeditor: Lindsy Gamble Interior Designer: David Futato Proofreader: Charles Roumeliotis Illustrator: Rebecca Demarest January 2015: First Edition Revision History for the First Edition: 2015-01-12: First release See http://oreilly.com/catalog/errata.csp?isbn=9781491910658 for release details. The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. Getting Started with OpenBTS, the cover image of a Sun Conure, and related trade dress are trademarks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While the publisher and the author have used good faith efforts to ensure that the information and instruc‐ tions contained in this work are accurate, the publisher and the author disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work. -
Modeling the Use of an Airborne Platform for Cellular Communications Following Disruptions
Dissertations and Theses 9-2017 Modeling the Use of an Airborne Platform for Cellular Communications Following Disruptions Stephen John Curran Follow this and additional works at: https://commons.erau.edu/edt Part of the Aviation Commons, and the Communication Commons Scholarly Commons Citation Curran, Stephen John, "Modeling the Use of an Airborne Platform for Cellular Communications Following Disruptions" (2017). Dissertations and Theses. 353. https://commons.erau.edu/edt/353 This Dissertation - Open Access is brought to you for free and open access by Scholarly Commons. It has been accepted for inclusion in Dissertations and Theses by an authorized administrator of Scholarly Commons. For more information, please contact [email protected]. MODELING THE USE OF AN AIRBORNE PLATFORM FOR CELLULAR COMMUNICATIONS FOLLOWING DISRUPTIONS By Stephen John Curran A Dissertation Submitted to the College of Aviation in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Aviation Embry-Riddle Aeronautical University Daytona Beach, Florida September 2017 © 2017 Stephen John Curran All Rights Reserved. ii ABSTRACT Researcher: Stephen John Curran Title: MODELING THE USE OF AN AIRBORNE PLATFORM FOR CELLULAR COMMUNICATIONS FOLLOWING DISRUPTIONS Institution: Embry-Riddle Aeronautical University Degree: Doctor of Philosophy in Aviation Year: 2017 In the wake of a disaster, infrastructure can be severely damaged, hampering telecommunications. An Airborne Communications Network (ACN) allows for rapid and accurate information exchange that is essential for the disaster response period. Access to information for survivors is the start of returning to self-sufficiency, regaining dignity, and maintaining hope. Real-world testing has proven that such a system can be built, leading to possible future expansion of features and functionality of an emergency communications system. -
Osmobsc VTY Reference I
OsmoBSC VTY Reference i OsmoBSC VTY Reference OsmoBSC VTY Reference ii Copyright © 2012-2019 This work is copyright by sysmocom - s.f.m.c. GmbH. All rights reserved. OsmoBSC VTY Reference iii COLLABORATORS TITLE : OsmoBSC VTY Reference ACTION NAME DATE SIGNATURE WRITTEN BY September 28, 2021 REVISION HISTORY NUMBER DATE DESCRIPTION NAME v1 13th August 2012 Initial hf v2 5th March 2014 Update to match osmo-bsc version 0.13.0-305 hf v3 6th June 2019 Update to match osmo-bsc version 1.4.0.84-3f1f dw OsmoBSC VTY Reference iv Contents 1 VTY reference 1 1.1 Common Commands . .1 1.1.1 end . .2 1.1.2 exit . .2 1.1.3 help . .2 1.1.4 list [with-flags] . .2 1.1.5 show running-config . .3 1.1.6 show vty-attributes . .3 1.1.7 show vty-attributes (application|library|global) . .3 1.1.8 write . .4 1.1.9 write file [PATH] . .4 1.1.10 write memory . .4 1.1.11 write terminal . .4 1.2 view..........................................................5 1.2.1 enable [expert-mode] . .5 1.2.2 logging color (0|1) . .5 1.2.3 logging disable . .5 1.2.4 logging enable . .6 1.2.5 logging filter all (0|1) . .6 1.2.6 logging filter imsi IMSI . .6 1.2.7 logging level (rll|mm|rr|rsl|nm|pag|meas|msc|ho|hodec|ref|ctrl|filter|pcu|lcls|c... .7 1.2.8 logging level force-all (debug|info|notice|error|fatal) . 10 1.2.9 logging level set-all (debug|info|notice|error|fatal) . -
3GPP Standards Update for Femtozone During MWC 2011
THE Mobile Broadband Standard 3GPP Standards Update Adrian Scrase Head of 3GPP Mobile Competence Centre FemtoZone Presentation, Mobile World Congress, 16 th February 2011 1 Content THE Mobile Broadband Standard The Role of 3GPP The 3GPP population Spanning the generations Building on Releases Home eNodeB and femtocell work HNB/HeNB Specifications listing Interoperability Testing What is next for 3GPP LTE FemtoZone Presentation, Mobile World Congress, 16 th February 2011 2 The Role of 3GPP THE Mobile Broadband Standard Maintenance and evolution of Radio Technologies: GSM, GPRS, W-CDMA, UMTS, EDGE, HSPA and LTE Maintenance and evolution of the related Core Network and Systems Architecture Partnership Consists of • Regional standards organizations (Asia, Europe & North America): • and Market Partners representing broader industry: concerns: FemtoZone Presentation, Mobile World Congress, 16 th February 2011 3 3GPP Population THE Mobile Broadband Standard Over 350 Companies participate through their membership of one of the 6 Partners Plenary meetings each quarter (Next time is TSG#51, Kansas City, March 2011) Over 150 meetings (including Working Groups) in 2010 FemtoZone Presentation, Mobile World Congress, 16 th February 2011 4 Spanning the Generations... THEGSM Mobile 1G Broadband Standard 3GPP Specified Radio Interfaces Analog technology. Deployed in the 1980s. • 2G radio: GSM, GPRS, EDGE GSM 2G • 3G radio: WCDMA, HSPA, LTE Digital Technology. First digital systems. • 4G radio: LTE Advanced Deployed in the 1990s. New services such as SMS and low-rate data. 3GPP Core Network Primary technologies include IS-95 CDMA and • 2G/3G: GSM core network GSM. • 3G/4G: Evolved Packet Core (EPC) 3G ITU’s IMT -2000 required 144 kbps mobile, 384 kbps pedestrian, 2 Mbps indoors Primary technologies 3GPP Service Layer include CDMA2000 1X/EVDO, WiMAX, and UMTS-HSPA. -
Study Report on Regulatory Issues in Femtocell (Indoor) Deployment Strategy
Study Report on Regulatory Issues in Femtocell (Indoor) Deployment Strategy Policy & Research Strategy & Development Division Pakistan Telecommunication Authority 2012 Page 1 of 33 INTRODUCTION Demand for high speed, innovative and up‐to‐date technologies is always on the rise. Every passing day promises a new possibility and opportunity for the consumers to have access to high quality, highly efficient yet effective and real time services and applications, at the comfort of their homes, workplaces or on the move. With the developments in wireless and fixed line technologies in recent times, we have seen a shift from legacy computers to personal tabs and Smartphones, which are more than just phones. Web browsing, email, messaging, video sharing, networking, location based services, etc are just a few names from this wide range of gadgets which we see every day. All such services and obviously future services are bandwidth hungry and wireless is the preferred choice for users, we want higher data rates, lower spectrum usage, a lot of applications and at the same time at a cheaper rate, to handle all this, without a liberal wireless spectrum and strong radio engineering, these ambitions cannot be fully realized or implemented.1 The world has now moved to or is planning to shift to high end mobile technologies such as 3G, 4G, LTE and most of the developed economies have deployed a good functional fixed broadband network across the board. The case of Pakistan is a little different, 3G cellular services are expected to be started in 2013, whereas the spectrum is limited as always the case.