How Voice Call Technology Poses Security Threats in 4G LTE Networks

被引:0
|
作者
Tu, Guan-Hua [1 ]
Li, Chi-Yu [1 ]
Peng, Chunyi [2 ]
Lu, Songwu [1 ]
机构
[1] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90095 USA
[2] Ohio State Univ, Dept Comp Sci Engn, Columbus, OH 43210 USA
来源
2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) | 2015年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To support voice calls vital to mobile users and carriers, 4G LTE cellular networks adopt two solutions: VoLTE (Voice Over LTE) and CSFB (Circuit-Switched FallBack). In this paper, we disclose that both schemes are harmful to mobile users from a security perspective. The adoption of the latest VoLTE allows an attacker to manipulate the radio resource states of the victim's device in a silent call attack, thereby draining the victim's battery 5-8 times faster. CSFB exhibits two vulnerabilities of exposing 4G <-> 3G network switch to adversaries. This can be further exploited to launch ping-pong attacks where mobile users may suffer from up to 91.5% performance downgrade, or 4G denial-of-service (DoS) attacks where mobile users are deprived of 4G LTE connectivity without their consent. We devise two proof-of-concept attacks as showcases, and demonstrate their viability over operational LTE networks. We analyze their root causes and uncover that the problems lie in seemingly sound design decisions for functional correctness but such choices bear unexpected and intriguing implications for security design. We finally propose remedies to mitigate the attack damage.
引用
收藏
页码:442 / 450
页数:9
相关论文
共 50 条
  • [41] The Analysis of Key Performance Indicators (KPI) in 4G/LTE Networks
    Krasniqi, Fidel
    Gavrilovska, Liljana
    Maraj, Arianit
    FUTURE ACCESS ENABLERS FOR UBIQUITOUS AND INTELLIGENT INFRASTRUCTURES, FABULOUS 2019, 2019, 283 : 285 - 296
  • [42] An Efficient Authentication and Key Agreement Protocol for 4G (LTE) Networks
    Alezabi, Kamal Ali
    Hashim, Fazirulhisyam
    Hashim, Shaiful Jahari
    Ali, Borhanuddin M.
    2014 IEEE REGION 10 SYMPOSIUM, 2014, : 502 - 507
  • [43] Optimization of Capacity Allocation Problem in 4G LTE Mobile Networks
    Krishnamurthi, Rajalakshmi
    Goyal, Mukta
    2018 5TH IEEE UTTAR PRADESH SECTION INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (UPCON), 2018, : 648 - 652
  • [44] Developing and evaluation of an IoT mobile gateway for 4G LTE networks
    Quinones-Cuenca, Manuel
    Pachar Bravo, Hever Patricio
    Martinez-Curipoma, Javier
    Quinones, Luis
    Torres, Rommel
    ENFOQUE UTE, 2020, 11 (04): : 16 - 26
  • [45] Comparison of basic characteristics of 4G/LTE and 5G NR technology
    Gavric, Radana
    Ilisevic, Dijana
    Curguz, Natasa Banovic
    Budimir, Durad
    2019 27TH TELECOMMUNICATIONS FORUM (TELFOR 2019), 2019, : 153 - 156
  • [46] Study on Wireless Network Security in 4G Communication Technology
    Bai, Jianbing
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 182 - 185
  • [47] Efficient call admission control scheme for 4G wireless networks
    Bejaoui, Tarek
    Nasser, Nidal
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2009, 9 (04): : 489 - 499
  • [48] Cyber-security threats and vulnerabilities in 4G/5G network enabled systems
    Mishra, Shailendra
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2022, 25 (05) : 548 - 561
  • [49] Security Enhancement for Data Transmission in 3G/4G Networks
    Kaul, Vikas
    Bharadi, V. A.
    Choudhari, P.
    Shah, Dhvani
    Narayankhedkar, S. K.
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 95 - 102
  • [50] ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol Implementations
    Karim, Imtiaz
    Hussain, Syed Rafiul
    Bertino, Elisa
    2021 IEEE 41ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2021), 2021, : 773 - 785