Security analysis of LTE/SAE networks with the possibilities of tampering E-Utran on NS3

Today, mobile subscribers are able to get telecommunication services as per the Long Term Evolution (LTE) standards. LTE is the fourth generation wireless communication technology, developed by 3GPP (3rd Generation of Partnership Project) and provides high data rates and quality of service to the subscribers. In this research, the authors simulated the LTE environment on NS3 network simulation platform, uncovered various E-UTRAN tampering possibilities with the effects on the throughput and delay rate. In addition, the authors explored various security vulnerabilities like the presence of the insecure wireless interface and weak handover schemes. Moreover, The authors suggested approaches that prevent secrecy over the wireless interface and secure handovers in an efficient manner. The approach has been analyzed and verified on the security verification and simulation tool AVISPA. Security verification of the protocol demonstrates that the suggested protocol is secure and meets the subscriber's security demands.

[1]  Mohammed Aly Abdrabou,et al.  LTE Authentication Protocol (EPS-AKA) weaknesses solution , 2015, 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS).

[2]  Pavol Zavarsky,et al.  Enhanced User Security and Privacy Protection in 4G LTE Network , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).

[3]  Donghoon Lee,et al.  Performance and security enhanced authentication and key agreement protocol for SAE/LTE network , 2016, Comput. Networks.

[4]  Md. Mustafizur Rahman,et al.  A self-healing approach for LTE Evolved Packet Core , 2012, 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).

[5]  Imane Aly Saroit,et al.  Secure and efficient uniform handover scheme for LTE-A networks , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[6]  Ayman I. Kayssi,et al.  A privacy-enhanced computationally-efficient and comprehensive LTE-AKA , 2017, Comput. Commun..

[7]  Xuemin Shen,et al.  SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks , 2013, Comput. Networks.

[8]  Rachid El Kouch,et al.  Fast Authentication during Handover in 4G LTE/SAE Networks , 2014 .

[9]  Taejoon Park,et al.  A Survey of Security Threats on 4G Networks , 2007, 2007 IEEE Globecom Workshops.

[10]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[11]  Jeffrey A. Cichonski,et al.  LTE Architecture Overview and Security Analysis , 2016 .

[12]  Ayman I. Kayssi,et al.  Privacy Enhanced and Computationally Efficient HSK-AKA LTE Scheme , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[13]  Nicolas Sklavos,et al.  LTE/SAE Security Issues on 4G Wireless Networks , 2013, IEEE Security & Privacy.

[14]  Abdellatif Medouri,et al.  Enhanced authentication and key agreement protocol for improving security in UMTS networks , 2014, 2014 International Conference on Multimedia Computing and Systems (ICMCS).

[15]  Hyoung-Kee Choi,et al.  A group-based security protocol for machine-type communications in LTE-advanced , 2013, Wireless Networks.

[16]  Valtteri Niemi,et al.  Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems , 2015, NDSS.

[17]  Biswajit Nandy,et al.  Security advances and challenges in 4G wireless networks , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[18]  Yongjun Wang,et al.  Security Enhanced Authentication and Key Agreement Protocol for LTE/SAE Network , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[19]  Hyoung-Kee Choi,et al.  Security Analysis of Handover Key Management in 4G LTE/SAE Networks , 2014, IEEE Transactions on Mobile Computing.

[20]  Ali Babikher Bakheet,et al.  Enhancing the Security of LTE Networks against Jamming Attacks , 2016 .

[21]  Iliano Cervesato,et al.  The Dolev-Yao Intruder is the most Powerful Attacker , 2010 .

[22]  Tobias Martin,et al.  Security Mechanisms in UMTS , 2001, Datenschutz und Datensicherheit.

[23]  Mohammad Ali Khalighi,et al.  Efficient signal detection for cognitive radio relay networks under imperfect channel estimation , 2016, Trans. Emerg. Telecommun. Technol..

[24]  Muzammil Khan,et al.  Vulnerabilities of UMTS Access Domain Security Architecture , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.