Fingerprinting of Cellular Infrastructure Based on Broadcast Information

Conference Paper (2024)
Author(s)

Anup Bhattacharjee (TU Delft - Networked Systems)

S. Cecconello (TU Delft - Cyber Security)

F.A. Kuipers (TU Delft - Networked Systems)

Georgios Smaragdakis (TU Delft - Cyber Security)

Research Group
Cyber Security
Copyright
© 2024 A.K. Bhattacharjee, S. Cecconello, F.A. Kuipers, G. Smaragdakis
DOI related publication
https://doi.org/10.1007/978-3-031-51476-0_5
More Info
expand_more
Publication Year
2024
Language
English
Copyright
© 2024 A.K. Bhattacharjee, S. Cecconello, F.A. Kuipers, G. Smaragdakis
Research Group
Cyber Security
Bibliographical Note
Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public. @en
Pages (from-to)
81-101
ISBN (print)
9783031514753
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

To avoid exploitation of known vulnerabilities, it is standard security practice to not disclose any model information regarding the antennas used in cellular infrastructure. However, in this work, we show that end-user devices receive enough information to infer, with high accuracy, the model-family of antennas. We demonstrate how low-cost hardware and software setups can fingerprint the cellular infrastructure of whole regions within a few minutes by only listening to cellular broadcast messages. To show the effectiveness and hence risk of such fingerprinting, we collected an extensive dataset of broadcast messages from three different countries. We then trained a machine-learning model to classify broadcast messages based on the model-family they belong to. Our results reveal a worryingly high average accuracy of 97% for model-family classification. We further discuss how inferring the model-family with such high accuracy can lead to a class of identification attacks on cellular infrastructure and we subsequently suggest countermeasures to mitigate the fingerprint effectiveness.

Files

978-3-031-51476-0_5.pdf
(pdf | 0.655 Mb)
- Embargo expired in 15-07-2024
License info not available