Title :
GSM OTA SIM Cloning Attack and Cloning Resistance in EAP-SIM and USIM
Author :
Singh, Jaskirat ; Ruhl, Ron ; Lindskog, Dale
Author_Institution :
Inf. Syst. Security Dept., Concordia Univ. Coll. of Alberta, Edmonton, AB, Canada
Abstract :
Global System for Mobile communications (GSM) is the most popular telecommunication protocol used in telecommunication networks. The GSM protocol has weaknesses in the security of its unique identifiers which makes possible cloning in various circumstances. This paper will show, by comparison with physical cloning attacks, how an attacker can perform SIM (Subscriber Identity Module) cloning over the air by exploiting weaknesses in standard GSM communication. This paper will describe the requirements and process of over the air (OTA) cloning, including the process of obtaining the ICCID (Integrated Circuit Card Identifier). In addition, this paper will show how EAP-SIM (Extensible Authentication Protocol for GSM SIM) and USIM (Universal Subscriber Identity Module) are more secure from cloning than GSM, and under what circumstances they remain vulnerable to cloning. As a base for comparison this paper will also describe physical cloning.
Keywords :
cellular radio; cryptographic protocols; telecommunication security; EAP-SIM; GSM communication; GSM protocol; Global System for Mobile communication; ICCID; OTA SIM cloning attack; OTA SIM cloning resistance; USIM; extensible authentication protocol; integrated circuit card identifier; over the air cloning; physical cloning attack; subscriber identity module cloning; telecommunication protocol; universal subscriber identity module; 3G mobile communication; Authentication; Cloning; Encryption; GSM; Protocols; Cloning; EAP-SIM; GSM; OTA Cloning attack; USIM;
Conference_Titel :
Social Computing (SocialCom), 2013 International Conference on
Conference_Location :
Alexandria, VA
DOI :
10.1109/SocialCom.2013.161