2012
DOI: 10.1002/9781118380642
|View full text |Cite
|
Sign up to set email alerts
|

LTE Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
41
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 46 publications
(41 citation statements)
references
References 3 publications
0
41
0
Order By: Relevance
“…One solution is to protect broadcast messages using a public key mechanism but this requires relatively big changes in LTE protocols. According to [54], 3GPP decided against usage of public key mechanisms because its implementation cost was deemed too high. However, our findings may have changed the equilibrium in this trade-off.…”
Section: B Countermeasures and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…One solution is to protect broadcast messages using a public key mechanism but this requires relatively big changes in LTE protocols. According to [54], 3GPP decided against usage of public key mechanisms because its implementation cost was deemed too high. However, our findings may have changed the equilibrium in this trade-off.…”
Section: B Countermeasures and Discussionmentioning
confidence: 99%
“…A proof of concept paper by P. Jover et al [63] provides an overview of new effective attacks (smart jamming) that extend the range and effectiveness of basic radio jamming. However according to [54], both aforementioned flooding and jamming attacks are non-persistent DOS attacks hence not considered as a threat to address in the LTE architecture. In contrast, our DoS attacks are persistent and targeted towards the UE (subscribers).…”
Section: Related Workmentioning
confidence: 99%
“…The use of the UICC that contains IMSI and TMSI to generate keys, will ensure the end-to-end security and the confidentiality between the communicating parties. The mentioned approach is described in the specification designed by the 3GPP consortium and analyzed by Forsberg in [16]. The downside of this approach is the possibility of causing performance degradation due to the external connection.…”
Section: Org 249mentioning
confidence: 99%
“…In order to increase the security and trust level within the system, we have to ensure that all users are real people and all devices are legal registered products -no clone or modified device should be allowed -a 4G/LTE (or 3G if not available, because LTE security functions are backward compatible with universal mobile telecommunications system (UMTS) security functions [16]) network connection with a valid universal integrated circuit card (UICC, formerly called as the SIM card) is required. By this way, all users of the system will be authenticated by the network operators and personal information about the user will be available but not visibly disclosed to merchants or third party companies and applications.…”
Section: Validation Of the Partiesmentioning
confidence: 99%
“…The use of AKA in LTE is required by 3GPP TS 33.401 [28]. A detailed description of the AKA protocol is available within [29].…”
Section: Appendix A-acronyms and Abbreviationsmentioning
confidence: 99%