M MMM MM
M MMM MM
Christian Sørseth
Problem description:
An IMSI Catcher is a device that acts as a false base station to implement a man-in-
the-middle attack in mobile networks. On top of disclosing the IMSI (International
Mobile Subscriber Identity) and intercept network traffic, the IMSI Catchers track
the movement of mobile users. Recently, low-cost IMSI Catchers were proved feasible
for LTE too. LTE location attacks allow an adversary to track the presence or
absence of an IMSI in a given area, sometimes even localizing the IMSI in an area
tighter than a cell range.
The master thesis will investigate and analyze potential passive and active location
disclosure attacks in LTE networks using IMSI Catchers. The student will build
an LTE IMSI Catcher based on the open-source platform OpenAirInterface, with
the main goal to collect IMSIs. The student should also analyze the possibility of
collecting IMSIs passively, for example by listening and decoding broadcast paging
messages sent by commercial base stations. Existing location disclosure attacks
will be technically explained and analyzed and if time permits, improvements and
countermeasure proposals should be considered.
This Master’s thesis is the result of the work in Information Security in the
final semester of my Master of Science degree in Telematics at Norwegian
University of Science and Technology. The thesis is written under the
supervision of Professor Stig Frode Mjølsnes and Ruxandra-Florentina
Olimid from Department of Information Security and Communication
Technology.
Christian Sørseth
Contents
List of Figures xi
List of Acronyms xv
1 Introduction 1
1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Scope and Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2.1 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Work Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.4 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.5 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.5.1 Related Work in LTE . . . . . . . . . . . . . . . . . . . . . . 4
1.5.2 Related Work in Previous Generations Systems . . . . . . . . 4
1.6 Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2 LTE 7
2.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.2 LTE Network Architecture . . . . . . . . . . . . . . . . . . . . . . . . 7
2.2.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.2.2 Evolved Packet Core (EPC) . . . . . . . . . . . . . . . . . . . 8
2.2.3 Evolved Universal Terrestrial Radio Access Network (E-UTRAN) 9
2.2.4 User Equipment (UE) . . . . . . . . . . . . . . . . . . . . . . 10
2.3 Protocol Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.3.1 User Plane . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.3.2 Control Plane . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.3.3 User Plane and Control Plane Protocols . . . . . . . . . . . . 13
2.4 Channel Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.4.1 Channel Types . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.4.2 Logical Channels . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.4.3 Transport Channels . . . . . . . . . . . . . . . . . . . . . . . 15
vii
2.4.4 Physical Channels . . . . . . . . . . . . . . . . . . . . . . . . 16
2.5 LTE PLMNs in Norway . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.5.1 PLMN ID Allocation in Norway . . . . . . . . . . . . . . . . 16
2.5.2 LTE Frequency Allocation in Norway . . . . . . . . . . . . . 17
2.5.3 Network Areas . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.6 LTE Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.6.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.6.2 Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
2.6.3 Authentication and Key Agreement Procedure . . . . . . . . 21
2.6.4 Difference Between GSM/UMTS and LTE Security . . . . . . 24
2.7 Vulnerabilities in LTE . . . . . . . . . . . . . . . . . . . . . . . . . . 25
6 Conclusion 83
6.1 Further Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
6.1.1 Implementation of LTE IMSI Catcher with Extended Coverage
Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
6.1.2 Smart Paging Analysis for Norwegian Operators . . . . . . . 84
6.1.3 Implementation of Improvement Proposals . . . . . . . . . . 84
6.1.4 Countermeasures . . . . . . . . . . . . . . . . . . . . . . . . . 85
References 87
Appendices
A OpenAirInterface Installation Guide 93
A.1 Operating System Prerequisites . . . . . . . . . . . . . . . . . . . . 93
A.2 Install and Configure eNodeB and EPC . . . . . . . . . . . . . . . 94
A.3 Run eNodeB and EPC . . . . . . . . . . . . . . . . . . . . . . . . . 98
A.4 Configure OpenAirInterface as UE . . . . . . . . . . . . . . . . . . 99
A.5 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
3.1 Harris Corporation’s first IMSI Catcher, the StingRay. Source: [Rya]. . 28
3.2 USRP B200mini with custom-made encapsulation. The B200min is placed
next to a credit card to illustrate the small size. . . . . . . . . . . . . . . 31
3.3 Topology of the LTE IMSI Catcher. . . . . . . . . . . . . . . . . . . . . 32
3.4 Field Test menu in iPhone. . . . . . . . . . . . . . . . . . . . . . . . . . 36
3.5 LTE IMSI Catcher (Collector) message exchange. . . . . . . . . . . . . . 39
3.6 Wireshark capture of a TAU Reject message returning EMM rejection
cause 10. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
3.7 Identity Request message initiated by the IMSI Catcher to obtain the IMSI. 41
3.8 Identity Response message containing the IMSI. . . . . . . . . . . . . . . 41
3.9 Attach Reject message returning EMM rejection cause #15 (No Suitable
Cells In Tracking Area). . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
xi
3.10 Map of the coverage area of the Collector and the commercial cell. The
yellow circle highlights the coverage area of the Collector and the red
circle highlights the coverage area of the commercial cell. Edited map
from Google Earth Pro [Goo]. . . . . . . . . . . . . . . . . . . . . . . . . 45
3.11 SIB type 1 message containing periodicity for SIB type 3-7. . . . . . . . 48
2.1 MCC and MNC distribution for three PLMNs in Norway [Int16]. . . . . 17
2.2 LTE frequency distribution in E-UTRA band 20 and band 3, as of
04.04.2017 [Nas]. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.1 System Information Block messages in LTE (excluding SIB 10-13) [3GP16b]. 35
3.2 Configuration parameters for the Collector and the Jammer. . . . . . . 38
3.3 IMSIs obtained when spoofing Telia. MSINs are censored. . . . . . . . . 43
xiii
List of Acronyms
4G 4th Generation.
AK Anonymity Key.
AS Access Stratum.
AV Authentication Vector.
BS Base Station.
CK Cipher Key.
CS Circuit Switched.
DL Downlink.
xv
DoS Denial-of-Service.
IK Integrity Key.
IP Internet Protocol.
MITM Man-in-the-Middle.
OAI OpenAirInetrface.
PS Packet Switched.
RES Response.
SI System Information.
TA Tracking Area.
UE User Equipment.
UL Uplink.
UP User Plane.
Mobile communication plays a central role for most people in today’s society. LTE is
currently being deployed in vast areas of the world and is the latest implemented stan-
dard in mobile communication. LTE is considered to have significant improvements
compared to its predecessors; in addition to the high data throughput, the security
and privacy for subscribers have improved substantially. Historically, Global Sys-
tem for Mobile Communications (GSM) and Universal Mobile Telecommunications
System (UMTS) have been the leading technology in mobile communication, after
smartphones entered the marked, the demand for mobile data increased drastically.
Consequently, LTE has managed to meet the growing need for mobile data and have
become the leading technology in wireless mobile communication. Although the LTE
security has improved compared to its predecessors, several weaknesses exist. One
of the deficiencies in LTE is that a big portion of the signaling messages may be
processed without protection.
1
2 1. INTRODUCTION
1.2.1 Objectives
The overall focus area of this thesis is the usage of IMSI Catchers in LTE networks.
The goal of this thesis is to provide a thorough technical description of IMSI Catchers
and how they can be used to disclose the location of subscribers in LTE networks.
This thesis also discusses Paging Catchers and how they exploit unprotected paging
messages to determine the location of a subscriber, in addition to a general overview
of the main aspects of the LTE technology. Moreover, this thesis is divided into
seven primary objectives:
1. Study the feasibility of location attacks in LTE using low-cost hardware and
open source software
4. Build and set up an IMSI Catcher based on the open source platform OpenAir-
Interface and a USRP, subsequently use the IMSI Catcher to disclose IMSIs
and track the movement of subscribers
5. Build and set up a Paging Catcher based on the open source platform srsLTE
and a USRP, subsequently use the Paging Catcher to create a mapping between
GUTI and social identity mapping, and track the movement of subscribers
6. Use the Paging Catcher to check GUTI persistence for one of the Norwegian
operators
The first segment was exclusively a literature study which consisted of analyzing
previous related work. The study was primarily based on the papers described in
Section 1.5 and the LTE standardization provided by 3rd Generation Partnership
Project (3GPP).
The third segment consisted of analyzing the data collected in the second phase.
The data gathered by the IMSI Cather and the Paging Catcher were technically
analyzed and used to break subscriber privacy.
1.4 Contributions
This thesis provides a theoretical and practical study of LTE IMSI Catchers and
Paging Catchers. The primary contribution of this thesis is the implementation of an
LTE IMSI Catcher, and how it is used to disclose the location of a subscriber. Chap-
ter 3 describe how an LTE IMSI Catcher exploits features in the LTE specification
to steal IMSIs and subsequently reconnects the subscribers to the commercial LTE
network. A functional description on how to configure the IMSI Catcher, as well as
a technical description of the functionality are given in Chapter 3. Appendix A and
Appendix B provides a functional description of how to build and configure the IMSI
Catcher.
4 1. INTRODUCTION
Shaik et al. presented in 2016 a highly relevant research regarding privacy in LTE
networks [SBA+ 15]. They performed attacks able to accurately locate subscribers
within a given area by using a USRP and the open source platform srsLTE [Sof].
Moreover, their attacks are discussed in Chapter 5.
1.6 Outline
This thesis is divided into five chapters, excluding this introduction chapter:
Chapter 2 includes the fundamental concepts of LTE that are relevant to get a
better understanding of the content of this thesis. This chapter also includes the
security architecture of LTE and known vulnerabilities.
Chapter 4 includes a technical description of Paging Catchers and how they passively
sniff paging messages broadcasted by commercial Evolved Node Bs (eNodeBs). This
chapter also analyzes GUTI persistence for a Norwegian operator.
Chapter 6 concludes the work done in this thesis and potential further work.
Chapter
2 LTE
This chapter provides a general overview of the fundamental parts of the LTE
technology that are necessary to understand the content of this thesis. The chapter
contains an introduction to the LTE architecture and explains how various network
components interact. Also, it explains how the protocol architecture is divided
into planes and how different channels are used to transport data across the LTE
radio interface. Lastly, it includes an overview of the Public Land Mobile Networks
(PLMNs) in Norway and the security aspects in LTE.
2.1 Overview
LTE, also known as 4th Generation (4G)1 , is the latest standard in mobile network
technology and is supported by most smartphones. 3GPP developed the standard
with the aim to increase downlink and uplink peak data rates, create scalable carrier
bandwidths, and make a purely Internet Protocol (IP) based network architecture
[3GP]. In addition to the significant functionality improvements, its security and
privacy have also improved a lot compared to its predecessors. As of today, LTE is
the fastest developing mobile network technology of all time and are commercially
launched in more than 70% of the world [GSA15]. Furthermore, the 5th Generation
(5G) technology is under development, and 3GPP estimates to deploy the standard
in 2020 [Gio16].
2.2.1 Overview
The LTE network architecture is roughly divided into three parts: the access part
called the Evolved Universal Terrestrial Radio Access Network (E-UTRAN), the
1 LTE does not fulfill the 4G requirements stated by International Mobile Telecommunications
7
8 2. LTE
core part called the Evolved Packet Core (EPC), and the UE. Furthermore, the
E-UTRAN and EPC are divided into several network components, each playing an
important role in the complete LTE network architecture. Figure 2.1 illustrates the
complete overview of the LTE network architecture, showing the relationship between
UE, E-UTRAN, EPC and their corresponding network components. This section
will describe all the relevant LTE components and explain their role in the network.
The MME is a key control plane entity within the EPC, providing an interface towards
the E-UTRAN. The primary responsibility of the MME is to manage the accessibility
of network connections, allocate network resources, and authenticate UEs [Sri12]. A
single MME is managing the connection to multiple eNodeBs; however, to handle
the massive signaling load in mobile networks, MMEs can be grouped together in
a pool [Sri12]. Section 2.5.3 describe the MME pool in detail. The authentication
procedure is the initial step performed when a UE first connect to a network, and
the MME has the overall responsibility for this procedure. Section 2.6.3 provides a
detailed description of the LTE authentication and key agreement process.
2.2. LTE NETWORK ARCHITECTURE 9
Commonly, the HSS integrates the Authentication Center (AuC), responsible for
generating security keys and authentication vectors used in the authentication and
key agreement process [SBT11].
P-GW is the exit and entry node for UE traffic destined for external packet data
networks, such as IP Multimedia Subsystem (IMS) and the Internet. The primary
responsibilities of the P-GW are to perform QoS provisioning by means of deciding
who can access which resources in the network (policy enforcement) [Pro]. The
P-GW is also responsible for allocating IP addresses, packet filtering, and flow-based
charging for each UE [Luc09]. Since the P-GW is the interconnection node between
the EPC and external Packet Data Networks (PDNs), is it acting as a mobility
anchor for communication with non-3GGP technologies [SBT11].
S-GW is the interconnection node between the EPC and the E-UTRAN. The S-GW
routes and forwards incoming and outgoing IP packets to/from the UE [Pro]. It also
acts as a mobility anchor for intra-LTE mobility, meaning that the same S-GW is
used during handover to eNodeBs located in different Tracking Areas (TAs) [3GP08d].
Also, the S-GW is responsible for initiating paging when the UE is in IDLE mode
[Pro].
– MME Selection The eNodeB is responsible for selecting a valid MME during
the attach procedure
– Security Applies encryption to user data sent over the radio interface. Details
on how security is handled in LTE are further described in Section 2.6
All of the above-listed functions reside in the eNodeB. By performing the opera-
tions in the access network instead of the core network makes the interaction between
protocol layers much more efficient. Consequently, latency is reduced and efficiency
is improved for the radio access network. Also, by distributing the control to each
eNodeB the need for one centralized controller is avoided, resulting in a potential
cost saving and bypassing single points of failure.
SIM is the predecessor to the UICC, initially designed to operate in the GSM
network and could only host one application. As UMTS and LTE emerged the
SIM card was replaced by the UICC, currently used today. Figure 2.2 illustrates
the structure of the UICC and the clear separation of the applications residing on
it. In addition to being a multi-application platform is it IP-connected, enabling
subscribers to access cloud-based services and applications such as mobile banking
[SIM11]. UICC is the only subscriber-owned component in an LTE network that
an operator has no physical control over. However, due to the UICC always being
IP-connected, operators can remotely do changes to the applications residing on the
UICC, for example, changing the roaming agreements.
12 2. LTE
stack; additionally, the control plane includes the Radio Resource Control (RRC)
protocol. PDCP, RLC, and MAC have the same functionality as for the user plane;
except that PDCP does not perform header compression in the control plane [Luc09].
Section 2.3.3 explains all the protocols used in the user plane and the control plane.
RRC is the link signaling protocol for the AS. As illustrated in Figure 2.4 RRC tasks
are performed in the eNodeB to maintain a flat structure. Some of the RRC sublayer
functions include broadcasting system information, paging, allocating temporary
identities between the eNodeB and the UE, key management, and UE measurement
reporting [3GP10].
14 2. LTE
carried in an orderly fashion. LTE has defined three different channel types, used
to group different types of data: physical channels, transport channels, and logical
channels. Figure 2.5 illustrates the LTE channel hierarchy, whereas the most relevant
channel types for this thesis, are marked in red.
Figure 2.5: Mapping between logical, transport, and physical channels in LTE.
Source: [Cho10].
Table 2.1: MCC and MNC distribution for three PLMNs in Norway [Int16].
PLMN MNC MCC
ice.net 14 242
Telia 02 242
Telenor 01 242
MME pool areas and S-GW service areas consist of one or more TAs. A TA
contains multiple BSs and is used to track the movement of UEs that are in standby
mode [Cox12]. The Tracking Area Identity (TAI) uniquely identifies TAs; moreover,
the TA can be identified within a particular network using the Tracking Area Code
(TAC) [Cox12]. Figure 2.6 illustrates the relation between the MME pool area, the
S-GW service area, and the TA.
18 2. LTE
Figure 2.6: The relation between MME pool area, SGW service area, and TA.
Source: [Cox12].
2.6.1 Overview
The security architecture of the EPC is mainly based on the UMTS architecture;
however, new extensions and improvements have been implemented to increase the
security of LTE. Consequently, LTE provides mutual authentication between the
UE and the EPC making attacks such as MITM difficult to perform and strong
encryption algorithms makes content hard to obtain. Although LTE has several solid
built-in security mechanisms, sadly these are optional, and many mobile operators
tend to skip them. The security mechanisms can only be activated by the mobile
operators, and the subscribers have no knowledge if the parameters are activated or
not. Section 2.7 describe the vulnerabilities existing in LTE networks.
2.6.2 Identification
Subscriber and terminal identification is a fundamental aspect of LTE systems, used
by the AKA procedure to authenticate subscribers. Consequently, mechanisms to
protect and uniquely allocate identities are necessary to maintain the security of
LTE networks. Section 2.6.3 discuss the authentication and key agreement process
further.
IMSI is a unique static identity allocated to each subscriber in an LTE system. IMSI
was first introduced in the GSM standard, but the structure has remained the same
for UMTS and LTE. The IMSI play a crucial role in the LTE AKA as the IMSI
identifies the authentication key K. The authentication key is only stored in the AuC
located in the EPC, and the USIM located in the UE. The IMSI is no more than 15
digits and is composed of MCC, MNC, and Mobile Subscriber Identification Number
(MSIN) [3GP12b]. The MSIN uniquely identify a subscriber within a PLMN while
the MCC and the MNC identify the country and the network operator respectively
[3GP12b]. Figure 2.9 illustrates the composition of the IMSI structure.
Figure 2.9: IMSI structure, composed of MCC, MNC and MSIN. Source: [3GP12b].
discuss the Tracking Area Update (TAU) procedure, and the attach procedure in
further detail. The GUTI structure is divided into two parts:
– GUMMEI is the first part of the GUTI used to identify the MME which
allocated the GUTI. GUMMEI is divided into MCC, MNC, MME Group ID,
and MME Code. MME Group ID is used to identify a cluster of MMEs, and
MME Code is used to identify an individual MME residing in an MME cluster.
MCC and MNC have the same structure as in the IMSI.
Figure 2.10 illustrates the full GUTI structure and how the different parts are
composed.
Figure 2.10: GUTI structure, composed of GUMMEI and MTMSI. Source: [KG10].
share a security context. The procedure is illustrated in Figure 2.11 and can roughly
be divided into three operations [FHMN12]:
Figure 2.11: LTE authentication and key agreement (AKA) message exchange.
Source: [FHMN12].
2.6. LTE SECURITY 23
Distribution of authentication vectors is the first operation in the AKA process. The
AKA procedure is initiated when a UE wants to connect to a network without having
the required security context. The UE indicates to the serving network that it wants
to connect to the network by passing its identity. Ideally only the temporary identity
(GUTI) should be used in this process; however, if the serving network is unable
to retrieve the IMSI from the GUTI, it invokes a user identification mechanism
requesting the permanent UE ID (IMSI) [3GP12a]. Furthermore, the MME creates
an Authentication Information Request (Auth Info Req) containing the IMSI and the
Serving Network ID (SN ID). Subsequently, the HSS generates an Authentication
Information Answer (Auth Info Answer) message and sends it back to the MME.
The Authentication Information Answer is composed of a random number (RAND),
Expected Response (XRES), master key KASM E , and an authentication token
(AUTN). Moreover, AUTN consists of Sequence Number (SQN), Anonymity Key
(AK), Authentication Management Field (AMF), and MAC. Figure 2.12 illustrates
the complete AUTN structure.
The overall objective of this part is to generate and distribute a shared local master
key KASM E between the UE and the MME [FHMN12]. Additionally, the serving net-
work should authenticate the UE, and the UE should authenticate the serving network
(mutual authentication). MME invokes the Authentication Request (Authentication
Req) procedure containing the RAND and the AUTN. RAND is an unpredictable
random number used by the UE to calculate KASM E , while AUTN includes param-
eters used by the UE to authenticate the network. As illustrated in Figure 2.12,
USIM computes the anonymity key AK and retrieves the SQN. Subsequently, USIM
authenticates the serving network by verifying that SQN is in the correct range
[3GP08a]. USIM also check that the calculated Expected MAC (XMAC) is equal
to the received MAC, to make sure the received data is intact [Leu12]. If SQN
has the correct value, the USIM replies the MME with an Authentication Response
(Authentication Resp) message containing the Response (RES).
The MME compares the received RES with the expected value XRES, if the values
are equal, the serving network has successfully authenticated the UE. Subsequently,
the UE uses the Cipher Key (CK) and the Integrity Key (IK) to calculate the master
key KASM E ; as a result, both the UE and the serving network have authenticated
each other (mutual authentication) and successfully established security keys.
24 2. LTE
the UMTS AKA procedure uses a chain of keys. The security benefit of using an
intermediate key is to ensure that each key is only functional in one particular context
(cryptographic key separation) [FHMN12].
User Identity
GSM, UMTS, and LTE all have different naming conventions for their temporary
identity; however, all of them are used to maintain the confidentiality of the user
identity. Temporary Mobile Subscriber Identity (TMSI) temporarily identifies a
subscriber in a Circuit Switched (CS) domain, while Packet-Temporary Mobile
Subscriber Identity (P-TMSI) temporarily identifies a subscriber in a Packet Switched
(PS) domain [NN03]. As mentioned in Section 2.6.2, GUTI is used for the services
provided by the MME. Consequently, LTE-enabled devices may allocate one TMSI,
one P-TMSI, and one GUTI to support GSM/UMTS handover.
– AUTHENTICATION REQUEST
– AUTHENTICATION REJECT
– TRACKING AREA UPDATE REJECT (if the EMM cause is not #25)
Shaik et al. have suggested that the unprotected NAS signaling message listed
above can be exploited in practical attacks such as location disclosure, Denial-of-
Service (DoS) and forcing a victim to use the less secure GSM standard [SBA+ 15].
Chapter 3 explains how to exploit unprotected signaling messages to catch IMSIs
and hence disclose the position of subscribers.
26 2. LTE
IMSIs and other sensitive information gathered during the experiments are cen-
sored due to privacy concerns. As described in Section 2.6.2, IMSI is a unique private
identification that should only be known by the associated PLMN.
27
28 3. USING IMSI CATCHERS
it is not part of the infrastructure of a commercial PLMN. The main objective of the
IMSI Catcher is to collect IMSIs from surrounding UEs. Since IMSI permanently
identifies a UE, this sort of identity disclosure is critical with regard to user identity
confidentiality. Consequently, by obtaining the IMSI of a UE, an adversary can track
the movement of a subscriber over an extended period. Even more critical, IMSI
Catcher applied in GSM networks allows an adversary to perform MITM attacks. By
exploiting the vulnerability that GSM AKA does not support mutual authentication,
an adversary can intercept all messages between the UE and the serving network.
Figure 3.1: Harris Corporation’s first IMSI Catcher, the StingRay. Source: [Rya].
IMSI Catchers have existed for a long period, and the first IMSI Catcher was
commercially launched by the German company Rohde & Schwarz in 1996 [Ooi15].
However, the most publicly known IMSI Catcher is the StingRay produced by Harris
Corporation. The company made two models of the StingRay, the original StingRay
sold for $68,479 USD and the StingRay II sold for $134,952 USD [Rya]. Figure 3.1
shows the first portable StingRay.
Today’s IMSI Catchers are much handier in terms of price and size. The IMSI
Catcher used to perform experiments in this thesis is run on the USRP B200mini
produced by Ettus Research. The B200mini card is the size of a credit card, making
it practical and discrete. Also, the prize has dropped drastically; the $134,952 USD
StingRay II can be replaced by the B200mini costing $726 USD1 . Another improved
1 The price of the StingRay II also contains the software handling the IMSI catching logic, while
feature of the B200mini is a convenient bus-powered Universal Serial Bus (USB) 3.0
connectivity. Section 3.3.3 describe the full specification of the B200mini.
3.3.1 Overview
This section describes how to set up an experimental IMSI Catcher, using the open
source platform OpenAirInterface and the USRP B200mini. Notably, the B200mini
handles the transceiving radio part, while OpenAirInterface handles all the logic.
Below is a detailed list of all the necessary hardware and software that were used to
build the IMSI Catcher and conduct the experiment:
◦ Memory 8 GiB
◦ Processor Inter Core i7 860 @ 2.80GHz * 8
◦ Graphics GeForce GT 630
– USRP B200mini-i, 70 MHz - 6 GHz frequency range, full duplex and USB 3.0
bus-powered
– Wireshark v1.10.6
3.3.2 OpenAirInterface
OpenAirInterface is an open source platform developed by EURECOM, written
in C [Ope16]. OpenAirInterface aims to follow the 3GPP standardization of the
LTE protocol stack, to make the software structure similar to a commercial LTE
network [Ope16]. The OpenAirInterface project is mainly divided into three projects:
openairinterface5G (E-UTRAN), openair-cn (EPC), and oai1B (UE). Consequently,
OpenAirInterface was chosen for this thesis because it supports multiple deployment
scenarios and provides EPC, eNodeB and UE configurations. Deployment scenarios
implemented in this thesis are the following:
The first deployment scenario is used in the IMSI Catching experiment, further
explained in Section 3.5. The second deployment scenario is used to catch paging
messages passively, further explained in Chapter 4. Furthermore, all OpenAirIn-
terface entities can freely be cloned from gitlab.eurecom.fr’s Github repository
[Opea].
– PWR LED (Power Indicator) The PWR LED is orange if the USRP is connected
to power
– TRX LED (TX/RX Activity) The TRX LED is green if data is being received,
red if data is being transmitted, and orange if the USRP alternating between
transmitting and receiving
– RX2 LED (RX2 Activity) The RX2 LED is green if the USRP is receiving data
– SW1 (Hard Reset Switch) The SW1 is a switch used to reset the system
3.3. IMSI CATCHER SETUP 31
The B200mini is mounted with two antennas: one antenna used for both trans-
mitting and receiving, while the other is used for receiving only. Both antennas are
of type W1900, produced by Pulse Electronics [Pul].
3.3.4 Topology
USRP B200mini, host PC, Android mobile phone, and OpenAirInterface are the
main components needed to set up an LTE IMSI Catcher. The OpenAirInterface
software installed on the host PC constitutes the EPC, and the USRP connected
to the eNodeB software constitutes the E-UTRAN. Figure 3.3 illustrates the full
topology of the experimental setup. Notably, to provide IP connectivity to the UE,
the host PC requires an Internet connection; however, during this experiment, the
UE does not require IP connectivity.
32 3. USING IMSI CATCHERS
3.3.5 Wireshark
Wireshark is the software tool used to capture and intercept traffic between the
UE, the MME, and the HSS. Since the UE, the MME, and the HSS are configured
to communicate over the loopback interface, Wireshark can capture all package
exchanges using the following command:
cd ~/ o p e n a i r −cn /SCRIPTS
$ . / build_mme − i
$ . / build_hss −i
$ . / build_spgw − i
3.4. CATCHING IMSIS 33
Subsequently, the eNodeB is built using the following commands in the terminal:
cd ~/ o p e n a i r i n t e r f a c e 5 g / cmake_targets
$ . / b u i l d _ o a i −w USRP −x −c −−eNB
The following commands are executed in the terminal to start each entity and
deploy the IMSI Catcher:
$ . / run_hss
$ . / run_mme
$ . / run_spgw
$ sudo −E . / l t e −softmodem −O enb . band7 . tm1 . usrpb210 . c o n f −d
Consequently, all the running entities will together constitute an LTE test net-
work (IMSI Catcher). Furthermore, the configuration parameters of the network
can be changed to achieve the desired network. The default LTE test network is
configured with MCC=208, MNC=93, and DL frequency=2680 MHz. Consequently,
by choosing the country code of France, an unused network code, and a DL frequency
that is not within the allocated frequencies of Norwegian PLMNs, interfering with
commercial PLMNs are avoided. Appendix A gives a full description of prerequi-
sites, configuration parameters, and commands needed to set up an LTE test network.
3.4.1 Overview
One Jammer and one Collector are needed to build an LTE IMSI Catcher operating
in LTE networks. Essentially, both the Jammer and the Collector are two separated
IMSI Catchers; however, they work together as one in the IMSI Catching process.
Both the Jammer and the Collector are built using the topology depicted in Figure 3.3,
34 3. USING IMSI CATCHERS
where B200mini and OpenAirInterface constitute the access network and the core
network. The Jammer and the Collector are further described in Section 3.4.3.
The first functional requirement for an IMSI Catcher is to force UEs to attach to it.
GSM connected UEs are regularly scanning for surrounding eNodeBs, if more than
one eNodeB is detected, the one with the highest signal power is preferred. Strobel
has proven that a GSM IMSI Catcher can exploit this feature [Str07]. By simply
masquerade as a real BS and operate with the highest signal power, surrounding UEs
automatically attaches to the IMSI Catcher [Str07]. However, this feature may not
always be feasible in LTE. LTE enabled UEs located close to a serving BS already
have sufficient signal power and excludes searching for surrounding BSs to save
battery power. Necessarily, to overcome this obstacle the absolute priority feature is
exploited. 3GPP LTE Release 8 specification first introduced the absolute priority
feature [SBA+ 15, 3GP13].
Absolute Priority
UEs in RRC IDLE state periodically receives prioritized frequencies from the serving
and neighboring eNodeBs. Moreover, the eNodeB performs reselection based on the
absolute priority, which indicates that UEs always try to connect to the eNodeB with
highest prioritized frequency [3GP10]. The PLMN is responsible for allocating the
absolute priorities, which are only valid within the PLMN [3GP10]. The absolute
priorities are attached to SIB type 4, 5, 6, and 7, and broadcasted by all eNodeBs
[3GP16b]. Consequently, the highest prioritized frequency of a mobile operator can
be obtained by passively sniffing SIB messages. Chapter 4 describes how to use a
modified IMSI Catcher (SIB Catcher) to sniff SIB messages passively.
After obtaining the high priority frequencies, the next step is to masquerade
as a commercial eNodeB. Consequently, by using the same MNC and MCC as a
commercial PLMN, the IMSI Catcher impersonates the commercial eNodeB. Notably,
a list of MCC and MNC values are publicly published yearly by the International
Telecommunication Union (ITU) [Int16], alternatively; it can be retrieved by sniffing
SIB type 1 messages from commercial eNodeBs. Table 3.1 provides a description of
the SIB message types relevant to this thesis2 .
Table 3.1: System Information Block messages in LTE (excluding SIB 10-13)
[3GP16b].
Message Description
Type
SIB type 1 Cell access information and scheduling of other SIBs
SIB type 2 Common and shared radio resource configuration for all UEs
SIB type 3 Cell re-selection parameters for intra-frequency, inter-frequency
and/ or inter-RAT cell re-selection
SIB type 4 Information related to E-UTRAN intra-frequency neighboring cells
SIB type 5 Information related to E-UTRAN inter-frequency neighboring cells
SIB type 6 Information regarding inter-RAT cell re-selection (UTRAN cell
information)
SIB type 7 Information regarding inter-RAT cell re-selection (GERAN cell
information)
SIB type 8 Information regarding inter-RAT cell re-selection (CDMA2000 cell
information)
SIB type 9 Information related to home eNodeB name
The Jammer has the responsibility to block the eNodeB operating with the
highest prioritized frequency. The Jammer simply operates on the same frequency as
the commercial eNodeB, causing interference between the two eNodeBs. Meanwhile,
the Collector operates with the second highest prioritized frequency and have the
responsibility to perform the actual IMSI acquisition. Since the Jammer blocks the
highest prioritized frequency, UEs will automatically try to connect to the second
highest prioritized frequency, which is the Collector. It is important that the Collector
is the first one turned on, followed by the Jammer. Otherwise, the UE may bypass
the Collector and directly connect to another commercial cell.
The following method only requires an iPhone and a valid LTE subscription3 ; however,
the method is only able to obtain configuration parameters for one PLMN. Most
iPhone models contain a graphical user interface to view the "Field Test Mode",
which is a menu providing technical information about serving and surrounding
cells. The "Field Test Mode" is invoked by dialing "*3001#12345#*". The highest
prioritized frequency is most likely the frequency of the serving cell and can be found
by navigating to "Serving Cell Measurements" in the "Field Test" menu. Figure 3.4
depicts the complete "Field Test" menu.
The "Serving Cell Measurements" menu only provides the E-UTRA Absolute
Radio Frequency Channel Number (EARFCN) of the serving cell; consequently,
equation 1 and 2 calculates the DL and the UL frequency. The DL frequency is
calculated using equation (3.1), where NDL is the DL EARFCN, and the 3GPP
standard defines FDL_low and Nof f s−DL [3GP11a].
Further, the configuration parameters for the Collector are obtained by navigating
to "Neighbor Measurements → Neighbor Cells List" in the "Field Test" menu. The
list does not contain the priority of the frequencies; consequently, the trial and fail
method determine the frequency for the Collector.
The following method is more comprehensive and requires additional software and
hardware tools; however, it obtains configuration data for multiple PLMNs. Necessary
hardware and software are USRP, PC with Ubuntu 14.04, and OpenAirInterface.
Notably, OpenAirInterface is configured as a UE, used to catch and decode SIB type
5 messages. As described in Table 3.1, the SIB type 5 message contains the priority of
neighboring cells operating in different frequency bands. Consequently, by comparing
the priority for each cell, the configuration parameter for the Jammer and Collector
are determined4 . Section 4.4.5 describes how to configured OpenAirInterface as a
UE and how it can be used to catch SIB messages from commercial eNodeBs.
Both of the methods confirmed the configuration parameters for the Jammer
and the Collector. Table 3.2 summarizes the configuration parameters used in the
experiment conducted in Section 3.5. Accordingly, the Jammer is configured to
operate in band 3 with EARFCN 1650, while the Collector is operating in band 20
with EARFCN 6300.
4 ’finnsenderen.no’ is a tool that shows the geographical location for all the eNodeBs in Norway,
Table 3.2: Configuration parameters for the Collector and the Jammer.
IMSI Band DL Frequency UL Frequency EARFCN
Catcher (MHz) (MHz)
Collector 20 806 847 6300
Jammer 3 1850 1755 1650
3.5 Experiment
The following IMSI Catcher experiment was conducted in the Electrical engineering
building at Norwegian University of Science and Technology (NTNU) in Trondheim,
Norway. The objective of the experiment was to use an IMSI Catcher to spoof Telia
and collect IMSIs5 . Furthermore, Appendix B contains the code changes required to
achieve the IMSI Catcher behavior.
3.5.1 Overview
Ideally, the IMSI Catcher should be able to catch IMSIs without the subscriber
noticing it. Consequently, after receiving the IMSI, the Collector indicates to the UE
that it is no longer available, causing the UE to reconnect to a commercial eNodeB.
The experiment consists of three phases:
– The Jammer blocks the prioritized frequency of the commercial LTE network,
causing UEs to disconnect from the serving cell and start searching for new
cells
– The UEs eventually disconnects from the Collector and returns to the commer-
cial network
Figure 3.5 summarizes the flow of the experiment. Moreover, the second phase of
the experiment represents message 1-7 in Figure 3.5, while the third phase of the
experiment represents the eighth message6 .
3.5.2 Configurations
As mentioned in section Section 3.4.2, to be able to spoof a commercial PLMN, the
same MCC and MNC are used. Consequently, the following configurations were
applied to the Collector:
5 Telia
was chosen for this experiment because the available test UEs had Telia subscriptions.
6 The
first phase of the experiment did not contain any message exchanges and hence excluded
from Figure 3.5.
3.5. EXPERIMENT 39
– Select a TAC different from the Telia TAC in the location of the experiment:
TAC=01
Moreover, the Jammer has the same configuration as the Collector, except the
frequency, which is 1850MHz. Table 3.2 summarizes the configuration parameters
for the Jammer and the Collector.
new attach procedure [3GP14c]. Message 1 and 2 in Figure 3.5 illustrates the TAU
Request and TAU Reject message. Moreover, the TAU procedure does not contain
any relevant information for this experiment; however, it can be used to check for
GUTI persistence 7 .
Figure 3.6: Wireshark capture of a TAU Reject message returning EMM rejection
cause 10.
An Attach Request message is sent by the UE to the MME to initiate the attach
procedure. The Attach Request contain valuable information such as the EPS
mobile identity containing the IMSI, the GUTI, or the IMEI [3GP11c]. For the sake
of subscriber identity confidentiality the EPS mobile identity ideally contain the
temporary identity, the GUTI. However, the Collector can force the UE to reveal
its permanent identity (IMSI) by initiate an Identity Request message. The Identity
Request is used to inform the UE that the serving network (Collector) is unable to
retrieve the IMSI from the GUTI, and hence requests the IMSI. Figure 3.7 highlights
how the IMSI Catcher uses the Identity Request to obtain the IMSI.
7 Shaik et al. have discovered that network operators tend not always to update the GUTI, and
UEs may have the same GUTI for up to three days [SBA+ 15].
3.5. EXPERIMENT 41
Figure 3.7: Identity Request message initiated by the IMSI Catcher to obtain the
IMSI.
Upon reception of the Identity Request, the UE interprets the message and returns
the requested IMSI in an Identity Response message. Figure 3.8 depicts how a UE
provides its IMSI to the Collector unprotected. The IMSI is censored to preserve
subscriber identity confidentiality; however, the first five uncensored digits of the
IMSI reveals that the subscriber is located in Norway and have a Telia subscription.
As listed in Section 2.7, the Identity Request message does not require a secure
exchange between the UE and the network. Consequently, the Collector send and
unprotected Identity Request to the UE, resulting in an unprotected Identity Response
from the UE.
The final step of the attach procedure is to disconnect the UE. Since the Collector
already has obtained the IMSI, it sends an Attach Reject message to the UE. Conse-
quently, the Attach Reject message indicates that the network has rejected the Attach
Request [3GP14c]. The Attach Reject message may contain different EMM rejection
causes, used to inform the UE why the network rejected it. Appendix C provides a
complete list of all the possible rejection values that can occur in an Attach Reject
message. Moreover, the Collector is configured to return EMM rejection cause #15
"No suitable cells in TA", illustrated in Figure 3.9. Rejection cause #15 instructs
the UE to store the TAI of the Collector in the list of "forbidden tracking areas
for roaming" and enter the EMM-DEREGISTERED state [3GP11c]. Subsequently,
the UE start searching for other suitable cells in another tracking area in the same
PLMN [3GP11c]. Since the TAI of the Collector exists in the "forbidden tracking
areas for roaming" list, the UE will not attempt to attach to the Collector until the
UE restarts or loses power.
Figure 3.9: Attach Reject message returning EMM rejection cause #15 (No Suitable
Cells In Tracking Area).
Consequently, by applying EMM rejection cause #15 to the Attach Reject message,
the Collector transfers the UE back to the commercial network with a low probability
of the subscriber noticing the IMSI catching. The experiment has shown that the
average time between the Attach Request message and the Attach Reject message is
23.5622 milliseconds; i.e. the UE is disconnected from the commercial network and
3.6. USE IMSI FOR LOCATION DISCLOSURE 43
loses LTE service for 23.5622 milliseconds in addition to the time it takes to reattach
to the commercial network. Due to the automatic reattachment and the short service
disruption, subscribers with a regular LTE subscription will have difficulties noticing
the IMSI catching, unless he/she is in a phone call.
Results
The Collector was spoofing Telia for 35 seconds and was able to catch 3 different
IMSIs. Retterstøl conducted a similar experiment in 2015 where he spoofed NetCom’s
(former Telia) GSM network [Ret15]. Retterstøl managed to capture 8 IMSIs in 11
minutes. As a result, the IMSI Catcher setup explained in thesis can be considered
far more efficient than the IMSI Catcher introduced by Retterstøl. Since both
the experiment in this thesis and Retterstøl’s experiment were conducted on the
same network operator and in the same location, the experiments are considered
comparable8 . Table 3.3 summarizes the results obtained by the Collector. Notably,
one of the captured IMSIs had the MNC used for Telia’s subsidiaries (05), while two
IMSI had Telia’s original MNC (02). Also, all the collected UEs were previously
attached to the same commercial cell; this behavior was expected since the Jammer
blocked the frequency of that cell. The S-TMSIs were retrieved from the TAU Request
messages.
Table 3.3: IMSIs obtained when spoofing Telia. MSINs are censored.
IMSI Previous Cell Identity S-TMSI
24202XXXXXXXXXX 15597824 0xc4004890c4
24202XXXXXXXXXX 15597824 0xe4007a0324
24205XXXXXXXXXX 15597824 0xc4005713c2
The experiment in Section 3.5 revealed that catching IMSIs in LTE networks is
feasible. The IMSI is stored on the UICC and cannot be changed unless the UICC
card is physically replaced. IMSI disclosure is a severe violation of subscriber identity
confidentiality and may have fatal consequences. As a result, the IMSI can be used
to reveal subscriber location and track movement over time.
The previous connected commercial cell is used to improve the subscriber lo-
cation accuracy for a Collector operating with a large coverage area. By using
’finnsenderen.no’ and one of the two methods explained in Section 3.4.4, the geograph-
ical location and the coverage area of the commercial cell is determined. Consequently,
the location of the subscriber lies within the intersections of the Collector and the
commercial cell’s coverage area, as illustrated in Figure 3.10. The yellow part of
the figure highlights the coverage area of the Collector, the red part highlights the
coverage area of the commercial cell, and the part where the circles overlap highlight
the subscriber location10 . Notably, the accuracy of this method decreases as the
distance between the Collector and the commercial cell decreases. Also, if the distance
between the Collector and the UE becomes too big, the UE might reselect another
cell due to stronger received signal power.
9 The COST-231 model is used to calculate the transmission distance for LTE band 3, and the
HATA model is used to calculate the transmission distance for LTE band 20 [Sin12].
10 The software tool SPLAT! can be used to calculate the coverage area of a cell based on the
The test scenario illustrated in Figure 3.10 shows that an IMSI Catcher using
a power amplifier can achieve a cell radius of 800 meters. The commercial cell is
operating in the 800MHz frequency band and hence have a cell radius of 1 km.
Consequently, an IMSI Catcher located at "Marinen" (center of yellow circle) is able
to catch IMSIs located at Gløshaugen campus. The setup illustrated in Figure 3.10
have not been tested in this experiment; however, Section 3.4.2 suggest that IMSI
Catchers with extended coverage should be theoretically feasible to implement.
Figure 3.10: Map of the coverage area of the Collector and the commercial cell.
The yellow circle highlights the coverage area of the Collector and the red circle
highlights the coverage area of the commercial cell. Edited map from Google Earth
Pro [Goo].
46 3. USING IMSI CATCHERS
3.7 Countermeasures
Ooi has proposed several countermeasures against IMSI Catchers in GSM networks
which are also applicable for LTE IMSI Catchers [Ooi15].
The experiment described in Section 3.5 was conducted in the wireless security lab
at NTNU, and have proved that IMSI catching in LTE networks is feasible.
The experiment was conducted late in the evening when there were few people
at the university to prevent unauthorized UEs from attaching to the IMSI Catcher.
Also, the output power of the USRP was reduced to 10dbm to limit the coverage
area of the IMSI Catcher. However, one of the captured IMSIs was not part of the
experiment but was accidentally located close to the IMSI Catcher. As described
in Appendix D the unauthorized UE was only attached to the IMSI Catcher for
0.017320 milliseconds, causing a minimal service disruption.
There were only used two test UEs in the experiment; however, the experiment
was repeated several times to make sure the results were consistent. Consequently, by
only having two test UEs, the IMSIs were quickly obtained, and thus the experiment
was rapidly conducted each time. Furthermore, the two test phones were of the type
LG Nexus 5X with a prepaid Telia subscription.
From Figure 3.4 it can be observed that some phone manufacturers reveals very
detailed information about the serving cell and neighboring cells. This information
can be useful for determining the configuration parameters for the Jammer and
Collector in a given area.
3.8. DISCUSSION AND RESULTS 47
Based on the results gathered in Section 3.5.4, the IMSI Catcher was able to
catch three different IMSIs within 35 seconds. Even though there is insufficient data
to draw a conclusion, the experiment indicates that the IMSI catching process is very
efficient. Retterstøl conducted a similar IMSI Catcher project in 2015 where IMSIs in
the GSM network was collected [Ret15]. Retterstøl was able to catch eight different
IMSIs within eleven minutes, which indicates that the IMSI catcher introduced in
this experiment appears to be more effective. Also, Retterstøl’s experiment consisted
of 31 participants, while this experiment was conducted late in the evening with only
two participants.
Figure 3.11: SIB type 1 message containing periodicity for SIB type 3-7.
Passive Broadcast Catcher
Chapter
4
This chapter explains how to sniff and decode broadcast messages sent by commercial
eNodeBs passively. SIB and paging messages are technically described and analyzed
for each PLMN. Additionally, the chapter contains a description of the software and
hardware tools used in the experiment. Furthermore, an in-depth analysis of ice.net’s
temporary identity allocation.
Chapter 2 provides relevant information for this chapter. Section 2.4 include
descriptions of channels types used to transport and distribute broadcast messages
to UEs, while Section 2.6 contains a description of the LTE security architecture and
security aspects. Other relevant references will be noted during the chapter.
4.2 Paging
49
50 4. PASSIVE BROADCAST CATCHER
IMSI identifies the paging message [3GP16b]. Figure 4.1 shows the paging procedure
and the subsequent RRC connection establishment.
When the MME receives an IP packet from an external network, it has to ensure
that the UE have established a valid RRC connection. Consequently, the EPC uses
smart paging to locate the subscriber1 . Moreover, the MME sends an S1AP paging
message to the eNodeB where the UE was last attached. If the UE does not reply,
the paging message is broadcasted by every eNodeB in the TA [Dav13, SBA+ 15].
Message 1 in Figure 4.1 illustrates the S1AP paging message. Subsequently, the
eNodeBs broadcast an RRC paging message to all the surrounding UEs, notifying
them about the incoming IP packet [Rao11]. Each UE interprets the packets and
discards it unless the ue-Identity matches the identity of the UE. Once the intended UE
receives the RRC paging message from the eNodeB, it initiates the RRC establishment
procedure, illustrated as message 3-5 in Figure 4.1 [Rao11]. The procedure is used to
establish a valid RRC connection and let the UE inform the network which services
it requests [3GP16b]. Message 3 indicates the RRC Connection Request, containing
a reason why the UE wants to connect to the network. RRC Connection Setup
1 Smart paging is used to reduce the signaling load in LTE networks by limiting the paging to
In most cases, paging messages are triggered by voice calls, SMS messages or
other similar procedures. In urban areas, the paging occasion may be frequent, and
an eNodeB may send multiple messages per second. Consequently, to reduce the
number of messages, the eNodeB may address multiple UEs to the same paging
message [3GP16b]. Implying that a paging message contains multiple PagingRecords,
where each PagingRecord includes a UE identity. The paging message may also
include non-subscriber related information, such as system information updates and/
or ETWS notification. Table 4.1 summarizes the RRC paging message structure.
4.2.3 UE Identity
4.3.1 Overview
SIB Type 1
SIB type 1 is one of the most important messages, as all the other SIB types depend
on the information carried in this message. SIB type 1 is broadcasted once every
80 millisecond and stores the schedulingInfoList, carrying information about the
periodicity of other SIs [3GP16b]. Additionally, SIB type 1 contains cell id, MNC,
MCC, TAC, a mapping of SIBs to SI messages, and cell access restrictions [3GP16b].
Moreover, SIB 1 and SIB 2 plays a central role in the attach procedure. Before a
UE can initiate an attach procedure, the information provided in SIB type 1 and
SIB type 2, must be received and interpreted [Ari13].
SIB Type 2
The schedulingInfoList does not contain the periodicity of SIB type 2; however, the
periodicity of SIB 2 always corresponds to the first entry in the schedulingInfoList
2 The first MIB is transmitted in subframe #0 for which the SFN mod 4 = 0 [3GP16b].
54 4. PASSIVE BROADCAST CATCHER
[3GP16b]. The SIB type 2 contains RRC information common for all UEs, in addition
to timers, UL power controls and configuration information for the logical channels
PCCH and BCCH.
The schedulingInfoList in SIB 1 contains the scheduling periodicity for SIB 3-7. SIB
3-7 are all RRC information elements providing information regarding cell re-selection,
neighboring cells, and intra/inter-frequencies [3GP16b].
4.4.1 Overview
eNodeBs continuously broadcasts unprotected SIB and paging messages to all sur-
rounding UEs. Consequently, a USRP and free Software Defined Radio (SDR)
software collect and decode these messages. Unlike the setup described in Section 3.3,
the USRP is configured as a UE. Notably, OpenAirInterface has not implemented
the page procedure yet [Bhe16]; consequently, the software srsLTE captures paging
messages, while OpenAirInterface captures SIB messages. The following hardware
and software were used to conduct the experiments:
4.4. EXPERIMENTAL SETUPS 55
◦ Memory 8 GiB
◦ Processor Inter Core i7 860 @ 2.80GHz * 8
◦ Graphics GeForce GT 630
– USRP B200mini-i, 70 MHz - 6 GHz frequency range, full duplex and USB 3.0
bus-powered
4.4.2 srsLTE
srsLTE is an open source platform for building SDR UE and eNodeB, developed
by Software Radio Systems (SRS) [Sof]. The software is implemented in C and
compatible with the LTE Release 8 specification, defined by 3GPP [Sof, 3GP13].
srsLTE contains multiple prebuilt example applications based on UE and eNodeB
specifications. Example applications implemented in this thesis are the following:
4.4.3 Topology
USRP B200mini and the srsLTE software constitutes the topology of the Paging
Catcher. The srsLTE software consists of three prebuilt applications: pdsch_ue,
56 4. PASSIVE BROADCAST CATCHER
cell_measurement, and cell_search. Figure 4.3 depicts the full topology of the Paging
Catcher.
The topology of the SIB Catcher is very similar to the topology described in
Section 3.3.4; however, the UE software replaces the EPC software. Moreover, the
USRP B200mini collects broadcast data transmitted over the air by commercial
eNodeBs. Figure 4.4 depicts the topology of the SIB Catcher.
SrsLTE and a USRP are needed to catch paging messages sent by commercial
eNodeBs. The USRP is of the type B200min, and srsLTE is configured as a UE.
Section 3.3.3 describes the full specification of the B200mini. Furthermore, srsLTE
is easily downloaded and installed using the following command in the terminal3 :
Alternatively, the software suite can also be installed using the following command
in the terminal [srs]:
$ sudo make i n s t a l l
3 Mandatory dependencies: libfftw (library for computing the discrete Fourier transform).
58 4. PASSIVE BROADCAST CATCHER
Figure 4.5: Overview of the neighboring LTE eNodeBs to the experiment location.
The red "X" represents the location of the experiment, and the red "O" represents
the location of the target cell. Edited map from ’www.finnsenderen.no’ [Nko].
Figure 4.6 show that the cell_search application was able to detect three cells in
band 20. Moreover, the target cell has the downlink frequency 806MHz, EARFCN
4.4. EXPERIMENTAL SETUPS 59
number 6300 and physical identity 123. Consequently, all the required parameters
for the pdsch_ue application are obtained.
Results
The results obtained in this section demonstrates how to gather paging messages,
while Section 4.5 analyzes the content of the messages. Figure 4.7 illustrates how
the Paging Catcher collects and decodes paging messages broadcasted by cell id 123.
The Paging Catcher was sniffing the cell for two seconds and gathered eight paging
messages.
Figure 4.7: Paging messages from Cell ID 123, gathered from srsLTE.
Paging decoding is a two-step procedure: the first step catches and decodes paging
message from PDSCH to raw Abstract Syntax Notation One (ASN.1) hexadecimal
format (depicted in Figure 4.7), the second step decodes the raw data to readable
Extensible Markup Language (XML) format (depicted in Figure 4.8). The code
given in Appendix E shows how to decode paging messages in practice4 .
4 "www.marben-products.com" is an online ASN.1 decoder which does not require any software
[Mar].
60 4. PASSIVE BROADCAST CATCHER
Appendix A.1 and Appendix A.4 contains installation instructions and required
dependencies for the OpenAirInterface-UE project. Subsequently, the following
command initiates the SIB Catcher:
$ cd / o a i 1 b / o p e n a i r i n t e r f a c e 5 g / cmake_targets
$ sudo −E . / lte_noS1_build_oai / b u i l d / l t e −softmodem−nos1
−U −C806000100 −r 5 0 −−ue−scan−c a r r i e r −−ue−t x g a i n 90
−−ue−r x g a i n 115 −S −V −K /tmp/eNB0 . l o g ; ENABLE_ITTI=1 >&1
4.5. PAGING ANALYSIS OF COMMERCIAL PLMNS IN NORWAY 61
Results
OpenAirInterface-UE catches, decodes, and outputs the result in XML format. Fig-
ure 4.9 provides an excerpt of the gathered SIB messages, while Appendix F provides
the complete output of the decoded SIB messages. As described in Section 4.3.3,
SIB type 1 is scheduled once every 80th millisecond. From the results gathered in
Appendix F, one can observe that SIB type 2 and 3 are scheduled once every 80th
millisecond and SIB type 3-7 are scheduled once every 640th millisecond. Hence, the
SIB Catcher only had to run for a few second to catch and decode all SIB messages5 .
The results given in Appendix F shows that catching SIB type 1-7 from commercial
eNodeBs is feasible.
4.5.1 Overview
As described in Section 4.2.1, LTE supports the smart paging feature which limits
the paging to a cell. Consequently, this implies that the position of a subscriber
can be mapped to the coverage area of a particular cell, which is typically 2 km2 in
5 How often UEs interprets SIB messages depends on the configurations of the UE.
62 4. PASSIVE BROADCAST CATCHER
urban areas. Moreover, this feature is not exploitable in GSM networks as the paging
messages are sent to an entire location area (typically 100 km2) [Kun12]. Table 4.3
provides an overview of all the collected paging messages sorted by message type.
From Table 4.3 one can observe that most of the collected paging messages in
this experiment are PagingRecord messages. Notably, 384 Telenor messages had the
systemInfoModification indication, whereas 101 of these messages were destined for a
specific subscriber. The systemInfoModification indicates that the core network has
made some modifications to the BCCH [3GP16b]. Expectedly, none of the messages
had the etws-Indication.
Previous Research
Previous research has discovered several techniques for mapping the temporary
identity and the social identity; however, none of them are as effective anymore.
Kune et al. proposed to initiate a phone call, and abort before the first ring [Kun12].
The phone call triggers paging but terminates before it displays on the UE. However,
applications for detecting such activity have emerged [Uda]. Furthermore, Shaik et
al. proposed to use Facebook Messenger to send a message to a person who is not in
the friend list [SBA+ 15]. The message triggers paging but does not appear in the
regular inbox folder. However, Facebook has changed this feature; users now see
messages from persons not in the friend list as "Message Requests" [Fac].
hence improved. Notably, this attack will only work if the victim has the Facebook
application installed on his/her LTE device.
6 To get to the "Filtered Requests" menu click Messenger, then Settings, then Message Requests,
Two Facebook accounts are required to exploit the "Filtered Requests" feature:
account1 used to send Facebook messages (paging messages), and account2 used to
mark account 1 as a spammer. After account1 has been marked as a spammer, all
subsequent messages to users not in the friend list redirects to the "Filtered Requests"
folder. As a result, account1 can send paging messages to a specific subscriber with
a low probability of the subscriber noticing the messages.
Figure 4.11 shows that by triggering five consecutive paging messages to the same
subscriber, a mapping between the GUTI and the subscriber is determined. The
figure highlights that the hex string "40 02 9c 20 ac 18 d0" is the only paging message
repeated five times, and hence contains the GUTI of the subscriber.
Figure 4.11: Five consecutive paging messages maps the GUTI to subscriber’s
social identity.
This section analyzes the SIB messages broadcasted by the three PLMN in Norway.
4.6. SYSTEM INFORMATION ANALYSIS OF COMMERCIAL PLMNS IN NORWAY
65
4.6.1 Overview
Three cells are analyzed in this experiment, one from each PLMN. All the analyzed
cells operated in the frequency band 20 and were located relatively close together to
make the conditions similar for each PLMN.
4.6.2 Telia
Table 4.4 highlights the most relevant parameters for this thesis, extracted from
SIB 1-7 broadcasted by a nearby Telia eNodeB at the location of the experiment.
Cell 34767628, transmitting on EARFCN 6300, was used during this experiment.
Section 4.4.4 describes how to locate neighboring eNodeBs and corresponding EAR-
FCNs. Moreover, Appendix F contains all the SIB 1-7 parameters broadcasted by
cell 34767628.
Table 4.4 shows that all the required parameters for determining the inter-
frequency cell reselection are given. Notably, the reselection priority of the sniffed
66 4. PASSIVE BROADCAST CATCHER
cell is 5 (Cell ID 34767628), while the reselection candidates, EARFCN 2850 and
EARFCN 1650, have the priority 7 and 6 respectively7 . Consequently, the sniffed
cell operates with the lowest prioritized frequency and least likely to be selected.
4.6.3 Telenor
Table 4.5 highlights some of the parameters broadcasted by a nearby Telenor eNodeB
at the location of the experiment. Cell 17803267, transmitting on EARFCN 6400,
was used during this experiment. Section 4.4.4 describes how to locate neighboring
eNodeBs and corresponding EARFCNs.
7 The cell reselection priority is represented as an integer between 0 and 7, where 7 is the highest
4.6.4 ice.net
Table 4.6 highlights some of the parameters broadcasted by a nearby ice.net eNodeB
at the location of the experiment. Cell 64028178, transmitting on EARFCN 6200,
was used during this experiment. Section 4.4.4 describes how to locate neighboring
eNodeBs and corresponding EARFCNs.
Table 4.6 shows that the all the SIB messages are transmitted once every 160th
millisecond. Unlike Telia which transmits SIB 2-3 once every 80th millisecond and
SIB 4-7 once every 640th millisecond. Regarding efficiency, one may say that Telia’s
68 4. PASSIVE BROADCAST CATCHER
configuration is better, as the most important SIBs are transmitted more often than
the less important SIBs. Noteworthy, the reselection candidates for the ice.net cell is
equivalent to the Telia cell, because ice.net and Telia have an agreement that allows
ice.net subscribers to use the Telia infrastructure [Ice].
This section analyses the usage of the paging parameter ue-Identity. As described in
Section 4.2.3, ue-Identity identifies the paging message and should preferably contain
the temporary identity of the subscriber.
Table 4.7 shows that the total number of received paging messages varies con-
siderably among the three PLMNs. The reason for the uneven paging distribution
is unknown; however, there seems to be a correlation between RSRP value and the
number of received paging messages, which may indicate that some of the paging
messages from Telia and ice.net are lost due to weaker received signal power. Another
potential reason is that Telia and ice.net have implemented smart paging, which
drastically reduces the total amount of transmitted paging messages [Dav13]. How-
ever, this is just speculations without any scientific proofs.
Expectedly, no IMSIs were found during the experiment, and the PLMNs have
successfully preserved the confidentiality of the permanent subscriber identity.
8 The higher the RSRP value, the stronger the received signal.
4.8. COUNTERMEASURES 69
The GUTI persistence for ice.net has been monitored for six days, and the results
are summarized below:
– The UE was moved 500 meters in an urban area, the movement caused a
handover, and the UE went from frequency band 20 to frequency band 3.
Consequently, the movement triggered a GUTI reallocation.
– The UE was camping in the same cell for 24 hours, during this period the
S-TMSI changed several times. The experiment captured the following S-TMSIs
during this period: 3255484813, 3244864778, and 3254888352.
– If the UE was completely turned off, a new GUTI was allocated when it was
turned on.
Based on the observations above, the GUTI appears to change regularly. Although
the experiment revealed that the first octet was similar for three consecutive S-TMSIs,
there is no contiguous pattern for the subsequent octets; hence, the S-TMSIs are
chosen randomly.
4.8 Countermeasures
The simplest method to countermeasure the attacks discussed in this chapter is
to update the GUTI more frequent. This method requires no changes to the LTE
protocol and prevents movement tracking [SBA+ 15].
The paging procedure can also be actively exploited to determine the location
of a subscriber. As described in Section 4.2, events such as SMS, voice calls, and
Facebook notifications triggers the paging procedure. Consequently, a "hidden"
Facebook message triggers a paging message, which can be sniffed by an attacker.
Section 4.4.5 shows that commercial eNodeBs regularly broadcasts SIB type 1-7.
OpenAirInterface-UE manages to catch and decode the SIB messages. Moreover, the
SIB messages reveal valuable configuration information about the network, which
can be exploited by an attacker in the information gathering phase/black-box testing.
For the experiments conducted in this thesis, the SIB messages are actively used to
exploit vulnerabilities in LTE networks.
Table 4.8 shows a summary of all the paging messages gathered in this chapter. In
total, 96975 paging messages were captured in an hour; unexpectedly, 99,96% of the
messages originated from a Telenor cell. A possible explanation for the unbalanced
signaling load might be that Telenor has neglected to implement smart paging.
Nowoswiat suggested that smart paging reduces the signaling by as much as 80%
[Dav13]. Consequently, by reducing Telenor’s number of paging message by 80%, the
total number of paging messages would be much closer to Telia and ice.net.
Furthermore, Table 4.3 categorizes the gathered paging messages. 384 collected
Telenor messages contain the SystemInfoModification, indicating that the network
4.9. DISCUSSION AND RESULTS 71
has made changes to the BCCH. Table 4.7 shows that none of the 96975 captured
paging messages include the permanent identity of the subscriber. As a result, all
the Norwegian PLMNs manages to keep the IMSI undisclosed and maintain the
confidentiality of the permanent subscriber identity.
The test scenarios described in Section 4.7.2 were implemented to evaluate the
GUTI persistence for ice.net. Notably, the results gathered in Section 4.7.2 build on
the observations in [SBA+ 15]. Expectedly, the results revealed that ice.net manages
to update the GUTI regularly, and follows the GUTI reallocation recommendations
by 3GPP [3GP11c].
Existing Location Disclosure
Attacks
Chapter
5
This chapter explains existing location disclosure attacks in LTE networks. Two
active location disclosure attacks are technically explained and analyzed. Additionally,
this chapter contains improvements for the proposed attacks.
Shaik et al. proposed two active location disclosure attacks: via measurement
reports and Radio Link Failure (RLF) reports [SBA+ 15]. Both attacks heavily rely
on IMSI Catchers and exploits specification and implementation vulnerabilities in
LTE. Furthermore, the two attacks locate subscribers with high accuracy.
73
74 5. EXISTING LOCATION DISCLOSURE ATTACKS
The improvements portrayed in this section have not been practically implemented;
however, the theory suggests that improvements are feasible.
The proposal combines the IMSI Catcher attack described in Section 3.5 with
measurementReport acquisition. By combining IMSI catching and measurementReport
acquisition into one attack, an attacker will be able to obtain the IMSI and determine
the exact location of a subscriber.
Figure 5.3 illustrates the message flow of the improvement proposal. Message 1-5
represent the RRC connection procedure, whereas message 5 sends the Attach Request
and triggers the attach procedure. Instead of forwarding the attach request to the
MME, the eNodeB initiated an Identity Request, requesting the IMSI from the UE.
Consequently, the UE attaches its IMSI to the Identity Response message and sends
it to the eNodeB (IMSI Catcher). At this point, the IMSI Catcher have obtained
the subscriber’s IMSI. Subsequently, the security procedure and the connection
reconfiguration completes as described in Section 5.1.1. As a result, the IMSI Catcher
collects the IMSI and the measurement data in one operation. Finally, the IMSI
Catcher terminates the connection by sending an RRCConnectionRelease message to
the UE. The RRCConnectionRelease message with releaseCause "other" instructs
the UE to return to IDLE state and attach to a new cell [3GP16b, 3GP16c]. The
UE performs cell reselection based on the cell reselection priority broadcasted in the
SIBs [3GP16b].
1 The measurementReport depicted in Figure 5.2 does not contain real data captured from a live
Subsequently, the UE enters IDLE state and starts searching for other cells. The
UE connects to enb2, enters into CONNECTED state and indicates the available
RLF report in a TAU Request message. Consequently, enb2 request the RLF report
by sending an unprotected UEInformationRequest message to the UE. As a result, the
UE replies by attaching the RLF report to an unprotected UEInformationResponse
message and sends it to enb2.
The proposal reduces the total amount of messages exchanged between enb1/enb2
and the UE, and shortens the overall outage time for the UE. Additionally, the attack
could be combined with the IMSI Catcher attack described in Section 3.5 to combine
the IMSI and the RLF report acquisition into one process.
Figure 5.5: Locating a subscriber using the trilateration procedure. The solid red
area indicates the location of the subscriber. Source: [SBA+ 15].
5.4. DISCUSSION AND RESULTS 81
Furthermore, the process of calculating the distance estimate (d1, d2, and d3)
based on the signal strength are described in [Caf98].
Notably, if the RLF report contains the locationInfo field, an attacker could
determine the subscriber’s exact location by using Global Positioning System (GPS)
coordinates4 .
Both the measurement report attack and the RLF attack determine a subscriber
exact position using the trilateration procedure. Moreover, the trilateration proce-
dure requires measurement data from three commercial cell to locate a subscriber.
Section 5.1.1 shows how an unprotected RRCConnectionRequest message triggers the
measurement report, while Section 5.2.2 show how to exploit the RLF timer T310 to
generate the RLF report.
From the proposal in Section 5.1.2, it can be observed that the measurement
attack is extended to enrich the results. Figure 5.3 shows how the IMSI catching and
the measurement report acquisition are combined into one operation. Furthermore,
Section 5.2.3 illustrates how a Jammer simplifies the RLF report attack, and still
obtain the same results. Notably, neither of the improvement proposals have been
practically implemented; however, the theory suggests that improvements are feasible.
4 Whether the locationInfo field is included in the RLF report or not, depends on the UE model
[SBA+ 15].
Chapter
Conclusion
6
LTE IMSI Catchers and Paging Catchers have been studied in this thesis. A technical
description of the subject explains how to use open source software for location
disclosure and movement tracking. The IMSI Catcher and the Paging Catcher have
been used to implement several attacks against privacy in LTE, the results of which
are technically explained and analyzed.
Accordingly, an LTE IMSI Catcher has been implemented and successfully proven
that IMSI catching in LTE networks is feasible. Moreover, since UEs connected to
an LTE network does not necessarily perform handover based on the highest received
signal power, the IMSI Catcher principles in GSM and UMTS are not applicable
to LTE IMSI Catchers. Consequently, the LTE IMSI Catcher presented in this
thesis exploits the absolute priority feature, implying that UEs attaches to the cells
operating with high priority frequencies. Chapter 3 includes the actual IMSI catching
experiment, illustrating real packet captures of the message exchange between the
IMSI Catcher and the UE. The experiment revealed that IMSI catching in LTE is
indeed achievable. Additionally, a thorough description of how to use the obtained
IMSIs for determining the position of the subscribers are given.
83
84 6. CONCLUSION
BSs passively. SIB messages contain detailed information about the mobile operator
and are utilized to configure the IMSI Catcher and the Paging Catcher.
The attacks in this thesis have proven that LTE networks do no provide privacy of
subscribers with regard to location and movement tracking. Both active and passive
attacks have successfully demonstrated that LTE network operators in Norway do
not preserve subscriber identity confidentiality.
6.1.4 Countermeasures
Countermeasures for the IMSI Catcher and the Paging Catcher have only been
discussed briefly in this thesis. In further work, more countermeasures should be
proposed and carefully reviewed. Also, countermeasures should be verified in practical
experiments.
References
[3GP08c] 3GPP. Evolved Universal Terrestrial Radio Access (E-UTRA); Physical chan-
nels and modulation. TS 36.211, 3rd Generation Partnership Project (3GPP),
September 2008.
[3GP10] 3GPP. Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved
Universal Terrestrial Radio Access (E-UTRAN); Overall description; Stage 2. TS
36.300, 3rd Generation Partnership Project (3GPP), June 2010.
[3GP11a] 3GPP. Evolved Universal Terrestrial Radio Access (E-UTRA); Repeater radio
transmission and reception. TS 36.106, 3rd Generation Partnership Project
(3GPP), January 2011.
[3GP11b] 3GPP. MME Related Interfaces Based on Diameter Protocol. TS 29.272, 3rd
Generation Partnership Project (3GPP), December 2011.
[3GP11c] 3GPP. Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS);
Stage 3. TS 24.301, 3rd Generation Partnership Project (3GPP), June 2011.
87
88 REFERENCES
[3GP13] 3GPP. Evolved Universal Terrestrial Radio Access (E-UTRA); Requirements for
support of radio resource management. TS 36.133, 3rd Generation Partnership
Project (3GPP), September 2013.
[3GP14a] 3GPP. General Packet Radio Service (GPRS) enhancements for Evolved Universal
Terrestrial Radio Access Network (E-UTRAN) access. TS 23.401, 3rd Generation
Partnership Project (3GPP), September 2014.
[3GP14b] 3GPP. Mobile radio interface layer 3 specification core network protocols; Stage 2
(structured procedures). TS 23.108, 3rd Generation Partnership Project (3GPP),
September 2014.
[3GP14c] 3GPP. Mobile radio interface Layer 3 specification; Core network protocols; Stage
3. TS 24.008, 3rd Generation Partnership Project (3GPP), September 2014.
[3GP16a] 3GPP. Evolved Universal Terrestrial Radio Access (E-UTRA); Medium Access
Control (MAC) protocol specification. TS 36.321, 3rd Generation Partnership
Project (3GPP), January 2016.
[3GP16b] 3GPP. Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource
Control (RRC); Protocol specification. TS 36.331, 3rd Generation Partnership
Project (3GPP), January 2016.
[3GP16c] 3GPP. Evolved Universal Terrestrial Radio Access (E-UTRA); User Equipment
(UE) procedures in idle mode. TS 36.304, 3rd Generation Partnership Project
(3GPP), January 2016.
[Ari13] Arijit Satpathy . All about SIB’s in LTE. http://lteinwireless.blogspot.no/2011/
06/all-about-sibs-in-lte.html, [Online; Accesses 11.05.2017], 2013.
[Bhe16] Bheemarjuna Reddy Tamma, Rohit Gupta and Kiran Kuchi. OpenAirInterface
(OAI) for Experimentation in 5G. http://www.iith.ac.in/newslab/sites/default/
files/Documents/ANTStutorial.pdf, [Online; Accesses 08.05.2017], nov 2016.
[Bra89] Braden, Robert. RFC-1122: Requirements for internet hosts. Request for Com-
ments, pages 356–363, 1989.
[Caf98] Caffery, James J and Stuber, Gordon L. Overview of radiolocation in CDMA
cellular systems. IEEE Communications Magazine, 36(4):38–45, 1998.
[Can] Canonical Ltd (Ubuntu). https://www.ubuntu.com/, [Online; Accesses
04.05.2017].
[Cho10] Bong Youl (Brian) Cho. 3GPP LTE (Rel. 8) Overview. Technical report, Intel
Corporation, September 2010.
[Cic16] Cichonski, Jeffrey and Franklin, Joshua M and Bartock, Michael. LTE Architec-
ture Overview and Security Analysis. NIST Draft NISTIR, 8071, 2016.
[Cox12] Christopher Cox. An introduction to LTE: LTE, LTE-advanced, SAE and 4G
mobile communications. John Wiley & Sons, 2012.
REFERENCES 89
[Dav13] David Nowoswiat. Managing LTE Core Network Signaling Traffic. https://
insight.nokia.com/managing-lte-core-network-signaling-traffic, [Online; Accesses
13.05.2017], jul 2013.
[Ett] Ettus Research. USRP Hardware Driver and USRP Manual. http://files.ettus.
com/manual/page_usrp_b200.html, [Online; Accesses 03.05.2017].
[Fac] Facebook. Which messages will I get on Facebook? https://www.facebook.com/
help/427500684120337?helpref=faq_content, [Online; Accesses 14.05.2017].
[Fed] Federal Communications Commission. CDBS Public Access. http://licensing.fcc.
gov/prod/cdbs/pubacc/prod/cdbs_pa.htm, [Online; Accesses 07.06.2017].
[FHMN12] Dan Forsberg, Günther Horn, Wolf-Dietrich Moeller, and Valtteri Niemi. LTE
security. John Wiley & Sons, 2012.
[Fre17] Frederic Firmin. The Evolved Packet Core. http://www.3gpp.org/technologies/
keywords-acronyms/100-the-evolved-packet-core, [Online; Accesses 25.04.2017],
2017. 3rd Generation Partnership Project (3GPP).
[Gio16] Giovanni Romano. 3GPP RAN progress on “5G”. ftp://www.3gpp.org/
Information/presentations/presentations_2016/3GPP%20RAN%20Progress%
20on%205G%20-%20NetFutures.pdf, [Online; Accesses 08.06.2017], 2016.
[Goo] Google Inc. Google Earth Pro. https://www.google.com/intl/no/earth/desktop/,
[Online; Accesses 25.05.2017].
[GSA15] GSA. Evolution to LTE report 4G MARKET & TECHNOLOGY UPDATE. Ts,
Global mobile Suppliers Association, August 2015.
[Ice] Ice.net. Dekning. https://www.ice.no/private/coverage/, [Online; Accesses
16.05.2017].
[Int16] International Telecommunication Union. Mobile Network Codes (MNC) for the
international identification plan for public networks and subscriptions (According
to Recommendation ITU-T E.212 (09/2016)). Technical report, International
Telecommunication Union, 2016.
[KG10] Ralf Kreher and Karsten Gaenger. LTE signaling: troubleshooting and optimiza-
tion. John Wiley & Sons, 2010.
[Kun12] Kune, Denis Foo and Koelndorfer, John and Hopper, Nicholas and Kim, Yongdae.
Location leaks on the GSM Air Interface. ISOC NDSS (Feb 2012), 2012.
[Leu12] Leu, Fang-Yie and You, Ilsun and Huang, Yi-Li and Yim, Kangbin and Dai,
Cheng-Ru. Improving security level of LTE authentication and key agreement
procedure. In Globecom Workshops (GC Wkshps), 2012 IEEE, pages 1032–1036.
IEEE, 2012.
[Lib] Libmich. What is libmich. https://github.com/mitshell/libmich, [Online; Accesses
06.06.2017].
90 REFERENCES
[LJL+ 16] Marc Lichtman, Roger Piqueras Jover, Mina Labib, Raghunandan Rao, Vuk
Marojevic, and Jeffrey H Reed. LTE/LTE-a jamming, spoofing, and sniffing:
threat assessment and mitigation. IEEE Communications Magazine, 54(4):54–61,
2016.
[LLM+ 09] Anna Larmo, Magnus Lindström, Michael Meyer, Ghyslain Pelletier, Johan
Torsner, and Henning Wiemann. The LTE link-layer design. IEEE Communica-
tions magazine, 47(4), 2009.
[Mar] Marben. Free Online 3GPP LTE ASN.1 Messages Decoder. http://www.
marben-products.com/asn.1/services/decoder-asn1-lte.html, [Online; Accesses
12.05.2017].
[MO17] Stig F Mjølsnes and Ruxandra F Olimid. Easy 4G/LTE IMSI Catchers for
Non-Programmers. arXiv preprint arXiv:1702.04434, 2017.
[New] RCR Wireless News. Master LTE with the Help of an LTE Network Dia-
gram. Available: http://www.rcrwireless.com/20140509/evolved-packet-core-epc/
lte-network-diagram.
[NN03] Valtteri Niemi and Kaisa Nyberg. UMTS security. John Wiley & Sons, 2003.
[Nor06] Quinn Norton. GNU Radio Opens an Unseen World. Available: http://archive.
wired.com/science/discoveries/news/2006/06/70933, May 2006.
[Ooi15] Ooi, Joseph. IMSI Catchers and Mobile Security. School of Engineering and
Applied Science University of Pennsylvania, 2015.
[Ope16] OpenAirInterface. Why is there a need of open source for 5G? Available:
http://www.openairinterface.org/?page_id=72, [Online; Accesses 06.04.2017],
2016.
[Poo12] Poole, Ian. LTE physical, logical and transport channels. Radio-Electronics. com,
2012.
[Pro] Prof. Do van Thanh. Lecture Notes from TTM 4133 Long Term Evolution (LTE)
2016. Itslearning, [Online; Accesses 25.04.2017].
[Rao11] Rao, V Srinivasa and Gajula, Rambabu. Protocol signaling procedures in LTE.
White Paper, Radisys Corporation, 2011.
[Ret15] Torjus Bryne Retterstøl. Base Station Security Experiments Using USRP. Mas-
ter’s thesis, NTNU, 2015.
[RJP16] David Rupprecht, Kai Jansen, and Christina Pöpper. Putting LTE security
functions to the test: a framework to evaluate implementation correctness. In
Proceedings of the 10th USENIX Conference on Offensive Technologies, pages
40–51. USENIX Association, 2016.
[SBA+ 15] Altaf Shaik, Ravishankar Borgaonkar, N Asokan, Valtteri Niemi, and Jean-Pierre
Seifert. Practical attacks against privacy and availability in 4G/LTE mobile
communication systems. arXiv preprint arXiv:1510.07563, 2015.
[SBT11] Stefania Sesia, Matthew Baker, and Issam Toufik. LTE-the UMTS long term
evolution: from theory to practice. John Wiley & Sons, 2011.
The Debian-based Linux operating system Ubuntu 14.04 is required for running
OpenAirInterface. Furthermore, low-latency Linux kernel version 3.19 is required.
Ubuntu 14.04 is open source and can be freely downloaded from Ubuntu’s website
[Can], kernel version 3.19 is installed using the following command:
These changes require that you restart your computer. Use the following com-
mand in terminal to make sure the low-latency kernel is successfully installed:
$ uname −a
93
94 A. OPENAIRINTERFACE INSTALLATION GUIDE
$ sudo update−grub
$ sudo apt−g e t i n s t a l l c p u f r e q u t i l s
The second step is to download the project and run the automated build scripts.
Git is installed using the command sudo apt-get install git. Consequently, the
OpenAirInterface project is downloaded as follows:
$ g i t c l o n e h t t p s : / / g i t l a b . eurecom . f r / o a i
/ openairinterface5g . git
$ g i t c l o n e h t t p s : / / g i t l a b . eurecom . f r / o a i / o p e n a i r −cn . g i t
The scripts in openair-cn/SCRIPTS are used to build the MME, the HSS, and
the SPGW:
$ . / build_mme − i
$ . / build_hss −i
$ . / build_spgw − i
Subsequently, the configuration files for MME, HSS, and SPGW in ~/openair-cn/ETC
are copied to the executable directory /usr/local/etc/oai. Moreover, the most
important configuration parameters of the eNodeB are highlighted below
(~/PROJECTS/GENERIC-LTE-EPC/CONF/enb.band7.tm1.usrpb210.conf):
tracking_area_code = "1";
mobile_country_code = "208";
mobile_network_code = "93";
////////// MME p a r a m e t e r s :
mme_ip_address = ( { ipv4 = "127.0.1.10";
ipv6 = "192:168:30::17";
active = " yes " ;
preference = " ipv4 " ;
}
);
NETWORK_INTERFACES :
{
ENB_INTERFACE_NAME_FOR_S1_MME = " lo ";
ENB_IPV4_ADDRESS_FOR_S1_MME = "127.0.1.2/8";
S6A :
{
S6A_CONF = " / u s r / l o c a l / e t c / o a i / f r e e D i a m e t e r /mme_fd . c o n f " ;
HSS_HOSTNAME = " h s s " ;
};
GUMMEI_LIST = (
{MCC="208" ; MNC= " 9 3 " ; MME_GID="4" ; MME_CODE= " 1 " ; }
);
TAI_LIST = (
{MCC="208" ; MNC= " 9 3 " ; TAC = " 1 " ; }
);
NETWORK_INTERFACES :
{
MME_INTERFACE_NAME_FOR_S1_MME = " lo ";
MME_IPV4_ADDRESS_FOR_S1_MME = "127.0.1.10/8";
S−GW :
{
SGW_IPV4_ADDRESS_FOR_S11 = "127.0.8.1/8";
};
A.2. INSTALL AND CONFIGURE ENODEB AND EPC 97
S−GW :
{
NETWORK_INTERFACES :
{
SGW_INTERFACE_NAME_FOR_S11 = " lo ";
SGW_IPV4_ADDRESS_FOR_S11 = "127.0.8.1/8";
$ cd ~/ o p e n a i r −cn /SCRIPTS
$ ./ check_hss_s6a_certificate
/ u s r / l o c a l / e t c / o a i / f r e e D i a m e t e r / h s s . openair4G . e u r
$ . / check_mme_s6a_certificate
/ u s r / l o c a l / e t c / o a i / f r e e D i a m e t e r / w i r e l e s s L a b . openair4G . e u r
Finally, compile and execute the network entities. Notably, always run the HSS
first:
$ cd ~/ o p e n a i r −cn /SCRIPTS
$ . / b u i l d _ h s s −c
$ . / run_hss − i ~/ o p e n a i r −cn /SRC/OAI_HSS/db/ oai_db . s q l
$ cd ~/ o p e n a i r −cn /SCRIPTS
$ . / build_mme −c
$ . / run_mme
A.4. CONFIGURE OPENAIRINTERFACE AS UE 99
$ cd ~/ o p e n a i r i n t e r f a c e 5 g
$ source oaienv
$ . / cmake_targets / b u i l d _ o a i −w USRP −x −c −−eNB
$ cd cmake_targets / l t e _ b u i l d _ o a i / b u i l d
$ sudo −E . / l t e −softmodem −O
~/ t a r g e t s /PROJECTS/GENERIC−LTE−EPC/CONF
/ enb . band7 . tm1 . usrpb210 . c o n f −d
A.5 Troubleshooting
The following steps were used for troubleshooting:
1. Check that the current OS version is Ubuntu 14.04 LTS and kernel version
3.19.0-61-lowlatency is installed
2. Make sure the fully qualified domain name is correctly configured in /etc/host
4. Mobile Network Code (MNC), Mobile Country Code (MCC) and Tracking
Area Code (TAC) should be similar in enb.band7.tm1.usrpb210.conf and
mme.conf
100 A. OPENAIRINTERFACE INSTALLATION GUIDE
9. MySQL username and password should be the same as provided during the
installation, it is recommended to use the password linux as this is the default
password used by OpenAirInterface
11. If none of the steps above solves the problem try to compare your configuration
files with example-configuration files provided by OpenAirInterface [Opea]
LTE IMSI Catcher Configuration
Guide
Appendix
B
This appendix contains all the necessary code-changes for configuring OpenAirInter-
face as an LTE IMSI Catcher.
For simplicity, all incoming TAU Requests are rejected using TAU Reject mes-
sage with EMM rejection cause 10 (implicitly detached). Notably, OpenAirIn-
terface has not implemented the complete TAU procedure and always returns
a TAU Reject message [Bhe16]. The EMM rejection cause is defined in the file
openair-cn/SRC/NAS/EMM/nas_proc.c:
i f ( ue_ctx ) {
r c = emm_proc_tracking_area_update_reject
( ue_id , EMM_CAUSE_IMPLICITLY_DETACHED) ;
OAILOG_FUNC_RETURN (LOG_NAS_EMM, r c ) ;
} else {
r c = emm_proc_tracking_area_update_reject
( ue_id , EMM_CAUSE_IMPLICITLY_DETACHED) ;
OAILOG_FUNC_RETURN (LOG_NAS_EMM, r c ) ;
}
The HSS does not contain subscriber data and hence no valid mapping between
GUTI and IMSI. Consequently, no changes to the code are needed for triggering the
Identity Request message. However, the file openair-cn/SRC/NAS/EMM/SAP/emm_as.c
contains the original code written by OpenAirInterface:
101
102 B. LTE IMSI CATCHER CONFIGURATION GUIDE
i f (emm_msg )
switch ( msg−>msg_type ) {
case EMM_AS_MSG_TYPE_IDENT:
i f ( msg−>g u t i ) {
MSC_LOG_EVENT (MSC_NAS_EMM_MME,
" send ␣IDENTITY_REQUEST␣ t o ␣s_TMSI␣%u.%u␣ " ,
as_msg−>s_tmsi . mme_code ,
as_msg−>s_tmsi . m_tmsi ) ;
} else {
MSC_LOG_EVENT (MSC_NAS_EMM_MME,
" send ␣IDENTITY_REQUEST␣ t o ␣ ue ␣ i d " MME_UE_S1AP_ID_FMT,
as_msg−>ue_id ) ;
}
s i z e = emm_send_identity_request
( msg , &emm_msg−>i d e n t i t y _ r e q u e s t ) ;
break ;
As the HSS does not contain subscriber data for any UEs, it will always re-
turn DIAMETER_AUTHENTICATION_DATA_UNAVAILABLE. Consequently,
the MME always returns the Attach Reject message with EMM rejection cause
15 (No suitable cells in TA). The MME rejection cause is defined in the file
openair-cn/SRC/NAS/nas_proc.c:
switch ( s 6 a _ e r r o r ) {
case DIAMETER_AUTHENTICATION_DATA_UNAVAILABLE:
return NAS_CAUSE_NO_SUITABLE_CELLS_IN_TRACKING_AREA;
Appendix
EMM Rejection Causes
C
This appendix provides a list of all the EMM rejection causes defined by the 3GPP
standardization [3GP11c].
103
104 C. EMM REJECTION CAUSES
D
This appendix provides a foundation for the calculations used to find the average
time a UE is connected to an LTE IMSI Catcher. The calculations are based on
the time interval between an Attach Request message and an Attach Reject message,
measured from the IMSI Catcher side.
The goal of this experiment was to confirm that the duration of the attach
procedure was small enough not to invoke suspicion by subscribers.
105
Appendix
Decoding Paging Messages
E
This appendix includes the code used to decode paging messages. The decoding is a
two-step procedure: the first step catches and decode paging message from PDSCH
to raw ASN.1 hexadecimal format, the second step decodes the raw data to readable
XML format.
1 File srslte/examples/pdsch_ue.c
107
108 E. DECODING PAGING MESSAGES
i f (n < 0) {
// f p r i n t f ( s t d e r r , " Error d e c o d i n g UE DL\n " ) ; f f l u s h ( s t d o u t ) ;
} else i f (n > 0) {
// I f t h e v a l u e o f n i s > 0 a " d a t a " p a c k a g e i s found
s r s l t e _ v e c _ f p r i n t _ b y t e ( s t d o u t , data , n / 8 ) ; ;
/∗ Send d a t a i f s o c k e t a c t i v e ∗/
i f ( prog_args . net_port > 0 ) {
s r s l t e _ n e t s i n k _ w r i t e (& net_sink , data , 1+(n − 1 ) / 8 ) ;
}
#i f d e f PRINT_CHANGE_SCHEDULIGN
i f ( ue_dl . d l _ d c i . mcs_idx != old_dl_dci . mcs_idx | |
memcmp(&ue_dl . d l _ d c i . t y p e 0 _ a l l o c ,
&old_dl_dci . t y p e 0 _ a l l o c , s i z e o f ( s r s l t e _ r a _ t y p e 0 _ t ) ) | |
memcmp(&ue_dl . d l _ d c i . t y p e 1 _ a l l o c ,
&old_dl_dci . t y p e 1 _ a l l o c , s i z e o f ( s r s l t e _ r a _ t y p e 1 _ t ) ) | |
memcmp(&ue_dl . d l _ d c i . t y p e 2 _ a l l o c ,
&old_dl_dci . t y p e 2 _ a l l o c , s i z e o f ( s r s l t e _ r a _ t y p e 2 _ t ) ) )
{
memcpy(&old_dl_dci , &ue_dl . dl_dci ,
sizeof ( srslte_ra_dl_dci_t ) ) ;
f f l u s h ( stdout ) ;
p r i n t f ( " Format : ␣\%s \n " ,
s r s l t e _ d c i _ f o r m a t _ s t r i n g ( ue_dl . dci_format ) ) ;
srslte_ra_pdsch_fprint ( stdout ,
&old_dl_dci , c e l l . nof_prb ) ;
srslte_ra_dl_grant_fprint ( stdout ,
&ue_dl . pdsch_cfg . g r a n t ) ;
}
#e n d i f
The python script below decodes raw ASN.1 data to XML format2 . The script
uses the external library libmich, which handles the actual decoding part [Lib]. The
variable list given in Table E.2 helps provide a better understanding of the code.
2 Python was chosen for the ASN.1 decoding because it contains dynamic external libraries.
E.2. ASN.1 DECODING 109
#! / u s r / b i n / python
F
This Appendix provides the full content of the SIB 1-7 messages broadcasted by
Telia’s cell 34767628. SIB messages from Telenor and ice.net cells are not included in
this appendix as the structure is the same as for the Telia cell; however, Section 4.4.5
summarizes the most important parameters for all PLMNs. SIB message type 1-7
are structured using XML notation.
SIB type 1
<BCCH−DL−SCH−Message>
<message>
<c1>
<systemInformationBlockType1 >
<c e l l A c c e s s R e l a t e d I n f o >
<plmn−I d e n t i t y L i s t >
<PLMN−I d e n t i t y I n f o >
<plmn−I d e n t i t y >
<mcc>
<MCC−MNC−D i g i t >
2
</MCC−MNC−D i g i t >
<MCC−MNC−D i g i t >
4
</MCC−MNC−D i g i t >
<MCC−MNC−D i g i t >
2
</MCC−MNC−D i g i t >
</mcc>
<mnc>
<MCC−MNC−D i g i t >
111
112 F. RESULTS GATHERED FROM SIB TYPE 1-7
0
</MCC−MNC−D i g i t >
<MCC−MNC−D i g i t >
2
</MCC−MNC−D i g i t >
</mnc>
</plmn−I d e n t i t y >
<c e l l R e s e r v e d F o r O p e r a t o r U s e >
<n o t R e s e r v e d/>
</c e l l R e s e r v e d F o r O p e r a t o r U s e >
</PLMN−I d e n t i t y I n f o >
</plmn−I d e n t i t y L i s t >
<trackingAreaCode >
0000100100000001
</trackingAreaCode >
<c e l l I d e n t i t y >
0010000100101000001100001100
</ c e l l I d e n t i t y >
<c e l l B a r r e d ><notBarred/></ c e l l B a r r e d >
<i n t r a F r e q R e s e l e c t i o n >
<a l l o w e d/>
</ i n t r a F r e q R e s e l e c t i o n >
<csg−I n d i c a t i o n >
< f a l s e />
</csg−I n d i c a t i o n >
</ c e l l A c c e s s R e l a t e d I n f o >
<c e l l S e l e c t i o n I n f o >
<q−RxLevMin>−66</q−RxLevMin>
</ c e l l S e l e c t i o n I n f o >
<f r e q B a n d I n d i c a t o r >20</ f r e q B a n d I n d i c a t o r >
<s c h e d u l i n g I n f o L i s t >
<S c h e d u l i n g I n f o >
<s i −P e r i o d i c i t y >
<r f 8 />
</ s i −P e r i o d i c i t y >
<s i b −MappingInfo><sibType3/>
</s i b −MappingInfo>
</ S c h e d u l i n g I n f o >
<S c h e d u l i n g I n f o >
<s i −P e r i o d i c i t y >
<r f 6 4 />
113
</ s i −P e r i o d i c i t y >
<s i b −MappingInfo><sibType4/>
</s i b −MappingInfo>
</ S c h e d u l i n g I n f o >
<S c h e d u l i n g I n f o >
<s i −P e r i o d i c i t y >
<r f 6 4 />
</ s i −P e r i o d i c i t y >
<s i b −MappingInfo><sibType5/>
</s i b −MappingInfo>
</ S c h e d u l i n g I n f o >
<S c h e d u l i n g I n f o >
<s i −P e r i o d i c i t y >
<r f 6 4 />
</ s i −P e r i o d i c i t y >
<s i b −MappingInfo><sibType6/>
</s i b −MappingInfo>
</ S c h e d u l i n g I n f o >
<S c h e d u l i n g I n f o >
<s i −P e r i o d i c i t y >
<r f 6 4 />
</ s i −P e r i o d i c i t y >
<s i b −MappingInfo><sibType7/>
</s i b −MappingInfo>
</ S c h e d u l i n g I n f o >
</ s c h e d u l i n g I n f o L i s t >
<s i −WindowLength><ms10/></ s i −WindowLength>
<systemInfoValueTag >0</systemInfoValueTag>
</systemInformationBlockType1 >
</c1>
</message>
</BCCH−DL−SCH−Message>
114 F. RESULTS GATHERED FROM SIB TYPE 1-7
SIB type 2
<s i b 2 >
<radioResourceConfigCommon>
<rach−ConfigCommon>
<p r e a m b l e I n f o >
<numberOfRA−Preambles>
<n52/>
</numberOfRA−Preambles>
</p r e a m b l e I n f o >
<powerRampingParameters>
<powerRampingStep><dB4/></powerRampingStep>
<p r e a m b l e I n i t i a l R e c e i v e d T a r g e t P o w e r >
<dBm−110/>
</p r e a m b l e I n i t i a l R e c e i v e d T a r g e t P o w e r >
</powerRampingParameters>
<ra−S u p e r v i s i o n I n f o >
<preambleTransMax><n10/></preambleTransMax>
<ra−ResponseWindowSize>
<s f 1 0 />
</ra−ResponseWindowSize>
<mac−C o n t e n t i o n R e s o l u t i o n T i m e r >
<s f 6 4 />
</mac−C o n t e n t i o n R e s o l u t i o n T i m e r >
</ra−S u p e r v i s i o n I n f o >
<maxHARQ−Msg3Tx>4</maxHARQ−Msg3Tx>
</rach−ConfigCommon>
<bcch−Config>
<m o d i f i c a t i o n P e r i o d C o e f f >
<n2/>
</ m o d i f i c a t i o n P e r i o d C o e f f >
</bcch−Config>
<pcch−Config>
<d e f a u l t P a g i n g C y c l e >
<r f 1 2 8 />
</d e f a u l t P a g i n g C y c l e >
<nB><oneT/></nB>
</pcch−Config>
<prach−Config>
<r o o t S e q u e n c e I n d e x >576</ r o o t S e q u e n c e I n d e x >
<prach−C o n f i g I n f o >
<prach−C on fi gI nd e x >19</prach−C on fi gI n de x >
115
<p0−NominalPUSCH>−97</p0−NominalPUSCH>
<alpha><a l 1 /></alpha>
<p0−NominalPUCCH>−110</p0−NominalPUCCH>
<d e l t a F L i s t −PUCCH>
<deltaF −PUCCH−Format1>
<d e l t a F 0/>
</deltaF −PUCCH−Format1>
<deltaF −PUCCH−Format1b>
<d e l t a F 3/>
</deltaF −PUCCH−Format1b>
<deltaF −PUCCH−Format2>
<d e l t a F 0/>
</deltaF −PUCCH−Format2>
<deltaF −PUCCH−Format2a>
<d e l t a F 0/>
</deltaF −PUCCH−Format2a>
<deltaF −PUCCH−Format2b>
<d e l t a F 0/>
</deltaF −PUCCH−Format2b>
</ d e l t a F L i s t −PUCCH>
<deltaPreambleMsg3 >6</deltaPreambleMsg3>
</uplinkPowerControlCommon>
<ul−C y c l i c P r e f i x L e n g t h >
<l e n 1 />
</ul−C y c l i c P r e f i x L e n g t h >
<ext1>
<uplinkPowerControlCommon−v1020>
<deltaF −PUCCH−Format3−r10>
<d e l t a F 0/>
</deltaF −PUCCH−Format3−r10>
<deltaF −PUCCH−Format1bCS−r10>
<d e l t a F 2/>
</deltaF −PUCCH−Format1bCS−r10>
</uplinkPowerControlCommon−v1020>
</ext1>
</radioResourceConfigCommon>
<ue−TimersAndConstants>
<t300><ms1000/></t300>
<t301><ms400/></t301>
<t310><ms2000/></t310>
<n310><n20/></n310>
117
<t311><ms3000/></t311>
<n311><n1/></n311>
</ue−TimersAndConstants>
<f r e q I n f o >
<a d d i t i o n a l S p e c t r u m E m i s s i o n >
1
</a d d i t i o n a l S p e c t r u m E m i s s i o n >
</ f r e q I n f o >
<timeAlignmentTimerCommon>
< i n f i n i t y />
</timeAlignmentTimerCommon>
</s i b 2 >
SIB type 3
<s i b 3 >
<c e l l R e s e l e c t i o n I n f o C o m m o n >
<q−Hyst><dB4/></q−Hyst>
</c e l l R e s e l e c t i o n I n f o C o m m o n >
<c e l l R e s e l e c t i o n S e r v i n g F r e q I n f o >
<s−NonIntraSearch >8</s−NonIntraSearch>
<threshServingLow >5</threshServingLow >
< c e l l R e s e l e c t i o n P r i o r i t y >5</ c e l l R e s e l e c t i o n P r i o r i t y >
</ c e l l R e s e l e c t i o n S e r v i n g F r e q I n f o >
<i n t r a F r e q C e l l R e s e l e c t i o n I n f o >
<q−RxLevMin>−66</q−RxLevMin>
<s−I n t r a S e a r c h >31</s−I n t r a S e a r c h >
<allowedMeasBandwidth>
<mbw50/>
</allowedMeasBandwidth>
<presenceAntennaPort1 >
<t r u e />
</presenceAntennaPort1 >
<n e i g h C e l l C o n f i g >
10
</ n e i g h C e l l C o n f i g >
<t−ReselectionEUTRA>1</t−ReselectionEUTRA>
</ i n t r a F r e q C e l l R e s e l e c t i o n I n f o >
</s i b 3 >
118 F. RESULTS GATHERED FROM SIB TYPE 1-7
SIB type 4
<BCCH−DL−SCH−Message>
<message>
<c1>
<s y s t e m I n f o r m a t i o n >
<c r i t i c a l E x t e n s i o n s >
<s y s t e m I n f o r m a t i o n −r8>
<s i b −TypeAndInfo>
<s i b 4 >
<i n t r a F r e q N e i g h C e l l L i s t >
<I n t r a F r e q N e i g h C e l l I n f o >
<p h y s C e l l I d >124</ p h y s C e l l I d >
<q−O f f s e t C e l l ><dB3/></q−O f f s e t C e l l >
</ I n t r a F r e q N e i g h C e l l I n f o >
<I n t r a F r e q N e i g h C e l l I n f o >
<p h y s C e l l I d >200</ p h y s C e l l I d >
<q−O f f s e t C e l l ><dB2/></q−O f f s e t C e l l >
</ I n t r a F r e q N e i g h C e l l I n f o >
<I n t r a F r e q N e i g h C e l l I n f o >
<p h y s C e l l I d >225</ p h y s C e l l I d >
<q−O f f s e t C e l l ><dB2/></q−O f f s e t C e l l >
</ I n t r a F r e q N e i g h C e l l I n f o >
<I n t r a F r e q N e i g h C e l l I n f o >
<p h y s C e l l I d >226</ p h y s C e l l I d >
<q−O f f s e t C e l l ><dB−2/></q−O f f s e t C e l l >
</ I n t r a F r e q N e i g h C e l l I n f o >
<I n t r a F r e q N e i g h C e l l I n f o >
<p h y s C e l l I d >232</ p h y s C e l l I d >
<q−O f f s e t C e l l ><dB2/></q−O f f s e t C e l l >
</ I n t r a F r e q N e i g h C e l l I n f o >
<I n t r a F r e q N e i g h C e l l I n f o >
<p h y s C e l l I d >231</ p h y s C e l l I d >
<q−O f f s e t C e l l ><dB−1/></q−O f f s e t C e l l >
</ I n t r a F r e q N e i g h C e l l I n f o >
</ i n t r a F r e q N e i g h C e l l L i s t >
</s i b 4 >
</s i b −TypeAndInfo>
</s y s t e m I n f o r m a t i o n −r8>
</ c r i t i c a l E x t e n s i o n s >
</s y s t e m I n f o r m a t i o n >
</c1>
119
</message>
</BCCH−DL−SCH−Message>
SIB type 5
<BCCH−DL−SCH−Message>
<message>
<c1>
<s y s t e m I n f o r m a t i o n >
<c r i t i c a l E x t e n s i o n s >
<s y s t e m I n f o r m a t i o n −r8>
<s i b −TypeAndInfo>
<s i b 5 >
<i n t e r F r e q C a r r i e r F r e q L i s t >
<I n t e r F r e q C a r r i e r F r e q I n f o >
<dl−C a r r i e r F r e q >2850</ dl−C a r r i e r F r e q >
<q−RxLevMin>−66</q−RxLevMin>
<t−ReselectionEUTRA>1</t−ReselectionEUTRA>
<threshX−High>8</threshX−High>
<threshX−Low>8</threshX−Low>
<allowedMeasBandwidth>
<mbw100/>
</allowedMeasBandwidth>
<presenceAntennaPort1 >
<t r u e />
</presenceAntennaPort1 >
<c e l l R e s e l e c t i o n P r i o r i t y >
7
</ c e l l R e s e l e c t i o n P r i o r i t y >
<n e i g h C e l l C o n f i g >
10
</ n e i g h C e l l C o n f i g >
<q−O f f s e t F r e q ><dB0/></q−O f f s e t F r e q >
<i n t e r F r e q N e i g h C e l l L i s t >
<I n t e r F r e q N e i g h C e l l I n f o >
<p h y s C e l l I d >123</ p h y s C e l l I d >
<q−O f f s e t C e l l ><dB−1/></q−O f f s e t C e l l >
</ I n t e r F r e q N e i g h C e l l I n f o >
</ i n t e r F r e q N e i g h C e l l L i s t >
</ I n t e r F r e q C a r r i e r F r e q I n f o >
<I n t e r F r e q C a r r i e r F r e q I n f o >
<dl−C a r r i e r F r e q >1650</ dl−C a r r i e r F r e q >
120 F. RESULTS GATHERED FROM SIB TYPE 1-7
<q−RxLevMin>−66</q−RxLevMin>
<t−ReselectionEUTRA>1</t−ReselectionEUTRA>
<threshX−High>8</threshX−High>
<threshX−Low>8</threshX−Low>
<allowedMeasBandwidth>
<mbw100/>
</allowedMeasBandwidth>
<presenceAntennaPort1 >
<t r u e />
</presenceAntennaPort1 >
<c e l l R e s e l e c t i o n P r i o r i t y >
6
</ c e l l R e s e l e c t i o n P r i o r i t y >
<n e i g h C e l l C o n f i g >
10
</ n e i g h C e l l C o n f i g >
<q−O f f s e t F r e q ><dB0/></q−O f f s e t F r e q >
<i n t e r F r e q N e i g h C e l l L i s t >
<I n t e r F r e q N e i g h C e l l I n f o >
<p h y s C e l l I d >47</ p h y s C e l l I d >
<q−O f f s e t C e l l ><dB−2/></q−O f f s e t C e l l >
</ I n t e r F r e q N e i g h C e l l I n f o >
<I n t e r F r e q N e i g h C e l l I n f o >
<p h y s C e l l I d >125</ p h y s C e l l I d >
<q−O f f s e t C e l l ><dB−2/></q−O f f s e t C e l l >
</ I n t e r F r e q N e i g h C e l l I n f o >
<I n t e r F r e q N e i g h C e l l I n f o >
<p h y s C e l l I d >123</ p h y s C e l l I d >
<q−O f f s e t C e l l ><dB1/></q−O f f s e t C e l l >
</ I n t e r F r e q N e i g h C e l l I n f o >
</ i n t e r F r e q N e i g h C e l l L i s t >
</ I n t e r F r e q C a r r i e r F r e q I n f o >
</ i n t e r F r e q C a r r i e r F r e q L i s t >
</s i b 5 >
</s i b −TypeAndInfo>
</s y s t e m I n f o r m a t i o n −r8>
</ c r i t i c a l E x t e n s i o n s >
</s y s t e m I n f o r m a t i o n >
</c1>
</message>
</BCCH−DL−SCH−Message>
121
SIB type 6
<BCCH−DL−SCH−Message>
<message>
<c1>
<s y s t e m I n f o r m a t i o n >
<c r i t i c a l E x t e n s i o n s >
<s y s t e m I n f o r m a t i o n −r8>
<s i b −TypeAndInfo>
<s i b 6 >
<carrierFreqListUTRA−FDD>
<CarrierFreqUTRA−FDD>
<c a r r i e r F r e q >10588</ c a r r i e r F r e q >
<c e l l R e s e l e c t i o n P r i o r i t y >
3
</ c e l l R e s e l e c t i o n P r i o r i t y >
<threshX−High>2</threshX−High>
<threshX−Low>5</threshX−Low>
<q−RxLevMin>−58</q−RxLevMin>
<p−MaxUTRA>24</p−MaxUTRA>
<q−QualMin>−18</q−QualMin>
</CarrierFreqUTRA−FDD>
<CarrierFreqUTRA−FDD>
<c a r r i e r F r e q >2963</ c a r r i e r F r e q >
<c e l l R e s e l e c t i o n P r i o r i t y >
2
</ c e l l R e s e l e c t i o n P r i o r i t y >
<threshX−High>2</threshX−High>
<threshX−Low>5</threshX−Low>
<q−RxLevMin>−58</q−RxLevMin>
<p−MaxUTRA>24</p−MaxUTRA>
<q−QualMin>−18</q−QualMin>
</CarrierFreqUTRA−FDD>
</carrierFreqListUTRA−FDD>
<t−ReselectionUTRA>
2
</t−ReselectionUTRA>
</s i b 6 >
</s i b −TypeAndInfo>
</s y s t e m I n f o r m a t i o n −r8>
</ c r i t i c a l E x t e n s i o n s >
</s y s t e m I n f o r m a t i o n >
122 F. RESULTS GATHERED FROM SIB TYPE 1-7
</c1>
</message>
</BCCH−DL−SCH−Message>
SIB type 7
<BCCH−DL−SCH−Message>
<message>
<c1>
<s y s t e m I n f o r m a t i o n >
<c r i t i c a l E x t e n s i o n s >
<s y s t e m I n f o r m a t i o n −r8>
<s i b −TypeAndInfo>
<s i b 7 >
<t−ReselectionGERAN>2</t−ReselectionGERAN>
<c a r r i e r F r e q s I n f o L i s t >
<CarrierFreqsInfoGERAN>
<c a r r i e r F r e q s >
<startingARFCN>41</startingARFCN>
<b a n d I n d i c a t o r ><d c s 1 8 0 0/></b a n d I n d i c a t o r >
<followingARFCNs>
<explicitListOfARFCNs>
<ARFCN−ValueGERAN>21</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>29</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>47</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>24</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>5</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>4</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>38</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>8</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>10</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>34</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>11</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>12</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>14</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>26</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>42</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>7</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>25</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>36</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>17</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>13</ARFCN−ValueGERAN>
123
<ARFCN−ValueGERAN>45</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>28</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>48</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>32</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>3</ARFCN−ValueGERAN>
</explicitListOfARFCNs>
</followingARFCNs>
</ c a r r i e r F r e q s >
<commonInfo>
<c e l l R e s e l e c t i o n P r i o r i t y >
1
</ c e l l R e s e l e c t i o n P r i o r i t y >
<ncc−Permitted>
11111111
</ncc−Permitted>
<q−RxLevMin>3</q−RxLevMin>
<p−MaxGERAN>33</p−MaxGERAN>
<threshX−High>2</threshX−High>
<threshX−Low>3</threshX−Low>
</commonInfo>
</CarrierFreqsInfoGERAN>
<CarrierFreqsInfoGERAN>
<c a r r i e r F r e q s >
<startingARFCN>1</startingARFCN>
<b a n d I n d i c a t o r ><d c s 1 8 0 0/></b a n d I n d i c a t o r >
<followingARFCNs>
<explicitListOfARFCNs>
<ARFCN−ValueGERAN>2</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>6</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>9</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>15</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>16</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>18</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>19</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>20</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>22</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>23</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>27</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>30</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>31</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>33</ARFCN−ValueGERAN>
124 F. RESULTS GATHERED FROM SIB TYPE 1-7
<ARFCN−ValueGERAN>35</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>37</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>39</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>40</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>43</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>44</ARFCN−ValueGERAN>
<ARFCN−ValueGERAN>46</ARFCN−ValueGERAN>
</explicitListOfARFCNs>
</followingARFCNs>
</ c a r r i e r F r e q s >
<commonInfo>
<c e l l R e s e l e c t i o n P r i o r i t y >
1
</ c e l l R e s e l e c t i o n P r i o r i t y >
<ncc−Permitted>
11111111
</ncc−Permitted>
<q−RxLevMin>3</q−RxLevMin>
<p−MaxGERAN>33</p−MaxGERAN>
<threshX−High>2</threshX−High>
<threshX−Low>3</threshX−Low>
</commonInfo>
</CarrierFreqsInfoGERAN>
</ c a r r i e r F r e q s I n f o L i s t >
</s i b 7 >
</s i b −TypeAndInfo>
</s y s t e m I n f o r m a t i o n −r8>
</ c r i t i c a l E x t e n s i o n s >
</s y s t e m I n f o r m a t i o n >
</c1>
</message>
</BCCH−DL−SCH−Message>