2015
DOI: 10.1007/978-94-017-9618-7_6
|View full text |Cite
|
Sign up to set email alerts
|

Security Scheme for LTE Initial Attach

Abstract: Long Term Evolution (LTE) is a fourth-generation mobile communication technology implemented throughout the world. There is still, however, an exposed vulnerability with regard to the identification parameters such as IMSI and RNTI, as they are transmitted in plain text during the initial attach procedure in the access to the LTE network. The vulnerability has existed since the initial release of the LTE Standards, and is still present in Release 12. To prevent a leak of the identification parameters during th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…In addition, P-GW allocates an IP address to the user terminal and serves as the mobile anchoring point in the handover between 3GPP and non-3GPP. Lastly, HSS manages the users' personal profiles [8,[10][11][12][13][14].…”
Section: Lte Network Structurementioning
confidence: 99%
See 2 more Smart Citations
“…In addition, P-GW allocates an IP address to the user terminal and serves as the mobile anchoring point in the handover between 3GPP and non-3GPP. Lastly, HSS manages the users' personal profiles [8,[10][11][12][13][14].…”
Section: Lte Network Structurementioning
confidence: 99%
“…Centering around the LTE security layer, the LTE network carries out mutual authentication based on EPS-AKA. The LTE security is divided broadly into three processes: UE-HSS mutual authentication process, UE-MME NAS security setup process and UE-eNB ASsecurity setup process [6,7,9,14,[22][23][24]. LTE security process is shown in Figure 3.…”
Section: Lte Securitymentioning
confidence: 99%
See 1 more Smart Citation