Sei sulla pagina 1di 3

2010 International Conference on Multimedia Information Networking and Security

A GSM/UMTS Selective Jamming System

Song Yubo Zhou Kan Yao Bingxin Chen Xi


School of Information School of Information College of Electronics and School of Management
Science and Engineering Science and Engineering Information Engineering Nanjing University
Southeast University Southeast University Nanjing University of Nanjing, China
Nanjing, China Nanjing, China Technology doctor_chan@163.com
songyubo@seu.edu.cn zhoukan@seu.edu.cn Nanjing, China
yaobingxin@vip.sina.com

Abstract—This paper presents a new GSM/UMTS jamming indiscriminate frequency jamming to get mobile identities
system which is intended to be placed in a restricted area for and blocks all MS in that area.
security purpose. A pseudo base station was constructed to An advanced interception system which can selectively
attempt connecting with mobile terminals. While the terminals jam MS is present in [2]. It is a combination of a detector in
are trying to access, the system will get the unique identity, [1] and a selective interceptor. The detector forces the MS to
such as IMSI and IMEI, and further check these identities in make self-identification, and then the selective interceptor
the repository. The system will selectively block the captures the MS identity through monitoring information
communication of these mobile terminals. We will analyze the
exchange between MS and the detector. By comparing the
GSM protocol which is relevant to the interception system and
identity with a local repository, this interceptor decides
later present the performance of such a system by real tests
and demonstrate its feasibility.
whether to trigger a local jamming device to generate
interferences that disturb active downlink carriers. Therefore,
GSM/UMTS; jamming system; IMSI-catcher the MS’s activity is controlled.
However, ideal blocking in [2] must be made before user
traffic flow starts which is a hard real-time constrain; besides
I. INTRODUCTION there is only an instance in which the remaining transaction
A Real-time GSM Jamming System is equipment located information is ciphered so the interceptor cannot monitor
in a restricted area that can detect and record IMSI number further messages. This means the interception system must
of passed mobile phones. Through comparing these IMSI be very complex. In addition, both schemes described above
numbers with a local cache we can decide whether to block need as many jamming modules as active carriers received;
certain mobile stations (MS). Selective blocking of MS has therefore the cost is relatively high.
obvious advantages particular in security areas where user
access must be controlled and it is what the system is III. THE GMS/UMTS JAMMING SYSTEM
designed for. The unique feather of this interception system
is that it does not use any jamming unit to block individual A. Obtain the IMSI number
calls or interfere with normal radio frequency; in fact it is a The whole interception system is present in Fig. 1. The
pseudo base station that can make mobile stations connect to mobile phone with engineering mode in this system detects
it and then either accept or reject them. Our system support all true active carriers in the target area, and sorts them in
both GSM and UMTS networks. In a word, this system is descending mode according to "cell reselection criterion"
much simpler and more flexible than former ones [2]. parameter C2. The computer gets the carrier information list
This paper is described as follows. In Section Ⅱ, we from the phone and choose one carrier which is not strong
describe existing GSM jamming systems. Section Ⅲ enough, like the sixth or the last one, as the pseudo carrier of
presents how our interception system works. In Section Ⅳ, this interception system. The reason why we use an existed
we analyze GSM protocol according to how we can obtain carrier is that this carrier is present in the BCCH allocation
MS IMSI numbers, and propose a blocking method. Section (BA) lists of other true carriers, which is broadcasted in
Ⅴ presents realistic tests to verify the performance and information messages. Therefore, if our pseudo carrier is the
same as one of the carriers in such a list mentioned above,
feasibility of such a system. Section Ⅵ concludes the paper.
MS will connect to our pseudo base station automatically
II. BACKGROUND under certain circumstance. In that case, we do not need any
jamming device and since MS must need a period of time to
The theory of real-time jamming system of idle GSM detect failure of affect carrier if jammed, the speed would be
mobile phones is described in [1]. It uses a jamming device faster to let MS connect to our pseudo BS automatically. It
such as [3] to block all the downlink active carries in the would be argued that the existed carrier may interfere with
detected area and provides a pseudo carrier. Since MS can our pseudo carrier because they are the same. However, the
not communicate with all the true carriers in that area, they carrier we choose is weak enough (it is one of the last several
will detect this pseudo one and perform self-identification for in the list), according to GSM specification [6], if the carrier
emergency calls. In other words, this detector uses

978-0-7695-4258-4/10 $26.00 © 2010 IEEE 818


809
813
DOI 10.1109/MINES.2010.172
to interference power ratio >9dB, then MS will consider the IV. PROTOCOL ANAYLSIS
true carrier as noise and connect to our pseudo-base station
successfully under certain conditions. A. Cell Selection and Reselection
In order to make our pseudo-base station seem real to MS, According to [4] (Section 6.6), MS will synchronize to
the BCCH of our pseudo-base station must carry the same and read the BCCH information for the 6 strongest non-
mobile country code and mobile network code as the local serving carriers, and at least every 5s the MS shall calculate
true BS. As a result, we have to prepare different interception the value of C1 (path loss criterion parameter) and C2 for the
systems for different operators. Moreover, the location area serving cell and re-calculate C1 and C2 values for non
identity (LAI) of BCCH must be different from those existed serving cells.
in nearby true carriers which can be obtain through our If we can make the value of C2 for the pseudo-base
detect phone, so that a location update procedure will be station calculated by MS higher than the value of C2 for the
triggered if any mobile phone tries to connect to our pseudo- serving cell by at least CELL_RESELECT_HYSTERESIS
base station, and then we can get IMSI of these phones. dB, then a cell reselection will happen. In addition, since the
LAI of the pseudo-carrier is different from all the true
carriers, a location update procedure will follow, from which
we can get the IMSI of MS.
B. Blocking Method
In this section, we propose an interceptor to selectively
block mobile phones. After mobiles phones perform location
update procedure on the pseudo-base station, we can choose
whether to block it according to their IMSI. If they are not
privileged, the interceptor accepts these phones’ cell
reselection requests. When these accepted phones want to
make phone calls or send SMS, the pseudo-base station just
reject them. As long as these phones do not disconnect from
our pseudo-base station, their behaviors are constrained.
However, for those mobile phones which are privileged, the
Figure 1. Jamming System. Local identity check and selective blocking
pseudo-base station should send a reject message with cause
13 (Roaming not allowed in this location area) [5] (Annex
B. Local Identity Check and Blocking G), so the MS will put the LAI in a black list for 12 hours
In this paper, we propose a method to check if specific and switch to a true base station, therefore the MS can make
MS are privileged or not. Briefly, its operation can be calls normally.
described as follows. V. INTERCEPTION SYSTEM’S FEASIBILTY
1) The interceptor communicates with a remote server
to get the identity repository. In this case, real-time blocking This interception system is mainly comprised of three
will not be affected by connecting speed. modules: a detector, a GSM RF device and a main board
with Atom processor.
2) Someone may ask how IMSI numbers can Instead of using a phone as mentioned before, we use a
correspond to phone numbers or people’s names. For one Siemens GSM module as the detector. It gets the location of
thing, we can get them from mobile switch centre (MSC). the target area as well as all true GSM carriers’ information
For the other, we can use a device demonstrated in section nearby and transports them to the main board via a serial
V to get the IMSI number of a certain SIM card. interface. The main board then sets the pseudo carrier as the
3) The interceptor checks obtained IMSI numbers in a carrier with the lowest C2 value and starts the GSM RF
local identity database. If they are not listed or privileged, device. The GSM RF device serves as a digital base band
the interceptor can either accept or reject these phones’ cell and IF section of a radio communication system. The data
reselection request with specific reasons. On the contrary, gets from this device is transmitted to the main board
the pseudo-base station should reject it with cause 13 through an Ethernet interface, and the remaining work such
as control logic, mobile management as well as radio
(Roaming not allowed in this location area) [5] (Annex G),
resource management is done in software on the main board.
so the MS will switch to another BS which is true.
In Section V, we will verify these estimations by means A. Function Tests and Performance
of realistic tests. All realistic tests were performed in the library, Southeast
University. We used the GSM network of China Mobile.
There are 83 students in the reading room (about 95%
students in our city use China Mobile) and some students on
the second floor may be affected by our interception system.

814
810
819
We observe the spectrum of our pseudo-base station with still discover those pseudo-base stations and consider them
a ROHED SCHWARZ FSP SPECTRUM ANALYZER. The as its first choice. This approach also needs more than one
frequency of the pseudo-base station turns at 947MHz, true carrier, but at most times, they are not hard to get for the
which corresponding to the ARFCN (Absolute Radio
Frequency Channel Number) of 60. When MS come into the
target area, the interception system can get their IMSI
through location update procedure. The time elapsed
between the start of the interception system and the first
IMSI caught is 9 seconds.

peripheral pseudo-base stations, and the number of new


carriers for those inner ones can be expanded unlimitedly.
Figure 3. pseudo-base stations in a large target area

VI. CONCLUSIONS
Figure 2. The number of IMSI caught versus time In this paper, we have presented a real-time selective
interception system of the GSM Terminals. Unlike other
Figure 2 shows the number of IMSI caught in one test. Terminal detectors or interceptors which need as many
The curve was drawn by Microsoft Excel 2003, and it shows jamming units as true carriers received, we do not need any
the data of the first 42s because there was almost no jamming device. What’s more important, this system is not
variation afterwards. subject to time constrains (in [2], the jamming unit must start
In [2], the enhanced selective interceptor needs more than within a certain instant). This obviously simplifies the design
2500 seconds to reach a 90% hit, and it has only 150ms to and reduces the whole cost. This interception system can get
check the identity of MS and trigger the jamming unit if the IMSI of MS which enter the target area, and block non-
needed. Obviously, our system is much more efficient and privileged users by means of the method presented in Section
enjoys great flexibility.
Ⅳ -C. We have described the implementation of this
Among all the MS, those which are privileged can
connect to the true BS within 6~10 seconds and make phone interceptor in Section Ⅴ and tested its performance.
calls successfully. However, for those unprivileged MS, if The results demonstrate that our design is feasible and
we make the pseudo-base station accept them, although they can meet real-time demands.
look normal, they can not make calls.
REFERENCES
B. Expand the Target Area [1] J. Vales-Alonso, F. I. de Vicente, F. J. González-Castaño, and J.M.
Since we cannot increase the transmit power of the GSM Pou-sada-Carballo, “Real-time detector of GSM terminals,” IEEE
Commun.Lett., vol. 5, pp. 275–276, 2001.
RF device unlimitedly, the bound of the target area within
[2] Francisco J. González-Castaño, Javier Vales-Alonso, José M.
which the C2 value of our pseudo-base station remains Pousada-Carballo, Fernando Isasi de Vicente, and Manuel J.
highest is limited. However, we can make inner pseudo-base Fernández-Iglesias, “Real-Time Interception Systems for the GSM
stations use new carriers. Protocol,” IEEE TRANSACTIONS ON VEHICULAR
Obviously, peripheral pseudo-base stations in Figure 3 TECHNOLOGY, VOL. 51, NO. 5, SEPTEMBER 2002.
can always get proper weak carrier from true BS. [3] J.M. Pousada-Carballo, F. J. González-Castaño, F. I. de Vicente,
Nevertheless, since there may not be enough weak true andM.J. Fernández-Iglesias, “Jamming system for mobile
communications,”Electron. Lett., vol. 34, pp. 2166–2167, 1998.
carriers for inner pseudo-base stations, we can assign new
[4] ETSI “Digital cellular telecommunications system (Phase 2+); Radio
carriers to them and broadcast these new BCCH carriers in subsystem link control, (GSM 05.08 version 8.5.0 Release 1999),”
the BA (BCCH Allocation) list of all the peripheral pseudo- Document ETSI TS 100 911 V8.5.0 (2000-10)
base stations. When a mobile station enters this target area, it [5] ETSI “Digital cellular telecommunications system (Phase 2+);
must be captured by peripheral pseudo-base stations and gets Mobile radio interface layer 3 specification, (GSM 04.08 version
the list which indicates the BCCH carriers of the surrounding 7.8.0 Release 1998),” Document ETSI TS 100 940 V7.8.0 (2000-10)
cells (including those pseudo ones), as a result, when the [6] ETSI “Digital cellular telecommunications system (Phase 2+); Radio
mobile station go through the center of the target area, it can transmission and reception, (GSM 05.05 version 8.5.1 Release
1999),” Document ETSI EN 300 910 V8.5.1 (2000-11)

815
811
820

Potrebbero piacerti anche