Location

Grand Wailea, Hawaii

Event Website

https://hicss.hawaii.edu/

Start Date

8-1-2019 12:00 AM

End Date

11-1-2019 12:00 AM

Description

Currently many cellular networks operate using the Long Term Evolution (LTE) protocol. Therefore, most mobile subscribers interact with LTE on a daily basis, and thus are affected by the security standards and mechanisms it implements. Here, we propose a vulnerability within the LTE protocol: the mobility management control signaling, which dictates how a user equipment (UE) synchronizes with an enhanced Node-B (eNodeB) to prevent intersymbol interference. Presented are the implications and the overall effects on the bit error rate (BER) of falsified signaling which forces a UE to incorrectly advance or delay its uplink timing. Specifically, we derive a lower bound on the BER for UE that is subjected to the aforementioned signaling. Our simulation results show that a non-zero BER can be guaranteed regardless of noise conditions. Finally, we propose encryption of this signaling to prevent such an attack.

Share

COinS
 
Jan 8th, 12:00 AM Jan 11th, 12:00 AM

A Novel Denial of Service Vulnerability in Long Term Evolution Cellular Networks

Grand Wailea, Hawaii

Currently many cellular networks operate using the Long Term Evolution (LTE) protocol. Therefore, most mobile subscribers interact with LTE on a daily basis, and thus are affected by the security standards and mechanisms it implements. Here, we propose a vulnerability within the LTE protocol: the mobility management control signaling, which dictates how a user equipment (UE) synchronizes with an enhanced Node-B (eNodeB) to prevent intersymbol interference. Presented are the implications and the overall effects on the bit error rate (BER) of falsified signaling which forces a UE to incorrectly advance or delay its uplink timing. Specifically, we derive a lower bound on the BER for UE that is subjected to the aforementioned signaling. Our simulation results show that a non-zero BER can be guaranteed regardless of noise conditions. Finally, we propose encryption of this signaling to prevent such an attack.

https://aisel.aisnet.org/hicss-52/st/wireless_networks/2