Title :
Critical security review and study of DDoS attacks on LTE mobile network
Author :
Henrydoss, James ; Boult, Terry
Author_Institution :
Dept. of Comput. Sci., Univ. of Colorado at Colorado Springs, Colorado Springs, CO, USA
Abstract :
Mobile network is currently evolving into data centric architecture. Long Term Evolution (LTE) based next generation 4G technology is being deployed by cellular operators around the globe. LTE supports all-IP based data, voice and streaming network with speeds in the order of hundreds of megabits per seconds. Increased speed in accessing Internet and other advanced services exposes mobile data network to be attacked by hackers using spyware, malware, phishing and distributed denial-of-service (DDoS) attacks, which were predominantly affecting Internet-only datacentres in the past. This paper presents a detailed review of security framework and authentication procedures built into the LTE system architecture evolution (SAE). A brief summary of DDoS attacks and security vulnerabilities in LTE network included. This paper reviews the diameter interface and associated security problems using it in LTE network. This paper proposes using explicit-congestion notification (ECN) based method to address congestion issues in diameter interface.
Keywords :
3G mobile communication; 4G mobile communication; IP networks; Internet telephony; Long Term Evolution; cellular radio; computer crime; computer network security; invasive software; mobile computing; telecommunication congestion control; 3GPP GSM-UMTS network evolution; DDoS attacks; ECN; Internet; LTE mobile network; LTE system architecture evolution; Long Term Evolution based next generation 4G technology; SAE; all-IP based data network; all-IP based streaming network; all-IP based voice network; authentication procedures; cellular operators; congestion issues; critical security review; data centric architecture; diameter interface; distributed denial-of-service attacks; explicit-congestion notification based method; malware; mobile data network; phishing; security framework; security vulnerabilities; spyware; Authentication; Computer crime; Long Term Evolution; Mobile communication; Mobile computing; Servers; AKA; Ciphering; DDoS; EAP; ECN; Integrity; LTE; NAS;
Conference_Titel :
Wireless and Mobile, 2014 IEEE Asia Pacific Conference on
Conference_Location :
Bali
Print_ISBN :
978-1-4799-3710-3
DOI :
10.1109/APWiMob.2014.6920286