Exposing LTE Security Weaknesses at Protocol Inter-Layer, and Inter-Radio Interactions
نویسندگان
چکیده
Despite security shields to protect user communication with both the radio access network and the core infrastructure, 4G LTE is still susceptible to a number of security threats. The vulnerabilities mainly exist due to its protocol’s inter-layer communication, and the access technologies (2G/3G) inter-radio interaction. We categorize the uncovered vulnerabilities in three dimensions, i.e., authentication, security association and service availability, and verify these vulnerabilities in operational LTE networks. In order to assess practical impact from these security threats, we convert these threats into active attacks, where an adversary can (a) kick the victim device out of the network, (b) hijack the victim’s location, and (c) silently drain the victim’s battery power. Moreover, we have shown that the attacker does not need to communicate with the victim device or reside at the device to launch these attacks (i.e., no Trojan or malware is required). We further propose remedies for the identified attacks.
منابع مشابه
Video quality assessment for inter-vehicular streaming with IEEE 802.11p, LTE, and LTE Direct networks over fading channels
Availability of real time video streams capturing surrounding road conditions can not only aid automobile drivers and autonomous vehicles, they can also enhance road safety and improve traffic efficiency. However, provisioning of such services is challenging due to the harsh operational environments and stringent resource requirements of the applications. Nevertheless, radio access technologies...
متن کاملLTE multi-cellular system in urban environment: inter-cell interference Impact on the Downlink radio transmission
The fourth-generation networks based on OFDMA (3GPP LTE) (3rd Generation Partnership Project Long Term Evolution) offer high bit rate and takes into account in their mechanisms the simplicity and efficiency of the radio transmission. But with the volume of traffic constantly increasing, especially in high density population environments, the reuse of bandwidth is the only effective way to incre...
متن کاملLTE radio analytics made easy and accessible Citation
Despite the rapid growth of next-generation cellular networks, researchers and end-users today have limited visibility into the performance and problems of these networks. As LTE deployments move towards femto and pico cells, even operators struggle to fully understand the propagation and interference patterns affecting their service, particularly indoors. This paper introduces LTEye, the first...
متن کاملLTE Radio Analytics Made Easy and ARCHIVES
Despite the rapid growth of next-generation cellular networks, researchers and endusers today have limited visibility into the performance and problems of these networks. As LTE deployments move towards femto and pico cells, even operators struggle to fully understand the propagation and interference patterns affecting their service, particularly indoors. This thesis introduces LTEye, the first...
متن کاملInter-Domain Mobility Management Based on the Proxy Mobile IP in Mobile Networks
System Architecture Evolution (SAE) with Long Term Evolution (LTE) has been used as the key technology for the next generation mobile networks. To support mobility in the LTE/SAE-based mobile networks, the Proxy Mobile IPv6 (PMIP), in which the Mobile Access Gateway (MAG) of the PMIP is deployed at the Serving Gateway (S-GW) of LTE/SAE and the Local Mobility Anchor (LMA) of PMIP is employed at ...
متن کامل