Cellular Location Tracking Attacks
Cellular Location Tracking Attacks
Figure 2: An attacker from SS7 core network can track the LTE user’s location
using Interworking Functionalities (IWF).
As shown in the figure 2, the IWF provides an easy way for an attacker to
translate the SS7 based attacks into Diameter location tracking procedures.
Countermeasures
Figure 1: Impersonation of an SS7 attacker as different core network nodes to Deploying the combination of efficient filtering mechanisms and standardized se-
learn the location of the targeted cellphone user curity measures will protect the end user’s location privacy against the attacks
that exploit the signaling protocols.
• Querying the Home Location Register (HLR): By impersonating as Global • Effective SS7 filter/firewall to consider the contextual location of the users.
MSC (GMSC) or Short Message Service Center (SMSC), an attacker can initiate • Implementing NDS/IP security over the Diameter Edge Agents.
either the call set up or SMS delivery procedures to query the HLR for the global • Whitelisting the partners and the protocols used by them.
title of the MSC and IMSI of the target. The MSC service area indicates the
• Regular monitoring and logging of the signaling traffic.
state or county in which the target is currently roaming. The attacker can also
learn about the cell area of the target by misusing the billing platform related It is important to note that these countermeasures has to be done solely from the
procedures. mobile network operators and there is no way that an app or mechanism from
end-user’s side can detect or protect them from such attacks.
• Querying the Mobile Switching Center (MSC): Once the IMSI and global
title of the MSC is known, the attacker can query the MSC by impersonating as
HLR to know the cell area of the target. It is also possible to misuse the emer-
gency call procedures to track the target to the accuracy of his geographical
Publications
coordinates.
[1] S. P Rao, S. Holtmanns, I. Oliver, T. Aura, “We know where you are! - Utilising the telecom core
network for user tracking,” The 8th International Conference on Cyber Conflict - Cycon 2016.
Note: More details on the location tracking attacks can be found in (To appear)
our survey article [1]. [2] S. Holtmanns, S. P Rao, I. Oliver, “User location tracking in LTE networking using the Inter-
working Functionality,” The 15th International IFIP TC6 Networking Conference, (NETWORK-
ING 2016).
[3] S. P Rao, B. T Kotte, S. Holtmanns, “Privacy in LTE networks - Reviewing the security and
privacy considerations in LTE networks”, The 9th EAI International Conference on Mobile Mul-
timedia Communications. (To appear)
Secure Systems Research Group Contact information for comments & improvement ideas: Siddharth Rao
Department of Computer Science Email: [email protected]
School of Science, Aalto University, Finland