We know where you are!

Siddharth Prakash Rao, Ian Oliver, Silke Holtmanns, Tuomas Aura

Tutkimustuotos: Artikkeli kirjassa/konferenssijulkaisussaConference contributionScientificvertaisarvioitu

10 Sitaatiot (Scopus)


Mobile network technologies require some degree of tracking of user location, specifically user equipment tracking, as part of their fundamental mechanism of working. Without this basic function, features such as hand-over between cells would not work. Since mobile devices are typically associated with a single person, this provides a potential mechanism for user location surveillance. Network operators are bound by strict privacy legislation. However, spying by certain agencies, hackers and even advertisers without the users' or operators' knowledge has become a serious issue. In this article, we introduce and explain all known recent attacks on mobile networks that compromised user privacy. We focus on attacks using the Signalling System 7 (SS7) protocol as the interconnection interface between operators mainly in GSM networks. In addition, we outline a novel evolution of location tracking for LTE networks. One reason these attacks are not widely published or known by the general public is due to the complex and arcane nature of the networks and their protocols. Mobile network interfaces are 'hidden' from users, and therefore the general public's interest in such attacks is much lower compared to other phone vulnerabilities. The purpose of the paper is to raise awareness about the current location tracking problem in cellular networks, the existing countermeasures and to encourage further research in the area for 5G networks.

Otsikko2016 8th International Conference on Cyber Conflict: Cyber Power, CyCon 2016
ISBN (elektroninen)9789949954483
DOI - pysyväislinkit
TilaJulkaistu - 2 elok. 2016
OKM-julkaisutyyppiA4 Artikkeli konferenssijulkaisuussa
TapahtumaInternational Conference on Cyber Conflict - Tallinn, Viro
Kesto: 31 toukok. 20163 kesäk. 2016
Konferenssinumero: 8


ConferenceInternational Conference on Cyber Conflict


Sukella tutkimusaiheisiin 'We know where you are!'. Ne muodostavat yhdessä ainutlaatuisen sormenjäljen.

Siteeraa tätä