3G UMTS man in the middle attacks and policy reform considerations

dc.contributor.advisor Alex Tuckness
dc.contributor.author Adesso, Jennifer
dc.contributor.department Department of Political Science
dc.date 2018-08-11T08:15:33.000
dc.date.accessioned 2020-06-30T03:01:38Z
dc.date.available 2020-06-30T03:01:38Z
dc.date.copyright Fri Jan 01 00:00:00 UTC 2016
dc.date.embargo 2001-01-01
dc.date.issued 2015-01-01
dc.description.abstract <p>Man in the middle attacks on 3G UMTS have been a known vulnerability since at least 2004. Many experts have presented solutions to resolve this issue. The first attempt to mitigate the issue in the form of mutual authentication fell short. It is now public knowledge that law enforcement and the FBI have used this man in the middle style attack to collect intelligence within the United States. It is imperative we openly acknowledge that while the man in the middle attack has immediate benefits, there are also inherent risks to maintaining a lower standard of security.</p> <p>There has been no official documentation from these agencies on the protocol used to conduct these collections. This paper will outline the deficiency in GSM and UMTS, show how a man in the middle style attack would work and what is keeping the attack still possible after so many years.</p> <p>Finally, there will be four points to consider for preliminary policy reform; constitutionality, oversight, vulnerability, and protection.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/etd/15128/
dc.identifier.articleid 6135
dc.identifier.contextkey 8928968
dc.identifier.doi https://doi.org/10.31274/etd-180810-4732
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath etd/15128
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/29312
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/etd/15128/Adesso_iastate_0097M_15467.pdf|||Fri Jan 14 20:36:19 UTC 2022
dc.subject.disciplines Databases and Information Systems
dc.subject.keywords Information Assurance
dc.title 3G UMTS man in the middle attacks and policy reform considerations
dc.type thesis
dc.type.genre thesis
dspace.entity.type Publication
relation.isOrgUnitOfPublication a4a018a7-4afa-4663-ba11-f2828cbd0a15
thesis.degree.discipline Information Assurance
thesis.degree.level thesis
thesis.degree.name Master of Science
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Adesso_iastate_0097M_15467.pdf
Size:
506.26 KB
Format:
Adobe Portable Document Format
Description: