How voice call technology poses security threats in 4G LTE networks

Guan Hua Tu, Chi-Yu Li, Chunyi Peng, Songwu Lu

研究成果: Conference contribution同行評審

23 引文 斯高帕斯(Scopus)

摘要

To support voice calls vital to mobile users and carriers, 4G LTE cellular networks adopt two solutions: VoLTE (Voice Over LTE) and CSFB (Circuit-Switched FallBack). In this paper, we disclose that both schemes are harmful to mobile users from a security perspective. The adoption of the latest VoLTE allows an attacker to manipulate the radio resource states of the victim's device in a silent call attack, thereby draining the victim's battery 5-8 times faster. CSFB exhibits two vulnerabilities of exposing 4G↔3G network switch to adversaries. This can be further exploited to launch ping-pong attacks where mobile users may suffer from up to 91.5% performance downgrade, or 4G denial-of-service (DoS) attacks where mobile users are deprived of 4G LTE connectivity without their consent. We devise two proof-of-concept attacks as showcases, and demonstrate their viability over operational LTE networks. We analyze their root causes and uncover that the problems lie in seemingly sound design decisions for functional correctness but such choices bear unexpected and intriguing implications for security design. We finally propose remedies to mitigate the attack damage.

原文English
主出版物標題2015 IEEE Conference on Communications and NetworkSecurity, CNS 2015
發行者Institute of Electrical and Electronics Engineers Inc.
頁面442-450
頁數9
ISBN(電子)9781467378765
DOIs
出版狀態Published - 3 12月 2015
事件3rd IEEE International Conference on Communications and Network Security, CNS 2015 - Florence, 意大利
持續時間: 28 9月 201530 9月 2015

出版系列

名字2015 IEEE Conference on Communications and NetworkSecurity, CNS 2015

Conference

Conference3rd IEEE International Conference on Communications and Network Security, CNS 2015
國家/地區意大利
城市Florence
期間28/09/1530/09/15

指紋

深入研究「How voice call technology poses security threats in 4G LTE networks」主題。共同形成了獨特的指紋。

引用此