电子科技大学   格拉斯哥学院   2017级    刘钰玺    无同组同学

1. Introduction

Recently, the real experience of a netizen on Weibo has aroused many people’s concerns. In his blog " the theft of Alipay and bank app", he recorded such an incredible experience. The criminals stole his Alipay and bank account for consumption and loan, spending a total amount of 18696.29 yuan. During this period, the mobile phone of this netizen is put next to his pillow, his bank card is also in the home, and the password was also not known by others.
        If you have ever used Alipay or Mobile Internet banking, you should still have some impression that the opening and login of these financial apps are verified by mobile phone number, my name, id number, and bank card. Once upon a time, this verification method is reliable. Mobile phone is right in his hand, and, after all, when you receive the verification code which is only effective within 60 seconds, and then fill it to the verification box, which is so perfect that it seems that people feel safe enough. For convenience, a lot of apps’ landing or binding mode is simplified to phone number and authentication code. But in this way, the lawbreakers are left with an opportunity.
        The mobile phones we are using now, whether Huawei, iPhone or which can support 4G, 4G+ network, in fact, all are come from GSM system. The development of mobile network is from 1.0 (analog communication) to 2.0 (GSM) to 3.0 (3G) to 4.0 (4G/4G+).
        In mobile phone network 2.0, which is also named GSM system era, mobile phone voice and SMS transmitted the digital signal for the first time. Due to the long age and the technical restrictions at that time, GSM mobile phone’ message is one-way authentication and in clear text transmission. That is to say, if your mobile phone receives a short message, and it is sent and received under GSM system, the base station (mobile operator terminal) will only verify whether the mobile phone is true (the network operator’s), but the mobile phone will not identify whether the base station is true (if it is not the really network operator).This loophole has led to the rise of fake base-stations (devices that criminals build to replace operators’ real base-stations on a small scale and commit crimes). At the beginning, the criminals’ brains were not so clever, they only used the fake base station to send some junk advertising to nearby mobile phones, but later this kind of SMS was automatically blocked by some SMS blocking apps, and thus no one used it anymore. They start to upgrade it to services that pretend to be carriers or some big Internet companies and use SMS messages to send you a web address to steal users’ private information or implant Trojan horses into their phones. Today, Internet finance has made great progress in China. The popularity of various online finance apps, banking apps and various takeout and e-commerce platforms has created an excellent opportunity for these criminals to steal.

2. Main Body

2.1 SMS Attacks

2.1.1 GSM-Sniffing of SMS
        The principle of GSM sniffing of SMS is that GSM messages are not encrypted and so criminals can use some eavesdropping techniques to hear the message content. The method is passive, that is, only “listen” but do not emit any illegal wireless signals.

2.1.2 GSM-Middlemen Obtain the Phone Number
        Attackers only hear the SMS messages, in fact, it is not useful. SMS verification code needs to cooperate with the website or app verification process to work. Therefore, an attacker must know the target’s mobile phone number, and may need other information, such as ID number, bank account and so on, which can be obtained by “bumping into the database” or by hacking into the account of some applications.
        So, an attacker gets the phone number through a man-in-the-middle attack.
        An attacker needs a 2G fake base station and a 2G fake terminal to allow the target phone to access the 2G fake base station, and then use the 2G fake terminal to pretend to be the target phone and access the operator network. When authentication information is needed during connection, it is taken from the target phone. After connecting to the network, call out a phone to a mobile phone that the attacker can see, and the attacker can see the phone number through the caller’s ID.

2.1.3 Principle of GSM-SMS Sniffing
        Intercept cell phone signals and analyze text messages and conversations, which sounds like something out of a movie, but it’s not as hard as you might think.
        As we all know, as a wireless device, a mobile phone must use a common base station for data exchange. No matter it is 2G, 3G or 4G networks, the essence of communication between the mobile phone and the base station is through radio waves, and radio waves are spread around, theoretically as long as any device within the range of the power emitted by the mobile phone can receive these radio waves.
        The radio wave reception method and format agreed between the base station and the mobile phone is the communication protocol.
        In China, 4G protocols of LTE is what we often see in the status bar (OFDM UWB), and it contains two benefits. The first one is that we can feel the speed is fast and low latency, and the second one is that there is a particularly important advantage: support VoIP calls, or what we say that voice and data can not only walk 4G channel, but also can use wired and wireless network transmission to get rid of the dependence on mobile signal. 3G used UMTS/WCDMA/ td-scdma. In this period, different operators had different systems and lacked a unified standard. Compared with 2G, 3G did not have many innovative points, and the speed could not meet the demand at that time. 2G networks use the GSM protocol, which is today’s culprit. The 2G network architecture is open source, and there is no encryption when it transfers data. As a result, the content of SMS is transmitted in plaintext, which provides an opportunity for criminals.
        Now that 2G networks are not completely obsolete, the threshold for doing bad things is falling off a cliff.
        On the hardware, criminals often modify the mobile phone MOTOROLA C118 on the Internet as cheap as that a dozen yuan can buy a set, along with data lines and other materials and tools, the total cost of the crime is only a few dozen yuan.
        In software, they no longer need professional help,As long as it makes use of OSMOCOMBB. The full name is Open Source Mobile Communications Baseband. It is a complete and Open Source GSM protocol implementation project from the hardware layer to the application layer. Its emergence makes it possible to make changes and add functions in the GSM protocol according to one’s own needs without learning complex network communication and hardware knowledge of communication equipment. GSM sniffing is one of the added features.
        In practice, criminals only need to compile a modified version of OSMOCOMBB into any mobile phone, combining software and hardware, so the phone can become a device that can be used to make reverse acquisition of radio waves emitted by a nearby base station, along with a computer that can easily make it complete with text messages flying around in the air.

2.2 Overview of CDMA

GSM is short for the Global System of Mobile Communication, which is a kind of communication standard of telephone. In China, China Mobile and China Unicom use the GSM system. China Telecom uses CDMA, which is called Code Division Multiple Access with a Chinese name as “Code Division Multiple Access”.
        The technology of CDMA is based on the spread spectrum technology. Specifically, the information data with a certain signal bandwidth which needs to be transmitted is modulated with a high-speed pseudo-random code whose bandwidth is much higher than the signal bandwidth, so that the bandwidth of the original data signal is extended and transmitted through carrier modulation. The receiver uses exactly the same pseudo random code for correlation processing with the received bandwidth signal, and replaces the broadband signal with the narrow-band signal of the original information data, namely de-amplification, to achieve the information communication. In CDMA communication systems, signals transmitted by different users are not distinguished by different frequencies or time slots but by different coding sequences or different waveforms of signals. Multiple CDMA signals will overlap mutually when observing in the frequency domain or the time domain.
        The receiver correlator can select the predetermined code type signal from multiple CDMA signals. Other signals that use different code types cannot be demodulated because they differ from the code types generated locally by the receiver. It is similar to the introduction of noise and interference in the channel, which is often called multiple access interference.
        Because the CDMA system has the abilities of anti-jamming, narrow band anti-interference, multipath anti-interference, and multipath delay spread anti-interference. Besides, it can improve the communication capacity of cellular system and facilitate the transition of coexistence and analog and digital system, which makes the CDMA digital cellular system to become a powerful competitor to the TDMA (time division multiple access) digital cellular system.

2.3 Application of CDMA to GSM hijacking and SMS sniffing

Therefore, what are the advantages of the CDMA theory for the recent GSM hijacking + SMS sniffing technology? The most fundamental reason is that CDMA complex encoding and decoding methods make it difficult for ordinary people to hijack, and CDMA does not need to identify with the base station, which avoids the GSM hijacked vulnerability.

2.4 Solution to GSM hijacking and SMS sniffing

The inspiration for a student who majors in communication engineering is that it involves the operation of network security. Nowadays, if each software wants to realize its function, then it is inseparable from the network. However, GSM’s inherent design flaws lead to its security problems that cannot be completely solved. Therefore, if you want to ensure the user’s information security in the future, then the use of CDMA module is essential in companies’ products.

3. End

To solve the problems of GSM hijacking and SMS sniffing, we can consider that it is complex for ordinary to hijack due to CDMA’s complex encoding and decoding methods, and CDMA does not need to identify with the base station, which avoids the GSM hijacked vulnerability. What inspires us is that this involves the operation of network security. Nowadays, if the software wants realize its function, then it is inseparable from the network. Whereas, GSM’s inherent design flaws lead to its security problems that cannot be completely solved. So, to ensure the user’s information security, it is essential for companies to use the CDMA module in their products.

Survey Report on CDMA ——Learning Triggered by GSM Hijacking相关推荐

  1. 001 A Comprehensive Survey of Privacy-preserving Federated Learning(便于寻找:FedAvg、垂直联邦学习的基本步骤)

    这是我看的第一篇关于联邦学习的论文,综述文章,让我对联邦学习有了初步的了解. A Comprehensive Survey of Privacy-preserving Federated Learni ...

  2. 深度强化学习综述论文 A Brief Survey of Deep Reinforcement Learning

    A Brief Survey of Deep Reinforcement Learning 深度强化学习的简要概述 作者: Kai Arulkumaran, Marc Peter Deisenroth ...

  3. A Survey on Deep Transfer Learning 2018 翻译

    A Survey on Deep Transfer Learning 2018 翻译 ((o)/~虽然这篇文章是2018年的,不是很新,但是写的通俗易懂,很适合刚接触迁移学习的同学,所以就翻译了) i ...

  4. 《A Survey on Distributed Machine Learning》笔记

    摘要:通过分布式系统进行机器学习,大概就是联邦学习吧 1. 引言 通过分布式系统来增加并行和I/O带宽总量,第二节探讨机器学习的系统挑战以及如何采用高性能计算(HPC)的想法来加速和提高整个机器学习的 ...

  5. 【自监督学习综述】A Survey on Contrastive Self-Supervised Learning

    论文地址:https://arxiv.org/abs/2011.00362 摘要 自监督学习越来越受欢迎,因为它能够降低注释大规模数据集的成本.它能够采用自定义的伪标记来监督,并将学习的表示形式用于多 ...

  6. [论文阅读笔记58]Learning from Noisy Labels with Deep Neural Networks:A Survey

    1.题目 Learning from Noisy Labels with Deep Neural Networks: A Survey 作者团队:韩国科学技术院(KAIST) Song H , Kim ...

  7. Phone 多方通话流程(GSM CDMA)

    写在前面的话 本文主要分析Voice Call多方通话的流程,分析GSM和CDMA在多方通话不同的地方,研究的代码是Android 6.0的,目前只关注framework层. 1. 多方通话的概念 下 ...

  8. Metric Learning Survey 文章汇总

    目录 0. Introductory Guides on Metric Learning 1. Metric Learning: A Survey 2. Deep Metric Learning: a ...

  9. AI:Algorithmia《2020 state of enterprise machine learning—2020年企业机器学习状况》翻译与解读

    AI:Algorithmia<2020 state of enterprise machine learning-2020年企业机器学习状况>翻译与解读 目录 <2020 state ...

最新文章

  1. 在OSX上安装Erlang
  2. 设计模式之简单工厂模式(静态工厂方法)
  3. android基础(基本框架的构成)
  4. cmd编译运行Java文件详解
  5. Oracle 常用命令
  6. JavaScript 编程精解 中文第三版 七、项目:机器人
  7. (转)正则表达式在ORACLE中的使用
  8. sqlite 迁移 oracle,Oracle 数据导入 Sqlite
  9. 机器学习中的距离/散度/熵
  10. 计蒜客 蓝桥杯模拟五 合并数字
  11. 【转载】C++ Interesting卡常数
  12. 世界各国与中国时差查询
  13. 如何建设研发部门体系,理清责任和关系
  14. Jira管理员配置手册
  15. TestNG 参数化测试
  16. laydate-v5.0.9自定义小时范围和分钟间隔(半小时)
  17. yxc_第一章 基础算法(二)_前缀和与差分
  18. 脑起搏器治疗帕金森病的原理
  19. Android源码在线查看网站
  20. 澳门一出租车司机滥收车费诬告乘客 被中止营业资格

热门文章

  1. 【Hadoop大数据分析与挖掘实战】(一)----------P19~22
  2. 用户输入商品价格和商品数量,以及收货地址,可以自动打印订单信息 分析:
  3. kuangbin带你飞 专题一
  4. 盘企lcms php开发框架,LCMS操作 · 盘企LCMS PHP开发框架文档 · 看云
  5. Element-UI 如何设置和使用第三方svg菜单图标
  6. 【晶振专题】案例:为什么对着STM32低速32.768K晶振哈口气就不起振了?
  7. 【图】2345看图王
  8. 在线微量水总结与应用
  9. 提示dns服务器未响应,网络诊断提示DNS服务器未响应解决方法_
  10. 音视频学习之-YUV裸数据