2017
DOI: 10.1109/mcom.2017.1500706cm
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing the Robustness of LTE Systems: Analysis and Evolution of the Cell Selection Process

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 8 publications
0
15
0
Order By: Relevance
“…Also, 5G will mitigate the threat by removing the PCFICH. Labib et al use radio frequency spoofing to impair synchronization and cell selection [10,11]. Based on experiments with a software UE, enhancements to the aforementioned techniques are proposed.…”
Section: Related Workmentioning
confidence: 99%
“…Also, 5G will mitigate the threat by removing the PCFICH. Labib et al use radio frequency spoofing to impair synchronization and cell selection [10,11]. Based on experiments with a software UE, enhancements to the aforementioned techniques are proposed.…”
Section: Related Workmentioning
confidence: 99%
“…This symmetric key security architecture results in the inability of a communication endpoint, the UE, to verify the authenticity and validity of any message that is exchanged prior to the NAS Attach cryptographic handshake. The need for pre-authentication messages to be sent in the clear is widely acknowledged as the root cause of most known LTE protocol exploits [6], [7], [14].…”
Section: Potential Vulnerabilities Of 5g-security Challenges Andmentioning
confidence: 99%
“…The openness of the standard, the large community of researchers, and the broad availability of SDRs, software libraries and open-source implementations of both the eNodeB and the UE protocol stacks have enabled a number of excellent LTE security analyses [5], [9], [10], [28], [29]. Despite the stronger cryptographic algorithms and mutual authentication, UEs and base stations exchange a substantial amount of pre-authentication messages that can be exploited to launch denial of service (DoS) attacks [6], [14], [30], catch IMSIs [31] or downgrade the connection to an insecure GSM link [7], [10]. Researchers also found new privacy and location leaks in LTE [16].…”
Section: A Lte Protocol Exploitsmentioning
confidence: 99%
“…If this timer expires, the UE should blacklist the PSS for a certain amount of time, and choose the second strongest cell within the same frequency. PSS and SSS spoofing attacks can be mitigated by having the UE create a list of all available cells in the given frequency channel along with their received power levels [14]. The UE could then search for the PBCH of the strongest cell and have another timer for decoding the MIB.…”
Section: Survey Of Mitigation Techniquesmentioning
confidence: 99%