summaryrefslogtreecommitdiffstats
path: root/Tex/Content/Conclusion.tex
diff options
context:
space:
mode:
authorTom2012-06-11 01:30:01 +0200
committerTom2012-06-11 01:30:01 +0200
commitc8e58a4c5a5d2c899ae2ede5612e18f8965c5452 (patch)
treeaf36c1680eebbef445f028a10823a6afd240c630 /Tex/Content/Conclusion.tex
parentremoved url (diff)
downloadimsi-catcher-detection-c8e58a4c5a5d2c899ae2ede5612e18f8965c5452.tar.gz
imsi-catcher-detection-c8e58a4c5a5d2c899ae2ede5612e18f8965c5452.tar.xz
imsi-catcher-detection-c8e58a4c5a5d2c899ae2ede5612e18f8965c5452.zip
more shininess
Diffstat (limited to 'Tex/Content/Conclusion.tex')
-rw-r--r--Tex/Content/Conclusion.tex11
1 files changed, 11 insertions, 0 deletions
diff --git a/Tex/Content/Conclusion.tex b/Tex/Content/Conclusion.tex
index 8c27e18..3a590b5 100644
--- a/Tex/Content/Conclusion.tex
+++ b/Tex/Content/Conclusion.tex
@@ -62,3 +62,14 @@ On the other hand a regular base station using encryption can also be verified t
These approaches are not strictly passive since they require another participant to become active.
Although not strictly passive the \gls{icds} would still be invisible thus fulfilling the premise of not being uncovered itself.
+\paragraph{}This thesis analysed the threats that an IMSI catcher poses an which security flaws are responsible for its success.
+The main security flaw used in \gls{gsm}, namely authentication not being mutual, is fixed in the next generation \gls{umts} networks.
+However the topic will be of importance for years to come since as long as \gls{umts} coverage is not complete mobile phones will continue to have a fallback mechanism to look for \gls{gsm} cells when no \gls{umts} cells are available.
+To force a mobile phone to fall back to \gls{gsm} an IMSI catcher operator could jam the \gls{umts} frequency band and wait until the \gls{ms} connects.
+
+The results show that it is possible to identify suspicious base stations and therefore lessen the thread of being caught.
+
+We presented, with the \gls{icds}, a step into the direction of more security aware systems.
+A step that could and should also be taken by telephone manufacturers when designing the firmware and operating system for their next device.
+
+