Security and Privacy in Next Generation Mobile Networks : LTE and Femtocells

Cellular mobile network are used by more than 4 billion users worldwide. Yet, security and privacy issues in the next generation networks have not fully been addressed by the standardization bodies, as several of the upcoming features would inherit many of the current limitations. In this report, we focus on two aspects: privacy of user’s identity/location and the security of femtocell networks. First, we show that GSM, UMTS and LTE are still inefficient in the first aspect because of the centrally managed identity assignment, and we suggest a simple scheme where, by combining central and distributed management, privacy can be preserved even in presence of a capillary deployment of low-range femtocells. Second, by leveraging on the geographic operational requirements of femtocells, we model the dynamics among ISPs and mobile operators in a DDoS defense scenario that is effective against malicious attackers and transparent for legitimate users. We propose and numerically evaluate a novel game-theoretic scheme that, by considering parameters such as Internet traffic and femtocell subscriber shares, could help ISPs and mobile operators making strategic decisions.

[1]  Pierangela Samarati,et al.  Location privacy in pervasive computing , 2008 .

[2]  Georges Gardarin,et al.  Network Architecture , 2011, Encyclopedia of Parallel Computing.

[3]  Vicente Segura,et al.  Modeling the Economic Incentives of DDoS Attacks: femtocell case study , 2009, WEIS.

[4]  Lee Garber,et al.  Denial-of-Service Attacks Rip the Internet , 2000, Computer.

[5]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.

[6]  Ramesh Govindan,et al.  COSSACK: Coordinated Suppression of Simultaneous Attacks , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[7]  Kotagiri Ramamohanarao,et al.  Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.

[8]  Reza Shokri,et al.  On the Optimal Placement of Mix Zones , 2009, Privacy Enhancing Technologies.

[9]  Shigang Chen,et al.  Perimeter-based defense against high bandwidth DDoS attacks , 2005, IEEE Transactions on Parallel and Distributed Systems.

[10]  Vladimir A. Oleshchuk,et al.  Location Privacy for Cellular Systems; Analysis and Solution , 2005, Privacy Enhancing Technologies.

[11]  Jelena Mirkovic,et al.  Distributed Defense Against DDoS Attacks , 2004 .