Главная
Study mode:
on
1
Introduction
2
Telecommunications History
3
UMTS Architecture
4
Microcells
5
Active Cell
6
What is Femtocell
7
Other Advantages
8
How to get femtocell
9
How they detect femtocell
10
How to circumvent these methods
11
Femtocell Hardware
12
Security
13
Recovery Procedure
14
Parameters
15
Development
16
Web Interface
17
Demo
18
Femtostep Architecture
19
Femtostep Location
20
Femtostep Privacy
21
Possible Attacks
22
Conclusion
23
Key intersections
Description:
Explore the world of femtocells in this TROOPERS11 conference talk. Delve into the history of telecommunications and UMTS architecture before focusing on femtocell technology, its advantages, and implementation. Learn about femtocell hardware, security measures, and recovery procedures. Discover how to detect and potentially circumvent femtocell detection methods. Examine the Femtostep architecture, its location capabilities, and privacy implications. Investigate possible attacks on femtocell systems and draw key conclusions about this emerging technology in mobile networks.

Femtocell - Femtostep to the Holy Grail

WEareTROOPERS
Add to list
0:00 / 0:00