Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization Based on the Standard Platform

Document Type : Original Article

Authors

research center sadre

Abstract

Both Long-Term Evolution (LTE) and Long-Term Evolution Advanced (LTE-A) technologies have been designed to provide fourth-generation telecommunications and high-speed broadband Internet access,   although it was LTE-A that ultimately supported the requirements for the fourth generation of                 telecommunication systems, and is accepted as the 4G. The specifications for 4G networks were released over the years by 3rd Generation Partnership Project (3GPP). The main objective for the 4G network is providing IP-based capabilities such as high network speed, high network capacity, and voice and data  support through unifying the existing mobile networks and creating a central and global IP-based network. Due to the unique features of the LTE networks, there exist new challenges in designing their network mechanisms, which have consequently resulted in network security vulnerabilities. This article is the result of years of research on LTE network and its security and vulnerability analysis, as well as the feasibility of localizing the network security based on the standard platform. In this article, initially an overview of the LTE/SEA system structure is provided, and the sectors involved with network security are outlined. Then, the authentication process, protocols setup, and key agreement between different sectors of the network are described and analyzed specifically for LTE networks. Afterwards, considering the significance of specific key management in this type of network, its advantages and disadvantages are examined. Furthermore,  security pathology of this network is described with a comprehensive outlook and finally, the feasibility of LTE network localization based on the standard platform is investigated. The localization results presented as a table at the end of the article are obtained through 3GPP standards analysis, investigation of all    common protocols for different sectors of the network, and the feasibility study of localization capacity while maintaining compliance with the standard. This table is crucial in terms of network security, and demonstrates the localization capacities within the network structure accurately.

Keywords


[1]     M. Saberi, B. Madadi, and S. M. Pournaghi, “LTE NETWORK SECURITY,” ISBN 978-600-124-474-2, 2015.##
[2]     K. Farooq, “LTE for 4G Mobile Broadband, Air Interface Technologies and Performance,” Cambridge University Press, 2009##.
[3]     S. S. Dhruv, “A tutorial on lte evolved utran (eutran) an lte self organizing networks,” the university of texas at arlington, December 2010.##
[4]     F. Dan, H. Gunther, M. Wolf-Dietrich, and N. Valtteri, “LTE SECURITY”, John Wiley and Sons Ltd, ISBN 978-1-118-35558-9 © 2013, 2013.##
[5]     C. Jin, M. H. L. Maode, and Z. Yueyu, “A Survey on Security Aspects for LTE and LTE-A Networks,” IEEE Communications Surveys & tutorials, accepted for publication##.
[6]     M. Al-Humaigani, D. Dunn, and D. Brown, ”Security Transition Roadmap to 4G and Future Generations Wireless Networks,” Proc. 41st.##
[7]             “Southeastern Symposium on System Theory,” (SSST 2009), March 2009, pp. 94-97, 2009.##
[8]             M. Aiash, G. Mapp, A. Lasebae, and R. Phan, “Providing Securityin 4G Systems: Unveiling the Challenges,” Proc. Sixth Advanced International Conference on Telecommunications (AICT), pp. 439-444, May 2010.##
[9]             Y. Park and T. Park, “A Survey of Security Threats on 4G Networks,” Proc. IEEE Globecom Workshops, pp.               1-6, Nov. 2007##.
[10]          “3rd Generation Partnership Project,” Technical Specification Group Services and System Aspects, Rationale and track of security decisions in Long Term Evolved (LTE) RAN/3GPP System Architecture Evolution, (SAE), (Rel 9), 3GPP TR 33.821 V9.0.0, June 2009##
 [11]          D. Forsberg, “LTE Key Management Analysis with Session Keys Context,” Computer Communications, vol. 33, no. 16, pp. 1907-1915, Octomber 2010.##
[12]          D. Forsberg, L. Huang, K. Tsuyoshi, and S. Alanara, “Enhancing Security and Privacy in 3GPP E-UTRAN Radio Interface,” Proc. Personal, Indoor and Mobile Radio Communications (PIMRC), pp. 1-5, Septmber 2007.##
[13]          T. Ahmed, D. Barankanira, S. Antoine, X. Huang, and H. Duvocelle, “Inter-system Mobility in Evolved Packet System (EPS): Connecting Non-3GPP Accesses,” Proc. Intelligence in Next Generation Networks (ICIN), pp.   1-6, Oct. 2010.##
[14]          D. Yu and W. Wen, “Non-access-stratum Request Attack        in E-UTRAN,” Proc. Computing, Communications and Applications Conference (Com-ComAp), pp. 48-53, January 2012.##
[15]          M. Purkhiabani and A. Salahi, “Enhanced Authentication and Key Agreement Procedure of Next Generation Evolved Mobile Networks,” Proc IEEE 3rd International Conference on Communication Software and Networks (ICCSN), pp. 557-563, May 2011.##
[16]          G. M. Koien, “Mutual Entity Authentication for LTE,”            Proc 7th International Wireless Communications and Mobile, Computing Conference (IWCMC), p. 689, July 2011.##