Abstract
Femtocell is emerging as a new technology to enhance third generation (3G) coverage and to provide assurance of always best connectivity in the 3G telecommunication networks. It acts as an access point that securely connect standard mobile stations to the cellular operator’s core network using existing wired broadband connection. Increased network capacity, lower capital costs, expanded revenue opportunities are some key benefits to the mobile service operator whereas for a user increased indoor coverage, higher speed performance data, higher quality voice, and higher multimedia experience. A femtocell can be deployed in operator- owned spectrum and in the users premises, for example, home, office, and enterprise.
In this talk, we evaluate various security aspects, in particular, location verification techniques used in the femtocell security architecture, device security mechanisms and secure software update process. We show that these various location techniques are inadequate to avoid the misuse of the femtocell technology. In addition, we also show that security solutions related to hardware security of the femtocell described in the 3GPP specifications are insufficient. Further, we show how easy to hack the femtocell devices and to get access to the confidential information stored on the device.