Analysis of threats and variability after implementation of 4G/LTE technology
DOI: 10.31673/2412-4338.2019.042538
Abstract
The article deals with the vulnerability of 4G/LTE cellular networks in critical infrastructures. The technological revolution in the field of mobile wireless broadband cellular networks attracts Ukraine to the necessity of introducing new technologies in the processes of building the digital economy of the future. One such technology is LTE. The article shows that the study of threats and vulnerabilities of 4G/LTE cellular network elements for critical infrastructures is relatively new and not well-known, so the topic of work is relevant and practically in demand. In the article the task is set: when considering the mobile 4G/LTE mobile broadband cellular networks, based on the analysis of the functioning of its elements, identify the threats for potentially vulnerable elements. To solve the problem, the description of innovative mechanisms for the introduction of mobile communication of the 4th generation is performed, the analysis of trends in the development of services for advanced areas of application of mobile communications 4G/LTE standard, to consider the threats to the radio interface of 4G/LTE cellular networks, which allows to determine the potential the vulnerability of its individual elements. Based on the analysis, it is concluded that the introduction of 4G/LTE networks will inevitably face new challenges, in particular: for most consumers, standard LTE services are likely to be quite expensive, so such networks will not be widely available for a long time; LTE smartphones and modems will not be able to demonstrate their functionality because the existing majority of phones and tablets will not be able to use a significant portion of the spectrum to be used because they do not have the appropriate chips; there is a problem with high energy consumption of the batteries of the end devices and for a long time charging the batteries, which make them a little functional.
Keywords: 4G/LTE cellular networks, vulnerability, critical infrastructure.
References
1. 3GPP, (2017), “LTE”. https://www.3gpp.org/technologies/keywords-acronyms/98-lte (10.05.2019).
2. 3GPP Specification: 23.402. Architecture Enhancements for non3GPP Accesses 2013. http://www.3gpp.org/DynaReport/23402.htm (10.05.2019).
3. Hussain S.R., Chowdhury O., S. Mehnaz, and E. Bertino, “LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE,” in Proceedings of the Network and Distributed Systems Security (NDSS REDIRECTION), 2018.
4. Lin H. (2016) “LTE: Forcing Targeted LTE Cellphone into Unsafe Network,” in Hack In The Box Security Conference (HITBSecConf).
5. Meyer U., and Wetzel S., (2004) “On the Impact of GSM Encryption and Manin-the-Middle Attacks on the Security of Interoperating GSM/UMTS Networks,” in Personal, Indoor and Mobile Radio Communications, 2004. 15th IEEE International Symposium on vol. 4. IEEE,.
6. 3GPP. ETSI TS 26.300, “Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Overall description; Stage 2”, 2017. http://www.3gpp.org/ftp/Specs/html-info/36300.htm (10.05.2019) .
7. LTE:How does it work. https://habr.com/ru/company/beeline/blog/129694/ (10.05.2019).
8. 3GPP. TS 36.331, “Evolved Universal Terrestrial Radio Access (EUTRA); Radio Resource Control (RRC); Protocol specification”, (2017).
9. 3GPP. TS 24.301, “Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3”, (2017).
10. 3GPP. TS 24.008, “Mobile radio interface Layer 3 specification; Core network protocols; Stage 3”, (2017).
11. Shaik A., Borgaonkar R., Asokan N., Niemi V., and Seifert J.-P., (2016)“Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems,” Proceedings of the Network and Distributed System Security Symposium (NDSS).
12. Li C.-Y., Tu G.-H., Peng C., Yuan Z., Li Y., Lu S., and Wang X., (2015) “Insecurity of Voice Solution VoLTE in LTE Mobile Networks,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM.
13. Description of the physical layer LTE http://anisimoff.org/lte/phy_description.html (10.05.2019)
14. Main characteristics LTE. http://jak.bono.odessa.ua/articles/osnovni-harakteristiki-lte (10.05.2019).
15. Operators prefer LTE 1800. https://nag.ru/articles/article/27771/operatoryi-predpochitayut-lte-1800.html (10.05.2019).
16. LTE v 450 MGts and not only. https://mobile-review.com/articles/2013/lte-450.shtml (10.05.2019).
17. How does the chosen LTE network affect the power consumption of the phone, or the disadvantages of LTE networks in the CIS. https://habr.com/ru/post/237947/ (10.05.2019).
18. Behrouz A. Forouzan. (2002) “Local Area Networks.” First Edition. Mc Graw-Hill Forouzan Series. Print.
19. MSE-T Q.1741.
20. Kim H., Kim D., Kwon M., Han H., Jang Y., Han D., Kim T., and Kim Y., (2015) “Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.