Location:
Search - intruder
Search list
Description: a paper about UMTS, In this paper authors present a man-in-the-middle attack on the
Universal Mobile Telecommunication Standard (UMTS),
one of the newly emerging 3G mobile technologies. The attack
allows an intruder to impersonate a valid GSM base station
to a UMTS subscriber regardless of the fact that UMTS
authentication and key agreement are used. As a result, an
intruder can eavesdrop on all mobile-station-initiated traffic
Platform: |
Size: 97280 |
Author: aliaskari
|
Hits: