summaryrefslogtreecommitdiffstats
path: root/Tex/Master/Master.aux
diff options
context:
space:
mode:
Diffstat (limited to 'Tex/Master/Master.aux')
-rw-r--r--Tex/Master/Master.aux185
1 files changed, 112 insertions, 73 deletions
diff --git a/Tex/Master/Master.aux b/Tex/Master/Master.aux
index e02fe9e..e06be07 100644
--- a/Tex/Master/Master.aux
+++ b/Tex/Master/Master.aux
@@ -87,6 +87,7 @@
\@writefile{toc}{\contentsline {subsubsection}{Equipment Identification Register}{12}}
\FN@pp@footnote@aux{5}{12}
\@writefile{toc}{\contentsline {subsubsection}{Authentication Center}{12}}
+\newlabel{sec:authentication}{{2.2.2}{12}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.3}{\ignorespaces Authentication procedure.}}{13}}
\newlabel{fig:authentication}{{2.3}{13}}
\citation{kommsys2006}
@@ -97,43 +98,43 @@
\newlabel{fig:frequency}{{2.4}{15}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.4}Base Station Subsystem}{15}}
\newlabel{sec:bss}{{2.2.4}{15}}
+\citation{kommsys2006}
+\citation{kommsys2006}
\citation{GSM2009}
+\@writefile{lot}{\contentsline {table}{\numberline {2.4}{\ignorespaces Frequencies in the different bands \cite {kommsys2006}.}}{16}}
+\newlabel{tab:frequencies}{{2.4}{16}}
\@writefile{toc}{\contentsline {subsubsection}{Frequencies and the Cellular Principle}{16}}
\citation{protocols1999}
-\citation{kommsys2006}
-\citation{kommsys2006}
\citation{GSM2009}
\citation{GSM2009}
\citation{kommsys2006}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.5}{\ignorespaces Theoretical arrangement of radio cells compared to a realistic alignment. Cells with the same number share the same frequency \cite {GSM2009}.}}{17}}
+\newlabel{fig:cells}{{2.5}{17}}
\citation{protocols1999}
\citation{protocols1999}
\citation{protocols1999}
-\@writefile{lot}{\contentsline {table}{\numberline {2.4}{\ignorespaces Frequencies in the different bands \cite {kommsys2006}.}}{17}}
-\newlabel{tab:frequencies}{{2.4}{17}}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.5}{\ignorespaces Theoretical arrangement of radio cells compared to a realistic alignment. Cells with the same number share the same frequency \cite {GSM2009}.}}{17}}
-\newlabel{fig:cells}{{2.5}{17}}
-\@writefile{toc}{\contentsline {subsubsection}{Base Transceiver Station}{17}}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.6}{\ignorespaces Common base station configurations. Compiled from \cite {protocols1999}.}}{18}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {Stantard configuration.}}}{18}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Umbrella cell configuration.}}}{18}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(c)}{\ignorespaces {Sectorised configuration.}}}{18}}
-\newlabel{fig:configurations}{{2.6}{18}}
\citation{kommsys2006}
-\@writefile{toc}{\contentsline {subsubsection}{Baste Station Controller}{19}}
+\@writefile{toc}{\contentsline {subsubsection}{Base Transceiver Station}{18}}
+\@writefile{toc}{\contentsline {subsubsection}{Baste Station Controller}{18}}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.6}{\ignorespaces Common base station configurations. Compiled from \cite {protocols1999}.}}{19}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {Stantard configuration.}}}{19}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Umbrella cell configuration.}}}{19}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(c)}{\ignorespaces {Sectorised configuration.}}}{19}}
+\newlabel{fig:configurations}{{2.6}{19}}
\citation{kommsys2006}
-\@writefile{toc}{\contentsline {subsubsection}{Transcoding rate and Adaption Unit}{20}}
\citation{kommsys2006}
\citation{kommsys2006}
-\citation{protocols1999}
\@writefile{lof}{\contentsline {figure}{\numberline {2.7}{\ignorespaces Cyphering procedure for one frame of voice data. Adopted from \cite {kommsys2006}.}}{21}}
\newlabel{fig:cypher}{{2.7}{21}}
+\@writefile{toc}{\contentsline {subsubsection}{Transcoding rate and Adaption Unit}{21}}
+\citation{protocols1999}
\@writefile{toc}{\contentsline {section}{\numberline {2.3}The $U_m$ Interface}{22}}
\newlabel{sec:Um}{{2.3}{22}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Radio Transmission}{22}}
\newlabel{sec:radio}{{2.3.1}{22}}
-\@writefile{toc}{\contentsline {subsubsection}{Frame Numbering}{22}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.8}{\ignorespaces The combination of FDMA and TDMA.}}{23}}
\newlabel{fig:fdma_tdma}{{2.8}{23}}
+\@writefile{toc}{\contentsline {subsubsection}{Frame Numbering}{23}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.9}{\ignorespaces Hierarchical Composition of the different frames.}}{24}}
\newlabel{fig:frame_hierarchy}{{2.9}{24}}
\citation{GSM2009}
@@ -142,11 +143,11 @@
\@writefile{lof}{\contentsline {figure}{\numberline {2.10}{\ignorespaces Structural Comparison of different Burst types. After \cite {GSM2009}.}}{25}}
\newlabel{fig:burst_types}{{2.10}{25}}
\@writefile{toc}{\contentsline {subsubsection}{Burst Types}{25}}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.11}{\ignorespaces Mapping of virtual channels on time slots.}}{26}}
-\newlabel{fig:channels}{{2.11}{26}}
+\citation{kommsys2006}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}Logical Channels}{26}}
\newlabel{sec:channels}{{2.3.2}{26}}
-\citation{kommsys2006}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.11}{\ignorespaces Mapping of virtual channels on time slots.}}{27}}
+\newlabel{fig:channels}{{2.11}{27}}
\@writefile{toc}{\contentsline {subsubsection}{Dedicated Channels}{27}}
\@writefile{toc}{\contentsline {subsubsection}{Common Channels}{27}}
\citation{gsm0502}
@@ -156,94 +157,129 @@
\citation{protocols1999}
\citation{kommsys2006}
\citation{kommsys2006}
-\citation{protocols1999}
\@writefile{toc}{\contentsline {subsubsection}{Combinations}{28}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.3}Layers}{28}}
-\newlabel{sec:layers}{{2.3.3}{28}}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.12}{\ignorespaces Snippet of a Multiframe-configurations for a base station from \cite {kommsys2006}.}}{29}}
-\newlabel{fig:channel_example}{{2.12}{29}}
-\citation{3gpp_ts_0405}
-\citation{3gpp_ts_0406}
-\@writefile{lot}{\contentsline {table}{\numberline {2.5}{\ignorespaces Possible combinations of logical channels for the base station. From \cite {GSM2009}.}}{30}}
-\@writefile{toc}{\contentsline {paragraph}{Physical Layer (Layer 1):}{30}}
-\@writefile{toc}{\contentsline {paragraph}{Data Link (Layer 2):}{30}}
+\citation{protocols1999}
+\citation{GSM0405}
+\citation{GSM0406}
+\@writefile{lot}{\contentsline {table}{\numberline {2.5}{\ignorespaces Possible combinations of logical channels for the base station. From \cite {GSM2009}.}}{29}}
+\newlabel{tab:channel_configurations}{{2.5}{29}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.3}Layers}{29}}
+\newlabel{sec:layers}{{2.3.3}{29}}
+\@writefile{toc}{\contentsline {paragraph}{Physical Layer (Layer 1):}{29}}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.12}{\ignorespaces Snippet of a Multiframe-configurations for a base station from \cite {kommsys2006}.}}{30}}
+\newlabel{fig:channel_example}{{2.12}{30}}
\citation{protocols1999}
\citation{fox}
+\citation{imsi_wiki}
\citation{fox}
\citation{dennis}
\citation{def_catcher}
+\citation{fox}
+\citation{def_catcher}
+\citation{fox}
+\citation{def_catcher}
+\@writefile{toc}{\contentsline {paragraph}{Data Link (Layer 2):}{31}}
\@writefile{toc}{\contentsline {paragraph}{Network (Layer 3):}{31}}
\@writefile{toc}{\contentsline {section}{\numberline {2.4}IMSI-Catcher}{31}}
\newlabel{sec:catcher}{{2.4}{31}}
-\FN@pp@footnote@aux{6}{31}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.13}{\ignorespaces A commercial catcher by Rhode \& Schwarz and a self built catcher introduced at Defcon 2010.}}{32}}
+\citation{mueller}
+\citation{mueller}
+\citation{mueller}
+\citation{fox}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.13}{\ignorespaces A commercial catcher by Rhode \& Schwarz \cite {fox} and a self built catcher introduced at Defcon 2010 \cite {def_catcher}.}}{32}}
\newlabel{fig:catchers}{{2.13}{32}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}Mode of Operation}{32}}
\newlabel{sec:catcher_operation}{{2.4.1}{32}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.2}Law Situation in Germany}{32}}
-\newlabel{sec:catcher_law}{{2.4.2}{32}}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.14}{\ignorespaces IMSI catching procedure. Adopted and simplified from \cite {mueller}.}}{33}}
+\newlabel{fig:catcher_catch}{{2.14}{33}}
+\citation{mueller}
+\citation{fox}
+\citation{dennis}
+\citation{mueller}
+\citation{imsi_wiki}
+\citation{mueller}
+\@writefile{toc}{\contentsline {subsubsection}{Attacks}{34}}
+\newlabel{sec:attacks}{{2.4.1}{34}}
+\@writefile{toc}{\contentsline {paragraph}{\gls {ms} is in normal cell selection mode:}{34}}
+\citation{fox}
+\@writefile{toc}{\contentsline {paragraph}{\gls {ms} is already connected to a network:}{35}}
+\@writefile{toc}{\contentsline {subsubsection}{Risks and Irregularities}{35}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.2}Law Situation in Germany}{35}}
+\newlabel{sec:catcher_law}{{2.4.2}{35}}
+\citation{imsi_wiki}
+\citation{criminal_justice}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
-\@writefile{toc}{\contentsline {chapter}{\numberline {3}IMSI Catcher Detection}{33}}
+\@writefile{toc}{\contentsline {chapter}{\numberline {3}IMSI Catcher Detection}{37}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{lol}{\addvspace {10\p@ }}
-\@writefile{toc}{\contentsline {section}{\numberline {3.1}Procedure}{33}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}Information Gathering}{33}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.2}Information Evaluation}{33}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.3}Problems}{33}}
-\@writefile{toc}{\contentsline {subsubsection}{Solutions}{33}}
-\@writefile{toc}{\contentsline {section}{\numberline {3.2}Frameworks and Hardware}{33}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}OsmoconBB}{33}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.2}Motorola C123}{33}}
-\@writefile{toc}{\contentsline {section}{\numberline {3.3}Implementation}{33}}
-\@writefile{toc}{\contentsline {section}{\numberline {3.4}IMSI Catcher Detection System}{33}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}Configuration}{33}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.2}Operation}{33}}
-\FN@pp@footnotehinttrue
-\FN@pp@footnotehinttrue
-\@writefile{toc}{\contentsline {chapter}{\numberline {4}Evaluation}{35}}
+\@writefile{toc}{\contentsline {section}{\numberline {3.1}Frameworks and Hardware}{37}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.1}OsmoconBB}{37}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.2}Motorola C123}{37}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.1.3}GNS 5870 MFI}{37}}
+\@writefile{toc}{\contentsline {section}{\numberline {3.2}Procedure}{37}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Information Gathering}{37}}
+\newlabel{sec:info_gathering}{{3.2.1}{37}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.2}Information Evaluation}{37}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.3}Further Improvements}{37}}
+\@writefile{toc}{\contentsline {section}{\numberline {3.3}Implementation}{37}}
+\@writefile{toc}{\contentsline {section}{\numberline {3.4}IMSI Catcher Detection System}{37}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}Configuration}{37}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.2}Operation}{37}}
+\FN@pp@footnotehinttrue
+\FN@pp@footnotehinttrue
+\@writefile{toc}{\contentsline {chapter}{\numberline {4}Evaluation}{39}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{lol}{\addvspace {10\p@ }}
-\@writefile{toc}{\contentsline {section}{\numberline {4.1}Open Field Statistics}{35}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.1}Bayesian Filter}{35}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.2}Detection System}{35}}
-\@writefile{toc}{\contentsline {section}{\numberline {4.2}Example Scenarios}{35}}
+\@writefile{toc}{\contentsline {section}{\numberline {4.1}Open Field Statistics}{39}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.1}Bayesian Filter}{39}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.2}Detection System}{39}}
+\@writefile{toc}{\contentsline {section}{\numberline {4.2}Example Scenarios}{39}}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
-\@writefile{toc}{\contentsline {chapter}{\numberline {5}Conclusion}{37}}
+\@writefile{toc}{\contentsline {chapter}{\numberline {5}Conclusion}{41}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{lol}{\addvspace {10\p@ }}
-\@writefile{toc}{\contentsline {section}{\numberline {5.1}Future Work}{37}}
+\@writefile{toc}{\contentsline {section}{\numberline {5.1}Future Work}{41}}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
\bibstyle{acm}
\citation{*}
\bibdata{../Content/Bibliography}
-\bibcite{GSM0505}{1}
-\bibcite{GSM0207}{2}
-\bibcite{ISO7810}{3}
-\bibcite{GSM23078}{4}
-\bibcite{GSM23003}{5}
-\bibcite{blacklisting}{6}
-\bibcite{3gpp_Proposal2000}{7}
-\bibcite{GSM2009}{8}
-\bibcite{GSM_stats2011}{9}
-\bibcite{GSM_history2011}{10}
-\bibcite{overview1994}{11}
-\bibcite{protocols1999}{12}
+\bibcite{GSM0405}{1}
+\bibcite{GSM0406}{2}
+\bibcite{GSM0505}{3}
+\bibcite{GSM0207}{4}
+\bibcite{ISO7810}{5}
+\bibcite{gsm0502}{6}
+\bibcite{GSM23078}{7}
+\bibcite{GSM23003}{8}
+\bibcite{3gpp_Proposal2000}{9}
+\bibcite{GSM2009}{10}
+\bibcite{mueller}{11}
+\bibcite{fox}{12}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
\@writefile{toc}{\contentsline {chapter}{Bibliography}{I}}
-\bibcite{hsdpa}{13}
-\bibcite{hsupa}{14}
-\bibcite{kommsys2006}{15}
-\bibcite{overview1996}{16}
-\bibcite{ITU1200}{17}
-\bibcite{ITU212}{18}
+\bibcite{GSM_stats2011}{13}
+\bibcite{GSM_history2011}{14}
+\bibcite{overview1994}{15}
+\bibcite{protocols1999}{16}
+\bibcite{hsdpa}{17}
+\bibcite{hsupa}{18}
+\bibcite{criminal_justice}{19}
+\bibcite{kommsys2006}{20}
+\bibcite{overview1996}{21}
+\bibcite{def_catcher}{22}
+\bibcite{ITU1200}{23}
+\bibcite{ITU212}{24}
+\bibcite{dennis}{25}
+\bibcite{blacklisting}{26}
+\bibcite{imsi_wiki}{27}
\FN@pp@footnotehinttrue
\citation{GSM2009}
\citation{GSM_history2011}
@@ -253,6 +289,9 @@
\citation{kommsys2006}
\citation{GSM2009}
\citation{kommsys2006}
+\citation{raven}
+\citation{def_catcher}
+\citation{mueller}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue