4G Security
4G Security
4G Security
net/publication/327231026
CITATIONS READS
3 9,252
2 authors:
All content following this page was uploaded by Nour Moustafa on 27 August 2018.
2018). There are various technological advances high quality of service (QoS) and capacity, and
that 4G/LTE wireless networks provide when (3) high network speeds and coverage (Seddigh
compared to earlier technologies. Firstly, 4G/LTE et al. 2010; Rao et al. 2017). The characteristics
mobile systems work perfectly by utilizing the of 4G technologies compared with 2G and 3G
TCP/IP model. This, in fact, decreases financial are listed in Table 1 (Fagbohun 2014).
and computational costs, where portable devices The bandwidth efficiency and allocation
can connect to the Internet using an Internet Pro- schemes are two important requirements that
tocol (IP) without any constraints to previously should be considered while designing 4G
closed cellular configurations. Nevertheless, with standards (Seddigh et al. 2010). In 4G wireless,
the wide variety of communication protocols in- voice/video multimedia is transited using
cluded in the TCP/IP model, 4G/LTE wireless the network protocols of the TCP/IP model.
networks face multiple security and privacy is- Therefore, the ITU-IMT-Advanced standard for
sues (Seddigh et al. 2010; Shaik et al. 2015). 4G wireless technology should be configured to
The key issues for securing 4G/LTE wireless be compatible with the protocols and services of
networks can be summarized into three aspects. the TCP/IP model. Several 4G wireless standards,
Firstly, mobile devices can flexibly access the in particular, LTE and Mobile WiMAX, have
Internet from any location and are therefore vul- been developed to meet the IMT-Advanced
nerable to being hacked by different advanced requirements and provide broadband wireless
persistent threats (APT). Secondly, while mo- connections for mobile devices (Seddigh et al.
bile IP-based systems are regularly updated with 2010; Rao et al. 2017).
cryptographic and security mechanisms, there is
an effect on their performance and traffic process- LTE Architecture
ing capacity that requires secure and upgraded A LTE architecture includes the modules needed
wireless standards and architectures. Finally, al- to install network protocols between base stations
though vendors are producing new generations and mobile systems. As presented in Fig. 1, the
of 4G/LTE technologies, they do not regularly architecture involves three modules: User Equip-
develop new standards to mitigate vulnerabilities ment (UE), Evolved Universal Terrestrial Ra-
and deter growing cyber APT (Seddigh et al. dio Access Network (E-UTRAN), and Evolved
2010; Shaik et al. 2015; Li et al. 2018). Packet Core (EPC) (Seddigh et al. 2010; Shaik
et al. 2015). The UE, for example, laptops or
smartphones, can link to the wireless network
Background across the evolved NodeB (eNodeB) using the E-
UTRAN base stations. The eNodeB utilizes some
This section discusses the background of 4G access network protocols for exchanging mes-
wireless standards and LTE architectures. Se- sages with the UE. The E-UTRAN links to the
curity controls of 4G/LTE architecture are also EPC which is an IP-based infrastructure, while
explained. the EPC links to the provider of the wireline IP
network.
4G Wireless Standards The 4G/LTE network architecture has some
The International Telecommunications Union enhancements compared to 3G wireless (Shaik
(ITU) declared an International Mobile et al. 2015). Firstly, it has two types of network el-
Telecommunications-Advanced (IMT-Advanced) ements (NEs): (1) the eNodeB that is an improved
standard for 4G wireless networks. This standard base station and (2) the Access Gateway (AGW)
provides the specifications of radio access and that integrates all the functions, specifically Mo-
core 4G wireless networks. The 4G wireless bility Management Entity (MME), needed for the
technology includes the following criteria: (1) EPC. The MME can control the UE identifica-
high data rate, which is 100 Mbps for mobile tion, as well as processing security authentication
devices and 1 Gbps for computer devices, (2) and mobility. LTE can support a meshed structure
Security and Privacy in 4G/LTE Network 3
Security and Privacy in 4G/LTE Network, Table 1 Characteristics of 2G, 3G, and 4G technologies
Features 2G 3G 4G
Standards GSM, iDEN,D-MPS WCDMA, CDMA 2000 Single unified standard, ITU IMT-
Advanced
Data rates 14.4 kbps 2 Mbps 100 Mbps
Services Digital voice, Short Messag- high-quality audio, video, Dynamic information access with higher
ing data multimedia quality, wearable devices
Technology Digital cellular Broad bandwidth CDMA, Unified IP, seamless combination of broad-
IP technology band, LAN/WAN/PAN, WLAN
Core network PSTN Packet Network Internet
Multiplexing TDMA, CDMA CDMA CDMA
Cell
Internet
Internet
eNodeB eNodeB
UE
E-UTRAN EPC
that improves wireless network performance, for the sophistication of APT hackers make security
example, an eNodeB can connect with several and privacy of 4G/LTE systems challenging.
AGWs. Finally, as the architecture is compatible
with the TCP/IP model, traffic packets at any UE
can be handled using the AGW and eNodeB with 4G/LTE Security Requirements
different IP-based devices, such as routers. S
In order to secure mobile devices that use 4G/LTE
4G/LTE Security Controls wireless technologies, there should be protection
Abstraction layers are inserted in the 4G/LTE ar- for the connections between the UEs and MMEs
chitecture in terms of the unique identifiers (IDs) and between elements in the wireline networks
for smartphones (i.e., UEs). A temporary unique and mobile stations. For satisfying these require-
ID is used on the SIM card to prevent attack- ments, the 4G/LTE security is significantly im-
ers from stealing identifiers. Another technique proved by adding (1) advanced key hierarchy,
for improving 4G security is adding protected (2) protracted authentication and key agreement,
singling between the UE and MME (Seddigh and (3) additional interworking security for the
et al. 2010; Mohapatra et al. 2015). Security NEs (Mohapatra et al. 2015). The requirements
mechanisms are utilized to secure the connec- are classified into key building blocks and LTE
tions between 4G networks and secure non-4G end-to-end security (Seddigh et al. 2010), as
networks using key management authentication explained below.
protocols. Although several security controls are
used for 4G/LTE wireless technology, its design, • Key building blocks include the following
which is based on an open-IP architecture, and elements:
4 Security and Privacy in 4G/LTE Network
Security and Privacy in 4G/LTE Network, Table 2 Challenges and security and privacy methods of 4G/LTE
technology
Challenges Cyber-attacks Security and privacy methods
A resilient 4G/LTE architecture Privacy attacks: replay, MITM, Privacy-preservation, authentication
impersonation, collaborated, tracing, and encryption mechanisms
spoong, privacy violation, masquerade
Tracking locations of devices Integrity attacks: cloning, spam, mes- Hashing and encryption, and authen-
sage blocking, message modification tication and privacy-preserving meth-
attack, message, insertion, tampering ods
An effective 4G/LTE wireless Soft- Availability attacks: FIFO, redirec- Firewall systems, signature-based and
ware Defined Network (SDN) tion, physical attack, skimming, and anomaly-based systems
free-riding
Collaborative 4G/LTE security and Authentication attacks: password Encryption and authentication tech-
privacy approaches operate on cloud reuse, password stealing, dictionary, niques
and edge paradigms brute force, desynchronization,
forgery attack, collision, stolen smart
card
Shaik A, Borgaonkar R, Asokan N, Niemi V, Seifert JP Statista (2018) LTE subscribers. https://www.statista.com/
(2015) Practical attacks against privacy and availabil- statistics/206615/
ity in 4G/LTE mobile communication systems. arXiv
preprint arXiv:151007563