summaryrefslogtreecommitdiffstats
path: root/Tex/Master/Master.aux
diff options
context:
space:
mode:
authorTom2012-05-21 18:30:02 +0200
committerTom2012-05-21 18:30:02 +0200
commit818bd7c053bb9c17f323134a244e6822fa02b99f (patch)
treeade9ada0879c08a6ae329287bf1f4301fb1d849d /Tex/Master/Master.aux
parentfinished experiments seciton apart from tables where data is needed and appendix (diff)
downloadimsi-catcher-detection-818bd7c053bb9c17f323134a244e6822fa02b99f.tar.gz
imsi-catcher-detection-818bd7c053bb9c17f323134a244e6822fa02b99f.tar.xz
imsi-catcher-detection-818bd7c053bb9c17f323134a244e6822fa02b99f.zip
added sections on paging and paging feature in c code, lot of minor changes in tex files
Diffstat (limited to 'Tex/Master/Master.aux')
-rw-r--r--Tex/Master/Master.aux399
1 files changed, 203 insertions, 196 deletions
diff --git a/Tex/Master/Master.aux b/Tex/Master/Master.aux
index a196870..c26495a 100644
--- a/Tex/Master/Master.aux
+++ b/Tex/Master/Master.aux
@@ -15,12 +15,31 @@
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
+\citation{GSM2009}
+\citation{GSM_history2011}
+\citation{GSM_stats2011}
+\citation{GSM2009}
+\citation{kommsys2006}
+\citation{GSM2009}
+\citation{fox}
+\citation{def_catcher}
+\citation{mueller}
+\citation{osmo_wiki_c123}
+\citation{protocols1999}
+\FN@pp@footnotehinttrue
+\FN@pp@footnotehinttrue
+\FN@pp@footnotehinttrue
+\citation{protocols1999}
+\citation{kommsys2006}
+\citation{GSM2009}
+\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
\citation{GSM2009}
\citation{GSM_history2011}
\citation{GSM_stats2011}
+\citation{dennis}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
@@ -29,16 +48,18 @@
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{lol}{\addvspace {10\p@ }}
-\@writefile{toc}{\contentsline {section}{\numberline {1.1}Structure}{1}}
-\@writefile{toc}{\contentsline {section}{\numberline {1.2}Disclaimer}{1}}
+\@writefile{toc}{\contentsline {section}{\numberline {1.1}Motivation}{1}}
+\@writefile{toc}{\contentsline {section}{\numberline {1.2}Structure}{2}}
+\@writefile{toc}{\contentsline {section}{\numberline {1.3}Disclaimer}{2}}
+\@writefile{toc}{\contentsline {section}{\numberline {1.4}On Typesetting}{3}}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
-\@writefile{toc}{\contentsline {chapter}{\numberline {2}GSM}{3}}
+\@writefile{toc}{\contentsline {chapter}{\numberline {2}GSM}{5}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{lol}{\addvspace {10\p@ }}
-\newlabel{ch:gsm}{{2}{3}}
-\@writefile{toc}{\contentsline {section}{\numberline {2.1}A Historical Perspective}{3}}
+\newlabel{ch:gsm}{{2}{5}}
+\@writefile{toc}{\contentsline {section}{\numberline {2.1}A Historical Perspective}{5}}
\citation{GSM2009}
\citation{protocols1999}
\citation{GSM2009}
@@ -48,137 +69,113 @@
\citation{GSM_history2011}
\citation{GSM_stats2011}
\citation{3gpp_Proposal2000}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.1}{\ignorespaces Growth of mobile GSM subscriptions. Compiled from \cite {GSM2009,GSM_history2011,GSM_stats2011}}}{4}}
-\newlabel{fig:gsm_growth}{{2.1}{4}}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.1}{\ignorespaces Growth of mobile GSM subscriptions. Compiled from \cite {GSM2009,GSM_history2011,GSM_stats2011}}}{6}}
+\newlabel{fig:gsm_growth}{{2.1}{6}}
\citation{hsdpa}
\citation{hsupa}
\citation{kommsys2006}
-\FN@pp@footnote@aux{1}{5}
-\@writefile{toc}{\contentsline {section}{\numberline {2.2}The GSM Network}{5}}
-\newlabel{sec:network}{{2.2}{5}}
+\FN@pp@footnote@aux{1}{7}
+\@writefile{toc}{\contentsline {section}{\numberline {2.2}The GSM Network}{7}}
+\newlabel{sec:network}{{2.2}{7}}
\citation{ITU1200}
\citation{GSM2009}
\citation{overview1994}
\citation{overview1996}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.2}{\ignorespaces The main components of a GSM network.}}{6}}
-\newlabel{fig:gsm_network}{{2.2}{6}}
-\FN@pp@footnote@aux{2}{6}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Mobile Station}{6}}
-\newlabel{sec:ms}{{2.2.1}{6}}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.2}{\ignorespaces The main components of a GSM network.}}{8}}
+\newlabel{fig:gsm_network}{{2.2}{8}}
+\FN@pp@footnote@aux{2}{8}
\citation{GSM0207}
\citation{protocols1999}
-\citation{GSM0505}
\citation{ISO7810}
-\FN@pp@footnote@aux{3}{7}
-\FN@pp@footnote@aux{4}{7}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Mobile Station}{9}}
+\newlabel{sec:ms}{{2.2.1}{9}}
+\FN@pp@footnote@aux{3}{9}
+\FN@pp@footnote@aux{4}{9}
\citation{protocols1999}
\citation{protocols1999}
\citation{kommsys2006}
\citation{GSM23003}
-\@writefile{lot}{\contentsline {table}{\numberline {2.1}{\ignorespaces Subset of data stored on a SIM card. Adopted from \cite {protocols1999}}}{8}}
-\newlabel{tab:simdata}{{2.1}{8}}
+\@writefile{lot}{\contentsline {table}{\numberline {2.1}{\ignorespaces Subset of data stored on a SIM card. Adopted from \cite {protocols1999}}}{10}}
+\newlabel{tab:simdata}{{2.1}{10}}
\citation{ITU212}
-\@writefile{lot}{\contentsline {table}{\numberline {2.2}{\ignorespaces Mobile Country and Network Codes. (R) denotes that the MCC is reserved but not operational as of yet, whereas (T) denotes a operational test network.}}{9}}
-\newlabel{tab:countrycodes}{{2.2}{9}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Network Subsystem}{9}}
-\newlabel{sec:nss}{{2.2.2}{9}}
-\@writefile{toc}{\contentsline {subsubsection}{Mobile Switching Center}{10}}
-\@writefile{toc}{\contentsline {subsubsection}{Home Location Register}{10}}
-\@writefile{lot}{\contentsline {table}{\numberline {2.3}{\ignorespaces Interfaces inside the core network (upper part) and the radio network (lower part)}}{11}}
-\newlabel{tab:interfaces}{{2.3}{11}}
-\citation{blacklisting}
-\@writefile{toc}{\contentsline {subsubsection}{Visitor Location Register}{12}}
-\@writefile{toc}{\contentsline {subsubsection}{Equipment Identification Register}{12}}
-\FN@pp@footnote@aux{5}{12}
-\@writefile{toc}{\contentsline {subsubsection}{Authentication Center}{12}}
-\newlabel{sec:authentication}{{2.2.2}{12}}
-\FN@pp@footnote@aux{6}{12}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.3}{\ignorespaces Authentication procedure.}}{13}}
-\newlabel{fig:authentication}{{2.3}{13}}
+\@writefile{lot}{\contentsline {table}{\numberline {2.2}{\ignorespaces Mobile Country and Network Codes. (R) denotes that the MCC is reserved but not operational as of yet, whereas (T) denotes a operational test network.}}{11}}
+\newlabel{tab:countrycodes}{{2.2}{11}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.2}Network Subsystem}{11}}
+\newlabel{sec:nss}{{2.2.2}{11}}
+\@writefile{toc}{\contentsline {subsubsection}{Mobile Switching Center}{12}}
+\@writefile{toc}{\contentsline {subsubsection}{Home Location Register}{12}}
+\@writefile{lot}{\contentsline {table}{\numberline {2.3}{\ignorespaces Interfaces inside the core network (upper part) and the radio network (lower part)}}{13}}
+\newlabel{tab:interfaces}{{2.3}{13}}
+\@writefile{toc}{\contentsline {subsubsection}{Visitor Location Register}{14}}
+\@writefile{toc}{\contentsline {subsubsection}{Authentication Center}{14}}
+\newlabel{sec:authentication}{{2.2.2}{14}}
+\FN@pp@footnote@aux{5}{14}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.3}{\ignorespaces Authentication procedure.}}{15}}
+\newlabel{fig:authentication}{{2.3}{15}}
\citation{kommsys2006}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Intelligent Network}{14}}
-\citation{GSM23078}
\citation{kommsys2006}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.3}Base Station Subsystem}{16}}
+\newlabel{sec:bss}{{2.2.3}{16}}
+\@writefile{toc}{\contentsline {subsubsection}{Frequencies and the Cellular Principle}{16}}
\citation{kommsys2006}
\citation{kommsys2006}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}Base Station Subsystem}{15}}
-\newlabel{sec:bss}{{2.2.4}{15}}
-\@writefile{toc}{\contentsline {subsubsection}{Frequencies and the Cellular Principle}{15}}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.4}{\ignorespaces Mapping of functional entities on the 900\tmspace +\thinmuskip {.1667em}MHz\ band.}}{16}}
-\newlabel{fig:frequency}{{2.4}{16}}
-\@writefile{lot}{\contentsline {table}{\numberline {2.4}{\ignorespaces Frequencies in the different bands \cite {kommsys2006}.}}{16}}
-\newlabel{tab:frequencies}{{2.4}{16}}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.4}{\ignorespaces Mapping of functional entities on the 900\tmspace +\thinmuskip {.1667em}MHz\ band.}}{17}}
+\newlabel{fig:frequency}{{2.4}{17}}
+\@writefile{lot}{\contentsline {table}{\numberline {2.4}{\ignorespaces Frequencies in the different bands \cite {kommsys2006}.}}{17}}
+\newlabel{tab:frequencies}{{2.4}{17}}
\citation{GSM2009}
\citation{protocols1999}
\citation{GSM2009}
\citation{GSM2009}
\citation{kommsys2006}
-\citation{protocols1999}
-\citation{protocols1999}
-\citation{protocols1999}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.5}{\ignorespaces Theoretical arrangement of radio cells compared to a realistic alignment. Cells with the same number share the same frequency \cite {GSM2009}.}}{18}}
-\newlabel{fig:cells}{{2.5}{18}}
\@writefile{toc}{\contentsline {subsubsection}{Base Transceiver Station}{18}}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.6}{\ignorespaces Common base station configurations. Compiled from \cite {protocols1999}.}}{19}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {Stantard configuration.}}}{19}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Umbrella cell configuration.}}}{19}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(c)}{\ignorespaces {Sectorised configuration.}}}{19}}
-\newlabel{fig:configurations}{{2.6}{19}}
\citation{kommsys2006}
-\@writefile{toc}{\contentsline {subsubsection}{Base Station Controller}{20}}
-\citation{kommsys2006}
-\@writefile{toc}{\contentsline {subsubsection}{Transcoding rate and Adaption Unit}{21}}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.5}{\ignorespaces Theoretical arrangement of radio cells compared to a realistic alignment. Cells with the same number share the same frequency \cite {GSM2009}.}}{19}}
+\newlabel{fig:cells}{{2.5}{19}}
+\@writefile{toc}{\contentsline {subsubsection}{Base Station Controller}{19}}
\citation{kommsys2006}
\citation{kommsys2006}
\citation{protocols1999}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.7}{\ignorespaces Ciphering procedure for one frame of voice data. Adopted from \cite {kommsys2006}.}}{22}}
-\newlabel{fig:cypher}{{2.7}{22}}
-\@writefile{toc}{\contentsline {section}{\numberline {2.3}The $U_m$ Interface}{22}}
-\newlabel{sec:Um}{{2.3}{22}}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.8}{\ignorespaces The combination of FDMA and TDMA.}}{23}}
-\newlabel{fig:fdma_tdma}{{2.8}{23}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Radio Transmission}{23}}
-\newlabel{sec:radio}{{2.3.1}{23}}
-\@writefile{toc}{\contentsline {subsubsection}{Frame Numbering}{24}}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.9}{\ignorespaces Hierarchical Composition of the different frames.}}{25}}
-\newlabel{fig:frame_hierarchy}{{2.9}{25}}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.6}{\ignorespaces Ciphering procedure for one frame of voice data. Adopted from \cite {kommsys2006}.}}{21}}
+\newlabel{fig:cypher}{{2.6}{21}}
+\@writefile{toc}{\contentsline {section}{\numberline {2.3}The $U_m$ Interface}{21}}
+\newlabel{sec:Um}{{2.3}{21}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Radio Transmission}{21}}
+\newlabel{sec:radio}{{2.3.1}{21}}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.7}{\ignorespaces The combination of FDMA and TDMA.}}{22}}
+\newlabel{fig:fdma_tdma}{{2.7}{22}}
+\@writefile{toc}{\contentsline {subsubsection}{Frame Numbering}{22}}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.8}{\ignorespaces Hierarchical Composition of the different frames.}}{23}}
+\newlabel{fig:frame_hierarchy}{{2.8}{23}}
\citation{GSM2009}
\citation{GSM2009}
\citation{GSM2009}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.10}{\ignorespaces Structural Comparison of different Burst types. After \cite {GSM2009}.}}{26}}
-\newlabel{fig:burst_types}{{2.10}{26}}
-\@writefile{toc}{\contentsline {subsubsection}{Burst Types}{26}}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.9}{\ignorespaces Structural Comparison of different Burst types. After \cite {GSM2009}.}}{24}}
+\newlabel{fig:burst_types}{{2.9}{24}}
+\@writefile{toc}{\contentsline {subsubsection}{Burst Types}{24}}
\citation{kommsys2006}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.11}{\ignorespaces Mapping of virtual channels on time slots.}}{27}}
-\newlabel{fig:channels}{{2.11}{27}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}Logical Channels}{27}}
-\newlabel{sec:channels}{{2.3.2}{27}}
-\@writefile{toc}{\contentsline {subsubsection}{Dedicated Channels}{28}}
-\@writefile{toc}{\contentsline {subsubsection}{Common Channels}{28}}
-\newlabel{sec:common_channels}{{2.3.2}{28}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}Logical Channels}{25}}
+\newlabel{sec:channels}{{2.3.2}{25}}
+\@writefile{toc}{\contentsline {subsubsection}{Dedicated Channels}{25}}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.10}{\ignorespaces Mapping of virtual channels on time slots.}}{26}}
+\newlabel{fig:channels}{{2.10}{26}}
+\@writefile{toc}{\contentsline {subsubsection}{Common Channels}{26}}
+\newlabel{sec:common_channels}{{2.3.2}{26}}
\citation{gsm0502}
-\citation{GSM2009}
-\citation{GSM2009}
-\citation{kommsys2006}
-\citation{protocols1999}
-\citation{kommsys2006}
-\citation{kommsys2006}
-\@writefile{lot}{\contentsline {table}{\numberline {2.5}{\ignorespaces Possible combinations of logical channels for the base station. From \cite {GSM2009}.}}{29}}
-\newlabel{tab:channel_configurations}{{2.5}{29}}
-\@writefile{toc}{\contentsline {subsubsection}{Combinations}{29}}
\citation{protocols1999}
+\@writefile{toc}{\contentsline {subsubsection}{Combinations}{27}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.3}Layers}{27}}
+\newlabel{sec:layers}{{2.3.3}{27}}
+\@writefile{toc}{\contentsline {paragraph}{Physical Layer (Layer 1):}{27}}
\citation{GSM0405}
\citation{GSM0406}
\citation{protocols1999}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.3}Layers}{30}}
-\newlabel{sec:layers}{{2.3.3}{30}}
-\@writefile{toc}{\contentsline {paragraph}{Physical Layer (Layer 1):}{30}}
-\@writefile{toc}{\contentsline {paragraph}{Data Link (Layer 2):}{30}}
-\@writefile{toc}{\contentsline {paragraph}{Network (Layer 3):}{30}}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.12}{\ignorespaces Snippet of a Multiframe-configurations for a base station from \cite {kommsys2006}.}}{31}}
-\newlabel{fig:channel_example}{{2.12}{31}}
\citation{fox}
\citation{imsi_wiki}
+\@writefile{toc}{\contentsline {paragraph}{Data Link (Layer 2):}{28}}
+\@writefile{toc}{\contentsline {paragraph}{Network (Layer 3):}{28}}
+\@writefile{toc}{\contentsline {section}{\numberline {2.4}IMSI-Catcher}{28}}
+\newlabel{sec:catcher}{{2.4}{28}}
\citation{fox}
\citation{dennis}
\citation{def_catcher}
@@ -187,126 +184,130 @@
\citation{fox}
\citation{def_catcher}
\citation{mueller}
-\@writefile{toc}{\contentsline {section}{\numberline {2.4}IMSI-Catcher}{32}}
-\newlabel{sec:catcher}{{2.4}{32}}
\citation{mueller}
\citation{mueller}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.11}{\ignorespaces A commercial catcher by Rhode \& Schwarz \cite {fox} and a self built catcher introduced at Defcon 2010 \cite {def_catcher}.}}{29}}
+\newlabel{fig:catchers}{{2.11}{29}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}Mode of Operation}{29}}
+\newlabel{sec:catcher_operation}{{2.4.1}{29}}
\citation{fox}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.12}{\ignorespaces IMSI catching procedure. Adopted and simplified from \cite {mueller}.}}{30}}
+\newlabel{fig:catcher_catch}{{2.12}{30}}
\citation{mueller}
\citation{fox}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.13}{\ignorespaces A commercial catcher by Rhode \& Schwarz \cite {fox} and a self built catcher introduced at Defcon 2010 \cite {def_catcher}.}}{33}}
-\newlabel{fig:catchers}{{2.13}{33}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}Mode of Operation}{33}}
-\newlabel{sec:catcher_operation}{{2.4.1}{33}}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.14}{\ignorespaces IMSI catching procedure. Adopted and simplified from \cite {mueller}.}}{34}}
-\newlabel{fig:catcher_catch}{{2.14}{34}}
\citation{dennis}
\citation{imsi_wiki}
+\@writefile{toc}{\contentsline {subsubsection}{Attacks}{31}}
+\newlabel{sec:attacks}{{2.4.1}{31}}
+\@writefile{toc}{\contentsline {paragraph}{MS is in normal cell selection mode:}{31}}
+\@writefile{toc}{\contentsline {paragraph}{MS is already connected to a network:}{31}}
\citation{fox}
-\@writefile{toc}{\contentsline {subsubsection}{Attacks}{35}}
-\newlabel{sec:attacks}{{2.4.1}{35}}
-\@writefile{toc}{\contentsline {paragraph}{MS is in normal cell selection mode:}{35}}
-\@writefile{toc}{\contentsline {paragraph}{MS is already connected to a network:}{35}}
\citation{fox}
\citation{imsi_wiki}
\citation{criminal_justice}
-\@writefile{toc}{\contentsline {subsubsection}{Risks and Irregularities}{36}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.2}Law Situation in Germany}{36}}
-\newlabel{sec:catcher_law}{{2.4.2}{36}}
+\@writefile{toc}{\contentsline {subsubsection}{Risks and Irregularities}{32}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.2}Law Situation in Germany}{32}}
+\newlabel{sec:catcher_law}{{2.4.2}{32}}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
\citation{dennis}
\citation{osmo_rationale}
-\@writefile{toc}{\contentsline {chapter}{\numberline {3}IMSI Catcher Detection}{39}}
+\@writefile{toc}{\contentsline {chapter}{\numberline {3}IMSI Catcher Detection}{35}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{lol}{\addvspace {10\p@ }}
-\@writefile{toc}{\contentsline {section}{\numberline {3.1}Framework and Hardware}{39}}
-\FN@pp@footnote@aux{7}{39}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}OsmocomBB}{39}}
+\@writefile{toc}{\contentsline {section}{\numberline {3.1}Framework and Hardware}{35}}
+\FN@pp@footnote@aux{6}{35}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}OsmocomBB}{35}}
\citation{osmo_slides}
\citation{osmo_wiki_c123}
\citation{osmo_wiki_c123}
-\@writefile{toc}{\contentsline {subsubsection}{Project Status}{40}}
-\FN@pp@footnote@aux{8}{40}
-\@writefile{lot}{\contentsline {table}{\numberline {3.1}{\ignorespaces Technical specifications for the Motorola C123.}}{41}}
-\newlabel{tab:c123_specs}{{3.1}{41}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.2}Motorola C123}{41}}
-\newlabel{sec:osmo_phones}{{3.1.2}{41}}
-\FN@pp@footnote@aux{9}{41}
-\@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Circuit board of the Motorola C123 with its components \cite {osmo_wiki_c123}.}}{42}}
-\newlabel{fig:osmo_c123}{{3.1}{42}}
-\@writefile{toc}{\contentsline {subsubsection}{OsmocomBB and ICDS}{42}}
-\FN@pp@footnote@aux{10}{42}
+\@writefile{toc}{\contentsline {subsubsection}{Project Status}{36}}
+\FN@pp@footnote@aux{7}{36}
+\@writefile{lot}{\contentsline {table}{\numberline {3.1}{\ignorespaces Technical specifications for the Motorola C123.}}{37}}
+\newlabel{tab:c123_specs}{{3.1}{37}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.2}Motorola C123}{37}}
+\newlabel{sec:osmo_phones}{{3.1.2}{37}}
+\FN@pp@footnote@aux{8}{37}
+\@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Circuit board of the Motorola C123 with its components \cite {osmo_wiki_c123}.}}{38}}
+\newlabel{fig:osmo_c123}{{3.1}{38}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.3}OsmocomBB and ICDS}{38}}
+\FN@pp@footnote@aux{9}{38}
\citation{GSM2009}
-\@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces Interaction of the OsmocomBB components with the ICDS software.}}{43}}
-\newlabel{fig:osmo_setup}{{3.2}{43}}
-\@writefile{toc}{\contentsline {section}{\numberline {3.2}Procedure}{43}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Information Gathering}{43}}
-\newlabel{sec:info_gathering}{{3.2.1}{43}}
+\@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces Interaction of the OsmocomBB components with the ICDS software.}}{39}}
+\newlabel{fig:osmo_setup}{{3.2}{39}}
+\@writefile{toc}{\contentsline {section}{\numberline {3.2}Procedure}{39}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Information Gathering}{39}}
+\newlabel{sec:info_gathering}{{3.2.1}{39}}
\citation{GSM2009}
\citation{GSM2009}
\citation{protocols1999}
\citation{protocols1999}
\citation{protocols1999}
-\@writefile{lot}{\contentsline {table}{\numberline {3.2}{\ignorespaces Type Codes and the corresponding System Information Types \cite {GSM2009}.}}{44}}
-\newlabel{tab:tc_mapping}{{3.2}{44}}
-\@writefile{lof}{\contentsline {figure}{\numberline {3.3}{\ignorespaces System Information 1 Message \cite {protocols1999}.}}{45}}
-\newlabel{fig:si1}{{3.3}{45}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.2}Information Evaluation}{46}}
-\newlabel{sec:info_evaluation}{{3.2.2}{46}}
-\@writefile{lot}{\contentsline {table}{\numberline {3.3}{\ignorespaces Configuration Rules implemented inside the ICDS.}}{47}}
-\newlabel{tab:config_rules}{{3.3}{47}}
-\@writefile{lot}{\contentsline {table}{\numberline {3.4}{\ignorespaces Context Rules implemented inside the ICDS.}}{48}}
-\newlabel{tab:context_rules}{{3.4}{48}}
-\FN@pp@footnote@aux{11}{48}
-\@writefile{toc}{\contentsline {subsubsection}{Neighbourhood Structure}{48}}
-\FN@pp@footnote@aux{12}{49}
-\@writefile{toc}{\contentsline {subsubsection}{Base Station Evaluation}{49}}
-\@writefile{lof}{\contentsline {figure}{\numberline {3.4}{\ignorespaces Base stations and their neighbourhood connections at the Technische Fakult\"at.}}{50}}
-\newlabel{fig:neighbourhood_example}{{3.4}{50}}
-\@writefile{lof}{\contentsline {figure}{\numberline {3.5}{\ignorespaces Comparison between a normal neighbourhood subgraph and a tainted one.}}{50}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {Normal neighbourhood}}}{50}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Tainted neighbourhood}}}{50}}
-\newlabel{fig:structure_comparison}{{3.5}{50}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.3}Forged Parameters}{51}}
-\newlabel{sec:fake_parameters}{{3.2.3}{51}}
+\@writefile{lot}{\contentsline {table}{\numberline {3.2}{\ignorespaces Type Codes and the corresponding System Information Types \cite {GSM2009}.}}{40}}
+\newlabel{tab:tc_mapping}{{3.2}{40}}
+\@writefile{lof}{\contentsline {figure}{\numberline {3.3}{\ignorespaces System Information 1 Message \cite {protocols1999}.}}{41}}
+\newlabel{fig:si1}{{3.3}{41}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.2}Information Evaluation}{42}}
+\newlabel{sec:info_evaluation}{{3.2.2}{42}}
+\@writefile{lot}{\contentsline {table}{\numberline {3.3}{\ignorespaces Configuration Rules implemented inside the ICDS.}}{43}}
+\newlabel{tab:config_rules}{{3.3}{43}}
+\@writefile{lot}{\contentsline {table}{\numberline {3.4}{\ignorespaces Context Rules implemented inside the ICDS.}}{44}}
+\newlabel{tab:context_rules}{{3.4}{44}}
+\FN@pp@footnote@aux{10}{44}
+\@writefile{toc}{\contentsline {subsubsection}{Neighbourhood Structure}{44}}
+\FN@pp@footnote@aux{11}{45}
+\@writefile{toc}{\contentsline {subsubsection}{Base Station Evaluation}{45}}
+\@writefile{lof}{\contentsline {figure}{\numberline {3.4}{\ignorespaces Base stations and their neighbourhood connections at the Technische Fakult\"at.}}{46}}
+\newlabel{fig:neighbourhood_example}{{3.4}{46}}
+\@writefile{lof}{\contentsline {figure}{\numberline {3.5}{\ignorespaces Comparison between a normal neighbourhood subgraph and a tainted one.}}{46}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {Normal neighbourhood}}}{46}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Tainted neighbourhood}}}{46}}
+\newlabel{fig:structure_comparison}{{3.5}{46}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.3}Forged Parameters}{47}}
+\newlabel{sec:fake_parameters}{{3.2.3}{47}}
\citation{wiki_cells}
-\@writefile{toc}{\contentsline {subsubsection}{Database Rules}{52}}
-\FN@pp@footnote@aux{13}{52}
-\FN@pp@footnote@aux{14}{52}
-\FN@pp@footnote@aux{15}{52}
-\@writefile{lof}{\contentsline {figure}{\numberline {3.6}{\ignorespaces System architecture of the ICDS. The arrows indicate the flow of data.}}{53}}
-\newlabel{fig:architecture}{{3.6}{53}}
-\@writefile{toc}{\contentsline {section}{\numberline {3.3}IMSI Catcher Detection System}{53}}
-\newlabel{sec:icds}{{3.3}{53}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.1}Implemetation}{53}}
-\@writefile{lof}{\contentsline {figure}{\numberline {3.7}{\ignorespaces Configuration Dictionary in the settings file.}}{54}}
-\newlabel{fig:python_dict}{{3.7}{54}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.2}Configuration}{54}}
-\newlabel{sec:configuration}{{3.3.2}{54}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.3}Operation}{55}}
-\newlabel{sec:icds_operation}{{3.3.3}{55}}
-\@writefile{lof}{\contentsline {figure}{\numberline {3.8}{\ignorespaces The ICDS main window.}}{56}}
-\newlabel{fig:icds}{{3.8}{56}}
-\@writefile{toc}{\contentsline {paragraph}{Sweep scans:}{58}}
-\@writefile{toc}{\contentsline {paragraph}{CellID Information:}{58}}
-\newlabel{fig:filters_window}{{3.9(a)}{59}}
-\newlabel{sub@fig:filters_window}{{(a)}{59}}
-\newlabel{fig:rules_window}{{3.9(b)}{59}}
-\newlabel{sub@fig:rules_window}{{(b)}{59}}
-\newlabel{fig:databases}{{3.9(c)}{59}}
-\newlabel{sub@fig:databases}{{(c)}{59}}
-\newlabel{fig:encryption_window}{{3.9(d)}{59}}
-\newlabel{sub@fig:encryption_window}{{(d)}{59}}
-\@writefile{lof}{\contentsline {figure}{\numberline {3.9}{\ignorespaces Dialogs for different settings.}}{59}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {Filters window.}}}{59}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Rules window.}}}{59}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(c)}{\ignorespaces {Databases window.}}}{59}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(d)}{\ignorespaces {Encryption window (not yet implemented).}}}{59}}
-\@writefile{toc}{\contentsline {paragraph}{Location Area Database:}{60}}
-\@writefile{toc}{\contentsline {paragraph}{Scan Encryption:}{60}}
-\@writefile{toc}{\contentsline {paragraph}{User Mode:}{60}}
+\@writefile{toc}{\contentsline {subsubsection}{Database Rules}{48}}
+\FN@pp@footnote@aux{12}{48}
+\FN@pp@footnote@aux{13}{48}
+\FN@pp@footnote@aux{14}{48}
+\@writefile{lof}{\contentsline {figure}{\numberline {3.6}{\ignorespaces Procedure taken when the network has a call/text waiting for a passive subscriber.}}{49}}
+\newlabel{fig:paging}{{3.6}{49}}
+\@writefile{toc}{\contentsline {subsubsection}{Remaining Issues and Paging}{49}}
+\@writefile{lof}{\contentsline {figure}{\numberline {3.7}{\ignorespaces System architecture of the ICDS. The arrows indicate the flow of data.}}{50}}
+\newlabel{fig:architecture}{{3.7}{50}}
+\@writefile{toc}{\contentsline {section}{\numberline {3.3}IMSI Catcher Detection System}{50}}
+\newlabel{sec:icds}{{3.3}{50}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.1}Implemetation}{50}}
+\@writefile{lof}{\contentsline {figure}{\numberline {3.8}{\ignorespaces Configuration Dictionary in the settings file.}}{51}}
+\newlabel{fig:python_dict}{{3.8}{51}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.2}Configuration}{51}}
+\newlabel{sec:configuration}{{3.3.2}{51}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.3.3}Operation}{52}}
+\newlabel{sec:icds_operation}{{3.3.3}{52}}
+\@writefile{lof}{\contentsline {figure}{\numberline {3.9}{\ignorespaces The ICDS main window.}}{53}}
+\newlabel{fig:icds}{{3.9}{53}}
+\@writefile{toc}{\contentsline {paragraph}{Sweep scans:}{55}}
+\@writefile{toc}{\contentsline {paragraph}{CellID Information:}{55}}
+\newlabel{fig:filters_window}{{3.10(a)}{56}}
+\newlabel{sub@fig:filters_window}{{(a)}{56}}
+\newlabel{fig:rules_window}{{3.10(b)}{56}}
+\newlabel{sub@fig:rules_window}{{(b)}{56}}
+\newlabel{fig:databases}{{3.10(c)}{56}}
+\newlabel{sub@fig:databases}{{(c)}{56}}
+\newlabel{fig:encryption_window}{{3.10(d)}{56}}
+\newlabel{sub@fig:encryption_window}{{(d)}{56}}
+\@writefile{lof}{\contentsline {figure}{\numberline {3.10}{\ignorespaces Dialogs for different settings.}}{56}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {Filters window.}}}{56}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Rules window.}}}{56}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(c)}{\ignorespaces {Databases window.}}}{56}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(d)}{\ignorespaces {Encryption window (not yet implemented).}}}{56}}
+\@writefile{toc}{\contentsline {paragraph}{Location Area Database:}{57}}
+\@writefile{toc}{\contentsline {paragraph}{PCH Scan:}{57}}
+\@writefile{toc}{\contentsline {paragraph}{User Mode:}{57}}
+\citation{catcher_catcher}
+\@writefile{toc}{\contentsline {section}{\numberline {3.4}Related Projects}{58}}
+\FN@pp@footnote@aux{15}{58}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
\@writefile{toc}{\contentsline {chapter}{\numberline {4}Evaluation}{61}}
@@ -322,7 +323,7 @@
\@writefile{lot}{\contentsline {table}{\numberline {4.2}{\ignorespaces Coverage for Google Mobile Maps and OpenCellID on the data sets with the time needed in s for fetching the information.}}{63}}
\newlabel{tab:coverage}{{4.2}{63}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.2}Cell ID Databases}{63}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.3}Encryption Detection Speed}{63}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.3}PCH Scan Speed}{63}}
\@writefile{toc}{\contentsline {section}{\numberline {4.2}IMSI Catcher Detection}{63}}
\citation{dennis}
\@writefile{lof}{\contentsline {figure}{\numberline {4.2}{\ignorespaces Open Source IMSI Catcher (left) with USRP (black) and external clock (blue) and the ICDS (right) with the Motorola C123 connected.}}{64}}
@@ -333,19 +334,25 @@
\FN@pp@footnote@aux{18}{64}
\@writefile{lof}{\contentsline {figure}{\numberline {4.3}{\ignorespaces Excerpt of a \texttt {OpenBTS.conf}.}}{65}}
\newlabel{fig:openbts_parameters}{{4.3}{65}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.2}Rule Evaluation}{65}}
+\@writefile{toc}{\contentsline {subsubsection}{Nokia 3310}{65}}
+\FN@pp@footnote@aux{19}{65}
+\@writefile{lof}{\contentsline {figure}{\numberline {4.4}{\ignorespaces Nokia 3310 NetMonitor screenshots.}}{66}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {Connected cell information.}}}{66}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Neighbouring cell measurements.}}}{66}}
+\newlabel{fig:netmonitor}{{4.4}{66}}
\@writefile{lot}{\contentsline {table}{\numberline {4.3}{\ignorespaces Erroneous configurations for the IMSI catcher.}}{66}}
\newlabel{tab:err_configs}{{4.3}{66}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.3}Long Term Test}{66}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.2}Rule Evaluation}{66}}
\@writefile{lot}{\contentsline {table}{\numberline {4.4}{\ignorespaces failzor}}{67}}
\newlabel{tab:par_change}{{4.4}{67}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.4}Attack Scenarios}{67}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.3}Long Term Test}{67}}
\@writefile{lot}{\contentsline {table}{\numberline {4.5}{\ignorespaces Results of the long term evaluation.}}{68}}
\newlabel{tab:longterm_test}{{4.5}{68}}
-\@writefile{lot}{\contentsline {table}{\numberline {4.6}{\ignorespaces Consistent parameter configurations in the Freiburg area for the four German providers.}}{68}}
-\newlabel{tab:consistent_parameters}{{4.6}{68}}
-\@writefile{lof}{\contentsline {figure}{\numberline {4.4}{\ignorespaces Takeover attack of an IMSI catcher on a base station.}}{69}}
-\newlabel{fig:takeover_attack}{{4.4}{69}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.4}Attack Scenarios}{68}}
+\@writefile{lot}{\contentsline {table}{\numberline {4.6}{\ignorespaces Consistent parameter configurations in the Freiburg area for the four German providers.}}{69}}
+\newlabel{tab:consistent_parameters}{{4.6}{69}}
+\@writefile{lof}{\contentsline {figure}{\numberline {4.5}{\ignorespaces Takeover attack of an IMSI catcher on a base station.}}{69}}
+\newlabel{fig:takeover_attack}{{4.5}{69}}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
\@writefile{toc}{\contentsline {chapter}{\numberline {5}Conclusion}{71}}