Erik tews thesis

The properties of the DECT protocol make it hard to intercept a frame, modify it and send it later again, as DECT frames are based on time-division multiplexing and need to be transmitted at a specific point in time. [12] Unfortunately very few DECT devices on the market implemented authentication and encryption procedures [12] [13] - and even when encryption was used by the phone, it was possible to implement a man-in-the-middle attack impersonating a DECT base station and revert to unencrypted mode - which allows calls to be listened to, recorded, and re-routed to a different destination. [13] [14] [15]

Erik tews thesis

erik tews thesis

Media: