Submit a Paper

Propose a Workshop

The Sixth International Conference on Digital Telecommunications

ICDT 2011

April 17-22, 2011 - Budapest, Hungary


Tutorials

T1. Managing Future Radiomobile and Wireless Networks through Reconfigurable Radio systems
by Dr. Maria Stella Iacobucci

T2. Mobile Phone Security, Interception and Forensics
by Dr. Iosif Androulidakis

 

DETAILS

 

T1. Managing Future Radiomobile and Wireless Networks through Reconfigurable Radio systems
by Dr. Maria Stella Iacobucci

In the past decades many wireless and mobile access technologies were standardized and deployed in different countries. Starting from GSM, the European digital system designed to offer voice service in seamless mobility, the evolution of mobile networks was towards multimedia services and higher bandwidth. Data transmission is evolving from a few cents of kbit/s with UMTS up to tens of Mbit/s with HSPA+ and cents of Mbit/s with LTE. Besides, other wireless networks with different degrees of performances and portability are being deployed: wireless LANs, WiMAX, mesh networks, sensor networks, etc.

The tutorial describes how this multiplicity of Radio Access Technologies (RAT) can be integrated in a multi-standard Reconfigurable Radio System (RRS), deployed in network centric, ad hoc, mesh and distributed architectures, by using both licensed and unlicensed frequency bands. It is shown that, with the availability of reconfigurable nodes, the network operator will be able to efficiently manage the radio and processing resource pool, with cost reductions in network deployment, operation and maintenance.

 

T2. Mobile Phone Security, Interception and Forensics
by Dr. Iosif Androulidakis

The tutorial has all the necessary theoretical and practical background for the topic. Security and secrets of mobile phones will be discussed, in software and hardware level. Interception, fraud and other malicious techniques “against” their users will be analyzed. Audience will be able to understand fraudsters’ modus operandi and will be presented with protection methods. Participants will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. There will be hands-on parts, where the techniques will be demonstrated live. Finally, an actual implementation-demonstration of interception of voice and sms with specific equipments will take place (law permitting - otherwise it will be presented in video).

Outline:

Introduction
GSM theory
Threats-Fraud-Dangers
Net Monitor
GSM network codes
Mobile phones codes
AT command set
SMS tricks-hacking
Bluetooth hacking
Software and Hardware
Mobile phone forensics introduction
Data in the SIM
Data in the handset
Data in the network
Communication protocols
Forensics analysis procedure
Forensics tools
Voice, SMS, IMSI and IMEI interception demonstration

 
 

Copyright (c) 2006-2011, IARIA