Proceedings 2016 Network and Distributed System Security Symposium 2016
DOI: 10.14722/ndss.2016.23236
|View full text |Cite
|
Sign up to set email alerts
|

Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems

Abstract: Abstract-Mobile communication systems are now an essential part of life throughout the world. Fourth generation "Long Term Evolution" (LTE) mobile communication networks are being deployed. The LTE suite of specifications is considered to be significantly better than its predecessors not only in terms of functionality but also with respect to security and privacy for subscribers. We carefully analyzed LTE access network protocol specifications and uncovered several vulnerabilities. Using commercial LTE mobile … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
187
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 192 publications
(188 citation statements)
references
References 15 publications
1
187
0
Order By: Relevance
“…Recently, some important vulnerabilities have been disclosed in current 4G LTE systems [65]. They are based on the inevitable tradeoff between performance and security which any system must made.…”
Section: F Iot Data Privacy and Trustmentioning
confidence: 99%
“…Recently, some important vulnerabilities have been disclosed in current 4G LTE systems [65]. They are based on the inevitable tradeoff between performance and security which any system must made.…”
Section: F Iot Data Privacy and Trustmentioning
confidence: 99%
“…A similar methodology could be used to extend the attack in the case of a wider wireless connection such as LTE (as partially investigated in [16]). In some scenarios, there is no need to eavesdrop the WiFi packets: when the attacker has control of the network backbone serving the WiFi hotspots.…”
Section: Feasibility Of the Attackmentioning
confidence: 99%
“…The work in [16,17] adopted this mechanism to track user location. Further investigation on the temporal correlation of LTE paging packets and push notification triggering needs to be carried out to prove the feasibility of the proposed approach on LTE.…”
Section: Feasibility Of the Attackmentioning
confidence: 99%
See 2 more Smart Citations