According to the Ericsson Mobility Report, the world of smartphone users expect to reach 4.5 billion people in 2018 and the scale of mobile traffic increases 12 times in size. In particular, the video traffic is expected to keep spreading the LTE grow...
According to the Ericsson Mobility Report, the world of smartphone users expect to reach 4.5 billion people in 2018 and the scale of mobile traffic increases 12 times in size. In particular, the video traffic is expected to keep spreading the LTE growth of 60% per year. In accordance with the environmental changes of the mobile communication, smartphone and the mobile communication network must ensure the safety of mobile communications users. In this paper, we describe the threats on the three major security.
First, we describe the security threats of the femtocell in the mobile communication environment. Private Mobile Communication Systems (MCS) can be established with an open project and small MCS base stations are increasingly deployed in experiment environment. They can support not only voice communication, but also Short Message Services (SMS) and GPRS/EDGE services. If a user has a small base station (BS), then establishing a private real-world MCS becomes a clear option. For a private MCS to function properly, the services of private MCSs based on open projects should be configured similarly to those provided by commercial MCSs. In other words, the service should include voice communication, a Short Message Service (SMS), and a GPRS/EDGE service. Also, the subscriber station (SS), likewise, should be configured to support such services. In this paper, we consider attack scenarios using experimental MCSs with small BSs. We experimentally show the feasibility of attacks resulting in the leakage of private information, attacks on openBSC control, and DNS spooffing at the network level, all without subscriber knowledge.
Second, we analysis a Home Location Register(HLR) Lookup service. HLR data is stored in the user profile on the 2G, 3G or 4G mobile communication mobile environment. HLR system is the important components of the core network, and HLR cannot be accessed without authenticated. But we propose a method that how to access HLR or core network from the outside.
Third, we analysis the femtocell firmware produced by Huawei. The Huawei's femtocell was deployed in June 2010. We analysis about the femtocell firmware's booting process, we find out the developer mode during the boot process and send the hidden terminal command. As a result, we propose a method that how to get the administrator's security information.