透過您的圖書館登入
IP:3.238.71.155
  • Journals

Overview of Cyberattacks Against Radio Access Networks in Long-term Evolution Mobile Networks and Defense Solutions

Abstracts


Mobile communication standard has been extensively developed to introduce many more connected devices for the Internet of Things (IoT). However, the vulnerability of radio access network (RAN) in long-term evolution (LTE) would impact the security of IoT applications by LTE. RAN transmits/receives data over the air interface and is vulnerable to many active and passive attacks as RAN procedures typically occur before any security establishment. With the growth in devices connecting to the Internet, massive-scale attacks would be easier for the attackers to execute. This work practices those attacks against certain individual telecommunication service providers (TSPs) in Taiwan with various kinds of mobile devices. The potential solutions against the attacks in RAN are also introduced for the defense in this work.

References


K. A. Al-Enezi, I. F. Al-Shaikhli, A. R. Al-Kandari and L. Z. Al-Tayyar, “A Survey of Intrusion Detection System Using Case Study Kuwait Governments Entities,” 2014 3rd International Conference on Advanced Computer Science Applications and Technologies, Amman, 2014, pp. 37-43.
R. Bassil, A. Chehab, I. Elhajj, and A. Kayssi, “Signaling oriented denial of service on lte networks,” Oct 2012 pp. 153–158.
B. S. Bhati and C. S. Rai, “A Survey on Intrusion Detection Tools,” 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 2019, pp. 806-810.
A. Dabrowski, N. Pianta, T. Klepp, M. Mulazzani, and E. Weippl, “IMSI-Catch Me If You Can: IMSI-Catcher-Catchers,” in Proceedings of the 30th Annual Computer Security Applications Conference, 2014, p. 246–255.
L. He, Z. Yan and M. Atiquzzaman, “LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey,” in IEEE Access, vol. 6, 2018 pp. 4220-4242.

Read-around