2016 IFIP Networking Conference (IFIP Networking) and Workshops 2016
DOI: 10.1109/ifipnetworking.2016.7497239
|View full text |Cite
|
Sign up to set email alerts
|

User location tracking attacks for LTE networks using the interworking functionality

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 26 publications
(16 citation statements)
references
References 1 publication
0
16
0
Order By: Relevance
“…This nature is enabling the attack vectors Man-in-the-Middle (MitM), eavesdropping, Sybil, spoofing, relay, Denial of Service (DoS), and Smurf [3], [17]. Though the cellular network protocols are impervious to attacks with by design countermeasures, the novel approaches presented in [18], [19] are exposing the channels to perpetrate above attacks. The masquerading attempts are capable of instilling a UE with a compromised UE App to exploit the MEC system.…”
Section: Possible Solutionsmentioning
confidence: 99%
“…This nature is enabling the attack vectors Man-in-the-Middle (MitM), eavesdropping, Sybil, spoofing, relay, Denial of Service (DoS), and Smurf [3], [17]. Though the cellular network protocols are impervious to attacks with by design countermeasures, the novel approaches presented in [18], [19] are exposing the channels to perpetrate above attacks. The masquerading attempts are capable of instilling a UE with a compromised UE App to exploit the MEC system.…”
Section: Possible Solutionsmentioning
confidence: 99%
“…Additionally, an attacker can run a precise DoS attack against a distinct user by deleting subscriber data in the VLR [56]. Attacks that are possible due to the interworking function between Diameter and SS7 are discussed by Holtmanns et al [168] and Rao et al [169]. Even Diameter has been found vulnerable and allows to intercept text messages [170].…”
Section: Cause: Insecure Inter-network Protocolsmentioning
confidence: 99%
“…Figure 6 shows the SIM card slot. The SIM card stores data such as user identity, location and phone number, network authorization data, personal security keys, contact lists and stored text messages [2]. The operating system used in BBB is Ubuntu Linux.…”
Section: Figmentioning
confidence: 99%
“…The proposed location tracking system in this work uses latest technologies to make it user friendly. It supports IoT and adopts geo-fencing [2] techniques to alert the parents about the location of the children. The development of the proposed system is further explained in following section.…”
Section: Introductionmentioning
confidence: 99%