JOURNAL ARTICLE

Vulnerabilities of UMTS Access Domain Security Architecture

Abstract

This paper presents vulnerabilities of UMTS access domain security architecture. The security architecture of UMTS offers some protection against known threats including false base station attacks, man-in-the-middle attacks and replay attacks. The system also successfully ensures user data confidentiality and signaling data integrity. However, a few novel vulnerabilities have been identified in this paper. It has been shown that modification of unprotected initial messages prior to the security mode command may result in DoS and man-in-the-middle attacks. Non-integrity protection of rrcConnectionReject message can also be exploited to launch DoS attack. Clear transmission of IMSI on some occasions is a violation of user identity/location confidentiality and user traceability. This exposed IMSI can be exploited for new attacks.

Keywords:
Computer security Computer science UMTS frequency bands Replay attack Confidentiality Enterprise information security architecture Computer network Architecture Man-in-the-middle attack Authentication (law)

Metrics

43
Cited By
2.57
FWCI (Field Weighted Citation Impact)
6
Refs
0.91
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

IPv6, Mobility, Handover, Networks, Security
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

BOOK-CHAPTER

Access Security in UMTS and IMS

Yan ZhangYifan ChenRong YuSupeng LengHuansheng NingTao Jiang

IGI Global eBooks Year: 2010 Pages: 1437-1448
JOURNAL ARTICLE

Access security in CDMA2000, including a comparison with UMTS access security

Gregory G. RoseGeir M. Køien

Journal:   IEEE Wireless Communications Year: 2004 Vol: 11 (1)Pages: 19-25
© 2026 ScienceGate Book Chapters — All rights reserved.