Documente Academic
Documente Profesional
Documente Cultură
ndice
Prlogo ........................................................................................................11
Introduccin y objetivos ............................................................................13
Captulo I Seguridad en comunicaciones GSM.......................................15
1. Arquitectura de GSM ...............................................................................................15
MS Mobile Station ................................................................................................................ 16
BSS Base Station Subsystem ................................................................................................. 16
NSS Network and Switching Subsystem .............................................................................. 17
,GHQWLFDGRUHVGHODV06 .......................................................................................................... 18
Pila de protocolos ...................................................................................................................... 19
Protocolos MSBTS .............................................................................................................. 19
Protocolos BTSBSC ............................................................................................................. 20
Protocolos BSCMSC ............................................................................................................ 20
3. El nivel de Red...........................................................................................................42
Modo idle y modo dedicado...................................................................................................... 42
Nivel RR.................................................................................................................................... 44
Nivel MM .................................................................................................................................. 50
JJJ
5. El interfaz ME-MS....................................................................................................56
6. Aspectos de seguridad contemplados en GSM .......................................................58
6HJXULGDGGHOSURWRFROR*60................................................................................................... 58
$XWHQWLFDFLyQ*60................................................................................................................... 58
&LIUDGRGHODVFRPXQLFDFLRQHV*60 ........................................................................................ 62
ndice
6. Direcciones IP ..........................................................................................................130
Contextos PDP ........................................................................................................................ 130
(OLQWHUID]6*61**61*73 ...................................................................................... 132
8. Ataques .....................................................................................................................136
Ataques activos contra la red core .......................................................................................... 136
Ataques pasivos y semipasivos ............................................................................................... 139
$WDTXHVDFWLYRVPHGLDQWHHVWDFLyQEDVHIDOVD ......................................................................... 141
2. El nivel fsico............................................................................................................156
Esquema de acceso de radio.................................................................................................... 156
Establecimiento de un canal de radio (RRC protocol) ............................................................ 159
&DQDOHVItVLFRVOyJLFRV\GHWUDQVSRUWH .................................................................................. 161
HSPA ....................................................................................................................................... 162
JJJ
3. El nivel MM .............................................................................................................164
*HVWLyQGHPRYLOLGDG .............................................................................................................. 164
Reglas de medicin ................................................................................................................. 164
Reseleccin de celda Intra-RAT .............................................................................................. 165
5HVHOHFFLyQGHFHOGDLQWHU5$7FDVR*(5$1UTRAN ..................................................... 165
Reseleccin de celda inter-RAT, caso UTRAN*(5$1 ..................................................... 167
Handover ................................................................................................................................. 169
5. Ataques .....................................................................................................................189
Ataque pasivo contra handover ............................................................................................... 189
Ataque activo contra handover................................................................................................ 189
$WDTXHPHGLDQWHHVWDFLyQEDVHIDOVD*60D86,0FRQVRSRUWHSDUDDXWHQWLFDFLyQ*60 ... 190
$WDTXHPHGLDQWHHVWDFLyQEDVHIDOVD*60D86,0VLQVRSRUWHSDUDDXWHQWLFDFLyQ*60 ..... 191
$WDTXHPHGLDQWHHVWDFLyQEDVHIDOVD8076IHPWRFHOGD ..................................................... 194
2WURVDWDTXHVEDVDGRVHQIHPWRFHOGDV8076 ........................................................................ 196
$WDTXHVPHGLDQWHHVWDFLyQEDVHIDOVD8076 ......................................................................... 198
9LDELOLGDGGHXQDLPSOHPHQWDFLyQSUiFWLFDGHORVDWDTXHVFRQHVWDFLyQEDVHIDOVD* ......... 204
Captulo IV 4G .........................................................................................205
1. Introduccin a 4G ...................................................................................................205
Predecesores y tecnologas candidatas .................................................................................... 206
LTE y LTE-Advanced ............................................................................................................. 207
E-UTRAN ............................................................................................................................... 208
SAE ......................................................................................................................................... 212
2. Seguridad en 4G ......................................................................................................213
Aspectos generales .................................................................................................................. 213
Contexto de seguridad EPS ..................................................................................................... 216
Jerarqua de claves .................................................................................................................. 217
JJJ
ndice
Referencias................................................................................................233
ndice alfabtico .......................................................................................259
Otros libros de inters..............................................................................267
JJJ