NUST Institutional Repository

Development Of GSM Sniffer

Show simple item record

dc.contributor.author Khawaja, Ahthsham
dc.contributor.author Majeed, Rana Umar
dc.contributor.author Farrukh, Muhammad
dc.contributor.author Younas, Muhammad Umer
dc.contributor.author Supervised by Dr. Adnan Rashdi
dc.date.accessioned 2020-10-29T05:25:05Z
dc.date.available 2020-10-29T05:25:05Z
dc.date.issued 2012-06
dc.identifier.other PTC-144
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/7584
dc.description.abstract Development of GSM Sniffer of GSM was developed. In this time frame many security problem and secrecy concerns have been observed and raised. GSM is required to be reliable because of its present utilization at huge level. Unfortunately GSM, over Um interface, provides security through obscurity. The GSM communication was only secure till the time the “rainbow tables” of security algorithms like A5 were not available. In 1999 Goldberg, Wagner and Global System for Mobile communication (GSM) is one of the most significant technological advancements of recent times. More than 5 billion people all over the world rely on GSM networks for at least the small portion of their daily communications which include phone calls and SMSs. There are more than 108 million subscribers in Pakistan in April 2009. 90% of Pakistan’s population is in areas with GSM coverage. Instead of the communication purpose only, GSM networks are also being used for financial activities for example “Easy Paisa” service is introduced by Telenor in Pakistan. The more important the role of GSM in our life, the more important for us is the security aspect of GSM. Almost 20 years have been passed since the design Green presented the A5/2 cryptanalysis. In this project we implemented a “man-in-the-middle attack” on Um interface. The aim of this man in the middle attack is to connect victim cell phone forcefully to attacker’s equipment which is then connected to original GSM service provider. This forcefully connectivity gives control over the victim transmission which enables attacker to block, modify, and eavesdrop and/or to create data on the behalf of the victim without letting him know. en_US
dc.language.iso en en_US
dc.title Development Of GSM Sniffer en_US
dc.type Technical Report en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account