summaryrefslogtreecommitdiffstats
path: root/Tex/Content
diff options
context:
space:
mode:
Diffstat (limited to 'Tex/Content')
-rw-r--r--Tex/Content/Abstract.tex4
-rw-r--r--Tex/Content/Acknowledgements.tex3
-rw-r--r--Tex/Content/Declaration.tex6
-rw-r--r--Tex/Content/Disclaimer.tex0
-rw-r--r--Tex/Content/Evaluation.tex10
5 files changed, 23 insertions, 0 deletions
diff --git a/Tex/Content/Abstract.tex b/Tex/Content/Abstract.tex
index 03fa1ea..0030edf 100644
--- a/Tex/Content/Abstract.tex
+++ b/Tex/Content/Abstract.tex
@@ -1 +1,5 @@
+\begin{center}
+ \textbf{Abstract:}
+\end{center}
+
asjdajslkdajdalsdj
diff --git a/Tex/Content/Acknowledgements.tex b/Tex/Content/Acknowledgements.tex
new file mode 100644
index 0000000..2b3899b
--- /dev/null
+++ b/Tex/Content/Acknowledgements.tex
@@ -0,0 +1,3 @@
+\begin{center}
+ \textbf{Acknowledgements:}
+\end{center} \ No newline at end of file
diff --git a/Tex/Content/Declaration.tex b/Tex/Content/Declaration.tex
new file mode 100644
index 0000000..27e9b92
--- /dev/null
+++ b/Tex/Content/Declaration.tex
@@ -0,0 +1,6 @@
+\noindent{\huge \textbf{Declaration}}\\\\\\
+I hereby declare that this thesis has been composed by me without any assistance and I have not used any sources or tools other than those cited.
+Furthermore I declare that this thesis has not been accepted in any other previous application for a degree.
+\vfill
+\rule{5cm}{.5pt}\\
+\phantom{ab}Freiburg, \today \ No newline at end of file
diff --git a/Tex/Content/Disclaimer.tex b/Tex/Content/Disclaimer.tex
new file mode 100644
index 0000000..e69de29
--- /dev/null
+++ b/Tex/Content/Disclaimer.tex
diff --git a/Tex/Content/Evaluation.tex b/Tex/Content/Evaluation.tex
index 84426a2..06793b0 100644
--- a/Tex/Content/Evaluation.tex
+++ b/Tex/Content/Evaluation.tex
@@ -296,9 +296,19 @@ The first scenario will simulate the case where the catcher opened up a new cell
The second scenario simulates the attack where the IMSI catcher replaces a base station with a bad reception in the neighbourhood of the cell the \gls{ms} is connected to.
This way the reception drastically improves on that particular frequency suggesting to the \gls{ms} that the subscriber moved to the close perimeter of that \gls{bts} and initiating a handover.
+
Figure \ref{fig:takeover_attack} illustrates this particular attack.
+The station with the \gls{arfcn} 42 has the lowest reception with its signal to noise ratio of -95\,dB.
+In this particular scenario the \gls{ms} would first connect to the station on 23 because of its good reception.
+After that the IMSI catcher is turned on also on \gls{arfcn} 42.
+Due to its location it has the best reception level of all the available base station.
+Since it replaced station 42 it is most likely in the neighbourhood list of 23.
+When the \gls{ms} conducts a neighbouring cell measurement it will find that the catcher has the best reception and will switch to it.
+Disconnection and cell re-selection of the \gls{ms} could also be achieved instantly by jamming \gls{arfcn} 23.
+Since the catcher sends a different \gls{lac} the \gls{ms} will send a location update to the IMSI catcher announcing its presence.
\begin{figure}
\centering
+\includegraphics{../Images/replace_attack}
\caption{Takeover attack of an IMSI catcher on a base station.}
\label{fig:takeover_attack}
\end{figure} \ No newline at end of file