2015 IEEE Conference on Standards for Communications and Networking (CSCN) 2015
DOI: 10.1109/cscn.2015.7390464
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing and enhancing the resilience of LTE/LTE-A systems to RF spoofing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 31 publications
(16 citation statements)
references
References 10 publications
0
16
0
Order By: Relevance
“…The openness of the standard, the large community of researchers, and the broad availability of SDRs, software libraries and open-source implementations of both the eNodeB and the UE protocol stacks have enabled a number of excellent LTE security analyses [5], [9], [10], [28], [29]. Despite the stronger cryptographic algorithms and mutual authentication, UEs and base stations exchange a substantial amount of pre-authentication messages that can be exploited to launch denial of service (DoS) attacks [6], [14], [30], catch IMSIs [31] or downgrade the connection to an insecure GSM link [7], [10]. Researchers also found new privacy and location leaks in LTE [16].…”
Section: A Lte Protocol Exploitsmentioning
confidence: 99%
“…The openness of the standard, the large community of researchers, and the broad availability of SDRs, software libraries and open-source implementations of both the eNodeB and the UE protocol stacks have enabled a number of excellent LTE security analyses [5], [9], [10], [28], [29]. Despite the stronger cryptographic algorithms and mutual authentication, UEs and base stations exchange a substantial amount of pre-authentication messages that can be exploited to launch denial of service (DoS) attacks [6], [14], [30], catch IMSIs [31] or downgrade the connection to an insecure GSM link [7], [10]. Researchers also found new privacy and location leaks in LTE [16].…”
Section: A Lte Protocol Exploitsmentioning
confidence: 99%
“…After that, the UE selects a suitable BS based on the received SSs, and then begins to establish a wireless connection with the BS [1]. If a FBS transmits a spoofing SS during the CS stage with sufficiently high power (referred to as the SS spoofing attack [2]), the UE may be attracted by and attempt to camp on the FBS rather than any legitimate BS (LBS) [3], [4]. Currently, the widelyused authentication method for the UE to distinguish the FBS from the LBSs is based on encryption.…”
Section: Introductionmentioning
confidence: 99%
“…As a result of code jamming, some SNs can receive AI more easily and have more chances to transmit the message, which is again jammed by the code jammers using the same code. Code jamming looks like RF spoofing where the jammers transmit a fake signal that masquerades as an actual signal [18]. The code jamming hence increases the failure probability in sending the information messages and intends to mislead the adequate allocation of radio resources.…”
Section: Introductionmentioning
confidence: 99%