Quantcast
Channel: wireless – Soft Handover
Browsing all 34 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Turning the homeless into 4G hot-spots

I wanted to quickly mention this really cool initiative. I read about it in the Barcelona newspaper La Vanguardia a few days ago, and now it seems it is reaching the US as well. The idea is to turn the...

View Article



Image may be NSFW.
Clik here to view.

Keeping hackers out of implanted medical devices

Working in cybersecurity is fascinating and I am very happy with my job. However, when I talk about it, people tend to picture me like an old school computer hacker from the movies, trying to get into...

View Article

Image may be NSFW.
Clik here to view.

Sayonara GSM

AT&T announced yesterday a plan to switch off its 2G network by 2017, which will allow them to reuse a big chunk of spectrum for LTE-based access networks. The US cellular provider stated that just...

View Article

Image may be NSFW.
Clik here to view.

20 years since the first SMS ever

Yesterday was the 20th anniversary of the first SMS ever sent. Initially designed as a way to send messages for internal carrier operations, the first “personal” SMS message was sent on Dec. 3rd 1992...

View Article

Image may be NSFW.
Clik here to view.

FCC’s smartphone security checker

Working in security for wireless and mobility networks I can tell you something that should not be new for most of you: smart-phones are the newest target for malware programmers and hackers. The FCC...

View Article


Image may be NSFW.
Clik here to view.

The renaissance of wireless communications…

Recently I had the pleasure to meet Dr. Ted Rappaport and attend to a very interesting talk he gave at NYU Poly. The topic of the talk was his proposed “renaissance of wireless communications“. It was...

View Article

Image may be NSFW.
Clik here to view.

The programable world (a.k.a the internet of things)

I recently read a very interesting and detailed article that a colleague at work recommended. The article presents a very thorough overview of the latest revolution in consumer electronics combined...

View Article

Image may be NSFW.
Clik here to view.

Ambient backscatter

I recently read a very interesting paper that discusses one of the coolest wireless comm-related projects I have seen around for a while. A team of researchers from University of Washington presented...

View Article


Image may be NSFW.
Clik here to view.

Complimentary tutorial on Advances in Coordinated Multi-Cell Multi-User MIMO...

Check this IEEE ComSoc tutorial on Advances in Coordinated Multi-Cell Multi-User MIMO Systems. Free of charge for a limited time. Advances in Coordinated Multi-Cell Multi-User MIMO Systems  

View Article


Image may be NSFW.
Clik here to view.

Doppler shift and the motivation behind the separation of pilot tones in LTE

I recently was contacted by someone with questions regarding a document I wrote (LTE PHY fundamentals) a few years ago as part of a class at Columbia University and that is hosted on my website. The...

View Article

Image may be NSFW.
Clik here to view.

Radio jamming mitigation with beam-forming

(Yes, after months? maybe years? I decided to get back to being somehow active on my blog… Most likely I’ll just be posting about security and wireless/mobile interesting stuff) I was reading this...

View Article

Image may be NSFW.
Clik here to view.

Symmetric key VS PKI in mobile networks

Authentication in mobile networks is executed leveraging a symmetric key system. For each mobile subscriber, there is a secret key that is known only by the mobile device and the network operator....

View Article

Image may be NSFW.
Clik here to view.

LTE IMSI catchers

I was reading this morning a new paper on the topic of LTE IMSI catchers: https://arxiv.org/pdf/1702.04434.pdf Mjølsnes, Stig F., and Ruxandra F. Olimid. “Easy 4G/LTE IMSI Catchers for...

View Article


Image may be NSFW.
Clik here to view.

Vulnerability and exploit released for remote code execution on smartphones

I was just reading the newest post by Google’s Project Zero. They just released a report on a massive bug that allows remote code execution by exploiting a vulnerability on the 802.11 Broadcom SoC used...

View Article

Image may be NSFW.
Clik here to view.

More LTE exploits presented at Blackhat 2017

As I predicted in an article I wrote last year, the increasingly maturity of the open-source implementations of the LTE stack is fueling more and more exciting work in LTE security. I saw two...

View Article


Image may be NSFW.
Clik here to view.

Using open-source software and SDRs to test LTE protocol-aware jamming

Ever since back in 2010 I started investigating what would happen if a radio adversary jammed specific LTE signaling channels – as opposed to barrage jamming of the entire LTE signal -, I have been...

View Article

Mobile network security research overview paper

Earlier this week, Google Scholar highlighted for me a new paper on mobile security. I am familiar with the work of a couple of the authors, so I downloaded it and read the whole thing. It turns out it...

View Article


Running a USRP B210 from within a Linux VM

I was setting up today my new Windows7 laptop. And, as every single Windows laptop I’ve had before, I set up a Linux VM on it. Although on my other laptop I run a paid VMWare Workstation Pro license,...

View Article

Image may be NSFW.
Clik here to view.

Sniffing BLE with the new Nordic sniffer

Although for deep security analysis and experiments I do all Bluetooth and BLE things using either an Ubertooth One or my USRP (either B210 or B205mini **) and gr-bluetooth, I always start any...

View Article

Another example of why it is never a good idea to make a product with high...

I often find myself wondering “what could possibly go wrong?” sarcastically when I read about hotel doors that can be unlocked via BLE with an app and all other sorts of products with BLE connectivity....

View Article
Browsing all 34 articles
Browse latest View live




Latest Images