SECURWARE 2016 : The Tenth International Conference on Emerging Security Information, Systems and Technologies Interception Methods and GSM Michal Sustek, Miroslav Marcanik, Milan Oplustil, Pavel Tomasek, Zdenek Urednicek Faculty of Applied Informatics Tomas Bata University in Zlin Zlin, Czech Republic Email: {sustek, marcanik, moplustil, tomasek, urednicek}@fai.utb.cz Abstract— Nowadays, eavesdropping is a real problem, inspection can be made visible, so that the employees of the whether it is about the interception of personal or corporate company knew, but it can also be done discreetly, outside information. Current technologies enable us to use a wide office hours, in which case the employees are unaware. This variety of listening devices and methods. It may not be just a systematic inspection is supported by technical facilities [4], recording on a dictaphone, but also the use of vibration. The both for the detection of interception and subsequent issue of eavesdropping is very popular today and many people and organizations work on solutions to prevent it. The work of security premises and equipment. these companies is mostly successful, but a problem still In some areas, it is mandatory to have devices for remains related to GSM (Groupe Special Mobile) interception. protecting against interception. Nowadays, with compelling This contribution provides an insight into the principles of interception devices, it is possible to see several defense against the complex problem of eavesdropping. In any technologies used in wiretaps. These technologies include a case, people have to be careful and consider what kind of contact or non-contact scanning of information from information is communicated using cell phones and other windows, or the use of GSM phones, radio interception, technologies and what are the possibilities of their interception. direct recording on a recording unit, as well as passive and active GSM interception. Keywords-eavesdropping; interception; GSM; 5G; wire- tracking. We should pay attention to protect relevant information, whether by technical means and/or by using common sense. This contribution presents the basic outline of I. INTRODUCTION eavesdropping. It presents some methods of interception and Today, the boom of information and communication countermeasure. That contains technical, regime measures technologies contributes to an increasingly connected and identification method including the defense-technical society. Modern technology surrounds us and it is, inspection. therefore, not surprising that almost every one of us owns a Section 1 presents the GSM technology in general cellular phone. We all use it to communicate information. including mobile stations, the next generation 5G networks, GSM phones are often used to communicate corporate and their architecture. Section 2 focuses on interception information of critical importance. With the development of methods and protection methods against interception. The technology on transmission, we can see the development primary part of defense against eavesdropping is a defense- options of technologies on sound capturing and interpreting technical inspection. This inspection contains physical this information back [1]. It leads to a risk of using control, radio analysis, detection of nonlinearity and other interception devices. Therefore, it is necessary to know measurements. It is used in protection of meeting places. what principles and technologies are used in the The main goal is an identification of interception devices implementation of the interception, but also how to prevent and defense against them. Devices against which one must it [2]. Eavesdropping can affect everybody in the world. protect are contact and contactless devices, unauthorized use Countermeasures exist for most eavesdropping methods. of GSM phones, radio interception and record unit. GSM However, GSM interception presents a specific issue It is interception is divided into active and passive form. The difficult to identify an offender performing the passive form active form is reliable, but it is easier to identify. On the of eavesdropping. It forms part of the problem which must other hand, the passive version of GSM interception is be dealt in the future. almost invisible, but it is not as reliable and it is useless in Defense-technical inspection is the primary method [4] case of a moving device. The resources, which are used for used to detect interception devices in a room or on other defense, are GSM jammers, security wallpaper, radio devices. This method is nondestructive for the device itself. analyzers and more. Inspection is performed on suspicion of eavesdropping II. GSM TECHNOLOGY occurrence. An authorized person performs an initial analysis of space aimed at identifying possible risks and the GSM technology is based on ETSI (European type of interception device. In an organization, the Telecommunications Standards Institute) standards [8]. The Copyright (c) IARIA, 2016. ISBN: 978-1-61208-493-0 211 SECURWARE 2016 : The Tenth International Conference on Emerging Security Information, Systems and Technologies primary document is standard "GSM - Phase first". In the The signal is magnified with redundant bits which are development of this technology, these were several GSM added to information binary string. It leads to increasing phases until today's generation was created (Long Term error detection and correction capabilities. A block, the size Evolution, hereinafter, the LTE [8]) and for future of which is 456 bits, is divided into 8 groups of size 57 bits generations 5G. The GSM network consists of mobile each. These groups are interleaved with the last four groups stations, the base station subsystem, a network and of the previous block and with the first four groups of the switching subsystem and operational subsystems. following block. Subsequently, we will define several types of GSM services, B. 5G Architecture such as telematics services, advanced services, additional services, the Subscriber Identity Module (SIM) card and One of the main ideas of designing 5G networks [6] is a phone. separation of internal and external users into two segments. GSM coverage area is divided into bundles. Each bundle This approach aims to avoid losses resulting from signal consists of 7 cells. Inside each cell, there is a base station passing through the walls, or at least minimize it. It will be assigned to a particular group of channels and provides realized with a complex antenna system and massive communication with mobile subscribers. In the event when Multiple Input/Multiple Output (MIMO) technology, which the area of all the cells is equal to at least the interference will be deploying large antenna arrays with tens or hundreds area, it is possible to use the same channel group in all cells of antenna segments. While the most common MIMO [6]. technologies serve 2 to 4 antennas, the goal of massive To obtain better properties of the system it is possible to MIMO systems is to increase user options by using antenna use sectorization. The entire GSM area is divided into a arrays. Outdoor base stations will be equipped with an smaller number of cells. This leads to the need to increase extensive antenna array of antenna elements around the the number of base stations because the cells are smaller, cells. These cells will be connected by optical fibers with but the covered area has the same size. base stations. Outdoor users are equipped with a limited The number of required channels is not changing but the number of antenna elements, but they can work with others number of base stations growths from 7 to 21. Their number in an extensive virtual network. An antenna array will be can be reduced again to 7 by placing three separate installed outside buildings and will communicate with directional antennas at the intersection of three neighboring external base stations. cells. One can use a mobile architecture where internal users need to communicate only with the internal access points A. Mobile station with antenna arrays; then, one can use technologies for The GSM user communicates using mobile stations, short-range communication (Wi-Fi [6], the ultra-wide band which means not only the receiver/transmitter (cell phone), [6], mm-wave communications [6]). but also a SIM module. The SIM card is used as unique 5G network architecture should also contain identifier for user within the network. heterogeneous macrocells, microcells, small cells, and Source coding performs of the encoder source, which transmitters. To ensure adequate coverage for users who digitizes the analog signal and the digital side eliminates move too quickly, it will also work with mobile femtocells, redundant data contained in the audio. The main goal of this which combine the concept of mobile relays and femtocells step is to reduce the data flow to a minimum since each [6]. In Figure 1, one can see the planned architecture for 5G channel has its limitations. For removing these frequencies, networks. a parametric method is used. The signal is divided into 20 msec segments. Then it is used to each segment LPC (Linear Predictive Coding) filter and LRP (Long-Range fading Prediction) to encryption.The resulting signal is composed of 188 bits, which carry information about calling and 72 bits, which carry information about filters. These two parts make up the frame of length 260 bits. There are 50 of these frames in one second, therefore, the bit rate is 13kbps. To minimize unwanted signals, such as noise,
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages6 Page
-
File Size-