summaryrefslogtreecommitdiffstats
path: root/Tex/Master/Master.toc
diff options
context:
space:
mode:
authorTom2012-05-21 18:30:02 +0200
committerTom2012-05-21 18:30:02 +0200
commit818bd7c053bb9c17f323134a244e6822fa02b99f (patch)
treeade9ada0879c08a6ae329287bf1f4301fb1d849d /Tex/Master/Master.toc
parentfinished experiments seciton apart from tables where data is needed and appendix (diff)
downloadimsi-catcher-detection-818bd7c053bb9c17f323134a244e6822fa02b99f.tar.gz
imsi-catcher-detection-818bd7c053bb9c17f323134a244e6822fa02b99f.tar.xz
imsi-catcher-detection-818bd7c053bb9c17f323134a244e6822fa02b99f.zip
added sections on paging and paging feature in c code, lot of minor changes in tex files
Diffstat (limited to 'Tex/Master/Master.toc')
-rw-r--r--Tex/Master/Master.toc126
1 files changed, 64 insertions, 62 deletions
diff --git a/Tex/Master/Master.toc b/Tex/Master/Master.toc
index e0fb3ae..5c19a96 100644
--- a/Tex/Master/Master.toc
+++ b/Tex/Master/Master.toc
@@ -1,74 +1,76 @@
\select@language {english}
\contentsline {chapter}{\numberline {1}Introduction}{1}
-\contentsline {section}{\numberline {1.1}Structure}{1}
-\contentsline {section}{\numberline {1.2}Disclaimer}{1}
-\contentsline {chapter}{\numberline {2}GSM}{3}
-\contentsline {section}{\numberline {2.1}A Historical Perspective}{3}
-\contentsline {section}{\numberline {2.2}The GSM Network}{5}
-\contentsline {subsection}{\numberline {2.2.1}Mobile Station}{6}
-\contentsline {subsection}{\numberline {2.2.2}Network Subsystem}{9}
-\contentsline {subsubsection}{Mobile Switching Center}{10}
-\contentsline {subsubsection}{Home Location Register}{10}
-\contentsline {subsubsection}{Visitor Location Register}{12}
-\contentsline {subsubsection}{Equipment Identification Register}{12}
-\contentsline {subsubsection}{Authentication Center}{12}
-\contentsline {subsection}{\numberline {2.2.3}Intelligent Network}{14}
-\contentsline {subsection}{\numberline {2.2.4}Base Station Subsystem}{15}
-\contentsline {subsubsection}{Frequencies and the Cellular Principle}{15}
+\contentsline {section}{\numberline {1.1}Motivation}{1}
+\contentsline {section}{\numberline {1.2}Structure}{2}
+\contentsline {section}{\numberline {1.3}Disclaimer}{2}
+\contentsline {section}{\numberline {1.4}On Typesetting}{3}
+\contentsline {chapter}{\numberline {2}GSM}{5}
+\contentsline {section}{\numberline {2.1}A Historical Perspective}{5}
+\contentsline {section}{\numberline {2.2}The GSM Network}{7}
+\contentsline {subsection}{\numberline {2.2.1}Mobile Station}{9}
+\contentsline {subsection}{\numberline {2.2.2}Network Subsystem}{11}
+\contentsline {subsubsection}{Mobile Switching Center}{12}
+\contentsline {subsubsection}{Home Location Register}{12}
+\contentsline {subsubsection}{Visitor Location Register}{14}
+\contentsline {subsubsection}{Authentication Center}{14}
+\contentsline {subsection}{\numberline {2.2.3}Base Station Subsystem}{16}
+\contentsline {subsubsection}{Frequencies and the Cellular Principle}{16}
\contentsline {subsubsection}{Base Transceiver Station}{18}
-\contentsline {subsubsection}{Base Station Controller}{20}
-\contentsline {subsubsection}{Transcoding rate and Adaption Unit}{21}
-\contentsline {section}{\numberline {2.3}The $U_m$ Interface}{22}
-\contentsline {subsection}{\numberline {2.3.1}Radio Transmission}{23}
-\contentsline {subsubsection}{Frame Numbering}{24}
-\contentsline {subsubsection}{Burst Types}{26}
-\contentsline {subsection}{\numberline {2.3.2}Logical Channels}{27}
-\contentsline {subsubsection}{Dedicated Channels}{28}
-\contentsline {subsubsection}{Common Channels}{28}
-\contentsline {subsubsection}{Combinations}{29}
-\contentsline {subsection}{\numberline {2.3.3}Layers}{30}
-\contentsline {paragraph}{Physical Layer (Layer 1):}{30}
-\contentsline {paragraph}{Data Link (Layer 2):}{30}
-\contentsline {paragraph}{Network (Layer 3):}{30}
-\contentsline {section}{\numberline {2.4}IMSI-Catcher}{32}
-\contentsline {subsection}{\numberline {2.4.1}Mode of Operation}{33}
-\contentsline {subsubsection}{Attacks}{35}
-\contentsline {paragraph}{MS is in normal cell selection mode:}{35}
-\contentsline {paragraph}{MS is already connected to a network:}{35}
-\contentsline {subsubsection}{Risks and Irregularities}{36}
-\contentsline {subsection}{\numberline {2.4.2}Law Situation in Germany}{36}
-\contentsline {chapter}{\numberline {3}IMSI Catcher Detection}{39}
-\contentsline {section}{\numberline {3.1}Framework and Hardware}{39}
-\contentsline {subsection}{\numberline {3.1.1}OsmocomBB}{39}
-\contentsline {subsubsection}{Project Status}{40}
-\contentsline {subsection}{\numberline {3.1.2}Motorola C123}{41}
-\contentsline {subsubsection}{OsmocomBB and ICDS}{42}
-\contentsline {section}{\numberline {3.2}Procedure}{43}
-\contentsline {subsection}{\numberline {3.2.1}Information Gathering}{43}
-\contentsline {subsection}{\numberline {3.2.2}Information Evaluation}{46}
-\contentsline {subsubsection}{Neighbourhood Structure}{48}
-\contentsline {subsubsection}{Base Station Evaluation}{49}
-\contentsline {subsection}{\numberline {3.2.3}Forged Parameters}{51}
-\contentsline {subsubsection}{Database Rules}{52}
-\contentsline {section}{\numberline {3.3}IMSI Catcher Detection System}{53}
-\contentsline {subsection}{\numberline {3.3.1}Implemetation}{53}
-\contentsline {subsection}{\numberline {3.3.2}Configuration}{54}
-\contentsline {subsection}{\numberline {3.3.3}Operation}{55}
-\contentsline {paragraph}{Sweep scans:}{58}
-\contentsline {paragraph}{CellID Information:}{58}
-\contentsline {paragraph}{Location Area Database:}{60}
-\contentsline {paragraph}{Scan Encryption:}{60}
-\contentsline {paragraph}{User Mode:}{60}
+\contentsline {subsubsection}{Base Station Controller}{19}
+\contentsline {section}{\numberline {2.3}The $U_m$ Interface}{21}
+\contentsline {subsection}{\numberline {2.3.1}Radio Transmission}{21}
+\contentsline {subsubsection}{Frame Numbering}{22}
+\contentsline {subsubsection}{Burst Types}{24}
+\contentsline {subsection}{\numberline {2.3.2}Logical Channels}{25}
+\contentsline {subsubsection}{Dedicated Channels}{25}
+\contentsline {subsubsection}{Common Channels}{26}
+\contentsline {subsubsection}{Combinations}{27}
+\contentsline {subsection}{\numberline {2.3.3}Layers}{27}
+\contentsline {paragraph}{Physical Layer (Layer 1):}{27}
+\contentsline {paragraph}{Data Link (Layer 2):}{28}
+\contentsline {paragraph}{Network (Layer 3):}{28}
+\contentsline {section}{\numberline {2.4}IMSI-Catcher}{28}
+\contentsline {subsection}{\numberline {2.4.1}Mode of Operation}{29}
+\contentsline {subsubsection}{Attacks}{31}
+\contentsline {paragraph}{MS is in normal cell selection mode:}{31}
+\contentsline {paragraph}{MS is already connected to a network:}{31}
+\contentsline {subsubsection}{Risks and Irregularities}{32}
+\contentsline {subsection}{\numberline {2.4.2}Law Situation in Germany}{32}
+\contentsline {chapter}{\numberline {3}IMSI Catcher Detection}{35}
+\contentsline {section}{\numberline {3.1}Framework and Hardware}{35}
+\contentsline {subsection}{\numberline {3.1.1}OsmocomBB}{35}
+\contentsline {subsubsection}{Project Status}{36}
+\contentsline {subsection}{\numberline {3.1.2}Motorola C123}{37}
+\contentsline {subsection}{\numberline {3.1.3}OsmocomBB and ICDS}{38}
+\contentsline {section}{\numberline {3.2}Procedure}{39}
+\contentsline {subsection}{\numberline {3.2.1}Information Gathering}{39}
+\contentsline {subsection}{\numberline {3.2.2}Information Evaluation}{42}
+\contentsline {subsubsection}{Neighbourhood Structure}{44}
+\contentsline {subsubsection}{Base Station Evaluation}{45}
+\contentsline {subsection}{\numberline {3.2.3}Forged Parameters}{47}
+\contentsline {subsubsection}{Database Rules}{48}
+\contentsline {subsubsection}{Remaining Issues and Paging}{49}
+\contentsline {section}{\numberline {3.3}IMSI Catcher Detection System}{50}
+\contentsline {subsection}{\numberline {3.3.1}Implemetation}{50}
+\contentsline {subsection}{\numberline {3.3.2}Configuration}{51}
+\contentsline {subsection}{\numberline {3.3.3}Operation}{52}
+\contentsline {paragraph}{Sweep scans:}{55}
+\contentsline {paragraph}{CellID Information:}{55}
+\contentsline {paragraph}{Location Area Database:}{57}
+\contentsline {paragraph}{PCH Scan:}{57}
+\contentsline {paragraph}{User Mode:}{57}
+\contentsline {section}{\numberline {3.4}Related Projects}{58}
\contentsline {chapter}{\numberline {4}Evaluation}{61}
\contentsline {section}{\numberline {4.1}Performance Evaluation}{61}
\contentsline {subsection}{\numberline {4.1.1}Scan Duration}{62}
\contentsline {subsection}{\numberline {4.1.2}Cell ID Databases}{63}
-\contentsline {subsection}{\numberline {4.1.3}Encryption Detection Speed}{63}
+\contentsline {subsection}{\numberline {4.1.3}PCH Scan Speed}{63}
\contentsline {section}{\numberline {4.2}IMSI Catcher Detection}{63}
\contentsline {subsection}{\numberline {4.2.1}Open Source IMSI Catcher}{64}
-\contentsline {subsection}{\numberline {4.2.2}Rule Evaluation}{65}
-\contentsline {subsection}{\numberline {4.2.3}Long Term Test}{66}
-\contentsline {subsection}{\numberline {4.2.4}Attack Scenarios}{67}
+\contentsline {subsubsection}{Nokia 3310}{65}
+\contentsline {subsection}{\numberline {4.2.2}Rule Evaluation}{66}
+\contentsline {subsection}{\numberline {4.2.3}Long Term Test}{67}
+\contentsline {subsection}{\numberline {4.2.4}Attack Scenarios}{68}
\contentsline {chapter}{\numberline {5}Conclusion}{71}
\contentsline {section}{\numberline {5.1}Future Work}{71}
\contentsline {chapter}{Bibliography}{73}