3G UMTS man in the middle attacks and policy reform considerations
dc.contributor.advisor | Alex Tuckness | |
dc.contributor.author | Adesso, Jennifer | |
dc.contributor.department | Department of Political Science | |
dc.date | 2018-08-11T08:15:33.000 | |
dc.date.accessioned | 2020-06-30T03:01:38Z | |
dc.date.available | 2020-06-30T03:01:38Z | |
dc.date.copyright | Fri Jan 01 00:00:00 UTC 2016 | |
dc.date.embargo | 2001-01-01 | |
dc.date.issued | 2015-01-01 | |
dc.description.abstract | <p>Man in the middle attacks on 3G UMTS have been a known vulnerability since at least 2004. Many experts have presented solutions to resolve this issue. The first attempt to mitigate the issue in the form of mutual authentication fell short. It is now public knowledge that law enforcement and the FBI have used this man in the middle style attack to collect intelligence within the United States. It is imperative we openly acknowledge that while the man in the middle attack has immediate benefits, there are also inherent risks to maintaining a lower standard of security.</p> <p>There has been no official documentation from these agencies on the protocol used to conduct these collections. This paper will outline the deficiency in GSM and UMTS, show how a man in the middle style attack would work and what is keeping the attack still possible after so many years.</p> <p>Finally, there will be four points to consider for preliminary policy reform; constitutionality, oversight, vulnerability, and protection.</p> | |
dc.format.mimetype | application/pdf | |
dc.identifier | archive/lib.dr.iastate.edu/etd/15128/ | |
dc.identifier.articleid | 6135 | |
dc.identifier.contextkey | 8928968 | |
dc.identifier.doi | https://doi.org/10.31274/etd-180810-4732 | |
dc.identifier.s3bucket | isulib-bepress-aws-west | |
dc.identifier.submissionpath | etd/15128 | |
dc.identifier.uri | https://dr.lib.iastate.edu/handle/20.500.12876/29312 | |
dc.language.iso | en | |
dc.source.bitstream | archive/lib.dr.iastate.edu/etd/15128/Adesso_iastate_0097M_15467.pdf|||Fri Jan 14 20:36:19 UTC 2022 | |
dc.subject.disciplines | Databases and Information Systems | |
dc.subject.keywords | Information Assurance | |
dc.title | 3G UMTS man in the middle attacks and policy reform considerations | |
dc.type | thesis | |
dc.type.genre | thesis | |
dspace.entity.type | Publication | |
relation.isOrgUnitOfPublication | a4a018a7-4afa-4663-ba11-f2828cbd0a15 | |
thesis.degree.discipline | Information Assurance | |
thesis.degree.level | thesis | |
thesis.degree.name | Master of Science |
File
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- Adesso_iastate_0097M_15467.pdf
- Size:
- 506.26 KB
- Format:
- Adobe Portable Document Format
- Description: