Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness

نویسندگان

  • David Rupprecht
  • Kai Jansen
  • Christina Pöpper
چکیده

Long Term Evolution (LTE) is the most recent generation of mobile communications promising increased transfer rates and enhanced security features. It is todays communication technology for mobile Internet as well as considered for the use in critical infrastructure, making it an attractive target to a wide range of attacks. We evaluate the implementation correctness of LTE security functions that should protect personal data from compromise. In this paper, we focus on two security aspects: user data encryption and network authentication. We develop a framework to analyze various LTE devices with respect to the implementations of their security-related functions. Using our framework, we identify several security flaws partially violating the LTE specification. In particular, we show that i) an LTE network can enforce to use no encryption and ii) none of the tested devices informs the user when user data is sent unencrypted. Furthermore, we present iii) a Man-in-the-Middle (MitM) attack against an LTE device that does not fulfill the network authentication requirements. The discovered security flaws undermine the data protection objective of LTE and represent a threat to the users of mobile communication. We outline several countermeasures to cope with these vulnerabilities and make proposals for a long-term solution.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing

Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...

متن کامل

Line Bisection Test Software to Evaluate the Visual-spatial Functions in Schizophrenic Patients

Introduction: One way to evaluate visual-spatial functions is to use line bisection test. With the advancement of information technology, this study attempted to design a line bisection test software and investigate its efficacy compared to the conventional paper-pencil form in schizophrenic patients. Method: The present study was a causal-comparative one and line bisection test software was de...

متن کامل

Line Bisection Test Software to Evaluate the Visual-spatial Functions in Schizophrenic Patients

Introduction: One way to evaluate visual-spatial functions is to use line bisection test. With the advancement of information technology, this study attempted to design a line bisection test software and investigate its efficacy compared to the conventional paper-pencil form in schizophrenic patients. Method: The present study was a causal-comparative one and line bisection test software was de...

متن کامل

Examine the components of organizational agility to design a framework for achieving agility in social security organization

Background and purpose: The purpose of the study was to examine the dimensions and components of organizational agility to design a framework. Materials and methods: The methodology is descriptive. The statistical society was selected from employees in the Social Security organization of Bojnourd (N=148). The samples were 132 staff that return the questionaries.  The data collected by a researc...

متن کامل

ارائه الگویی برای ارزیابی ریسک آتش‌سوزی‌های عمدی

Background & Objectives : It is not possible to live without using fire. However, fire could destruct human properties in a short time. One of the most important types of fire is intentional fire. This type of fire has become a great problem for insurance companies, fire departments, industries, government and business in the recent years. This study aimed to provide a framework for risk assess...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016