This report evaluates various cellular generations and architecture of LTE generation and explains different attacks in LTE systems. It also suggests countermeasures to avoid these kinds of threats.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Need help grading? Try our AI Grader for instant feedback on your assignments.
R SLTE NETWO K 1 Introduction LTE refer as long-term evaluation which providesmoderncommunication services to many people and it increased theperformanceandefficiencyof cellular networks [1]. There are many advantages of this network, for example, higherbandwidth,moreeffective, reduceddistortionlosses[2].Italso suffers from many attacks and threats which are explaining in this report and to achieve LTE security measurements many security plans developed in the last few years [2]. The main aim of this reportistoevaluatevariouscellular generationandarchitectureofLTE network. Thisreport categorisesinto four parts, for example, the comparison between cellular network generations, LTE architecture, LTE attacks on access networkandcorenetworks,and identification of biggest LTE attack [3]. Comparisonoftheexistingcellular networks generations The wireless network is a system which isusedtoproduceacommunication step between two or more person [4]. The main concept of this network is that it can be used to transmit the signal over longdistanceandimproved performance of cellular networks [4]. Therearevariouskindsofcellular networks generation, for example, 1G, 2G,3G,4G,and5Gandallthis generation is explaining in this part. First generation This technology is completely based on analogy technology in which an input signal transmits in the form of analog signals[5].Thisisoneofthefirst processeswhichusefrequency modulationandFDDmethodsfor communication purpose. The frequency modulation method work on 150 MHz frequency and a channel bandwidth of 1G is around 30 KHz. Second generation Thisisanadvancedgenerationof mobilenetworkwhichusesdigital communication system because analog technologyreducesdataspeedand strength of signals [5]. In which digital modulation technology is used rather thanfrequencymodulationthat increasestheefficiencyofmobile networks. The uplink frequency of 2G is 890 MHz and downlink frequency is 935 MHz and bandwidth of this network is around 25 MHz [6].
R SLTE NETWO K 2 Figure:Comparisonbetweencellular network generations [8]. (Source: Pavloski, Go9rbil, and Gelenbe, 2013) Third generation This generation was developed after 2.5 G and the main objective of 3G is to increaseinternetspeedinmobile networks[6].Itdevelopedvideo conferencingandmultiple communication systems and also helpful forbusinessindustries.3Gnetworks alsoproducevideocalling,internet access, multimedia services, and gaming services.ItusesW-CDMAandFDD technologies for communication and a channel bandwidth of this is 5 GHz. The channel bit rate of the third generation is around 2.2 megabits per seconds [7]. Fourth Generation This is a conceptual outline of a mobile network that provides high data speed for internet and it can support around 100 megabits per second internet speed [8]. LTE was developed in the year 2010 that increased overall performance and efficiencyofmanycellularnetworks. This generation uses OFDM and CDMA technology to transmit signals and also uses the FFT process which increases the productivity of mobile networks [8]. Fifth generation This is future mobile generation which will develop in the year 2020 and it is estimated that this generation will avoid the problem of security and produce high-speed connectivity. It can change the way of communication and people can increase the communication system by using this generation [9]. This will support 1000 fold gains and can provide 10 GB per second internet speed. This generation will use RAT technology and include current wireless networks like LTE, GSM, and Wi-Fi. LTE of Architecture The design of LTE is isolated into two sections,forexample,aradioaccess system and centre system. The LTE get to arrange is otherwise called E-UTRAN
R SLTE NETWO K 3 thatincorporates3GPPradioaccess framework. E-UTRAN is made out of NodeBswhichisutilizedtocontrol organize signals and the client hardware isassociatedwiththeairinterface. Thee-NodeB associated with each other throughX2andforthemostpart actualizesdifferentcapacity,for example, IP header, encryption process, andMME[8].Longhaulassessment additionally bolsters HeNBs and RN and LTE center system otherwise called EPC arrange. The primary reason for the EPC frameworkistogivethe correspondencebetween heterogeneousaccessframeworks, containingE-UTRANandnon-getto systems. EPC arrange partitioned into five sections, for example, MME, HSS, SGW, P-SGW, and PCRF [8]. Figure: LTE Architecture (Source: Pavloski, Go9rbil, and Gelenbe, 2013) The MME is utilized to control surface capacity and SGW is utilized to control clientsurfacecircumstances.The engineeringofLTEincludesIMS organize framework which is utilized to controlbundleexchanged administrations[9].Thefundamental part of GSM and UMTS is to help circuit exchanged fall-back process and this can be activated when IMS isn't produced. IMS is isolated into three, for example, clientplane,applicationplane,and controlplane.Theclientplaneis characterizedassessioninception benefitwhichisembeddedintocell phones and the principal part of control
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
R SLTE NETWO K 4 plane or framework is to control session of gadgets [10]. The LTE attacks on the access and core networks Attacks on Access Network Disclosure of the International Mobile Subscriber Identity (IMSI) Itischaracterizedasapersonality membershipframeworkwhichisa distinguishingproofprocess.Itis watchedthatnumerousindividuals utilize IMSI to distinguish data of any individual which is the huge issue in correspondence division. In this cutting- edgeage,numerousassociationsare utilizing the wireless system to speak with other individual yet principle issue happeninLTEandanyremote framework is that absence of security. IMSIiswhereindividualsutilize worldwide supporter character through which they go into human individual serversandhackeveryindividual record [4]. LTE diminish the recurrence of IMSI over the space interface and in LTE flag transmitted into the air which can be effortlessly scrambled or hacked. In this way, it is researched that IMSI procedurecandiminishhuman informationordataandfurthermore diminish change information [5]. Radio Frequency jamming This is an extremely regular issue in remotecorrespondenceandthey assaultonindividualsPCframework andotherfringegadgets[5].Radio recurrence sticking targets transmitter andcollectorofcorrespondence frameworkanddiminishtheflagto clamourproportionoftransmitted signs.Forthissortofcircumstance, 3GPP proclaim the required recurrence and time through which individuals can dodge area assault and DOS assault. DOS/DDOS ATTACKS DoS and Distributed Denial of Service (DDoS) strikes are both genuine attacks onLTE/LTE-Aframework.A commonplacemethodforDoS ambushes is that aggressors send floods ofmessagestoatargetserverand exhaust its CPU resources, influencing the goal to unfit to offer organizations to true blue customers [11]. Despite this sortofDoSattacks,diverseDoS ambushesconstantlymanhandlethe loophole in the LTE/LTE-A framework tradition.IntheDDoSattacks, aggressorscandelivergenerous developmentvolumeusingbotnet directedbyCommandandControl Focuses (C&C) or hacked versatile UE [12].
R SLTE NETWO K 5 Attacks on Core Networks DOS is an extremely basic issue for LTE or any media transmission association and DOS assault on centre system by whichtheycangointoservers.A versatile botnet is a procedure which is utilizedtosetupDOSassaultsand individuals can utilize this to deliver the surge of dangers. There are primarily two issues happen into DOS assaults, for example, over-burden of SGW, and over- burden of HSS [13]. An insider attack is characterized by securityriskthathappenswithina server or PC framework. This sort of dangerscanclosedownframework hubs in the centre system and create a calculationproceduretosquare individual documents [13]. It is assessed thatthisassaultcanlikewisesquare base station through which individuals can't speak with another individual. Identify and analyse the attack DOS/DDOS DOSattackembedsintoindividuals personalserversandprogrammers scramble every individual datum or data records.Ithappenswhenany programmer creates a calculation into PCframeworksandsquaresall individualservers[12].Itcreatesa floodingframeworkwhichcan'tre- establishwithouttheconsentofthe assailantandnumerousassociations' facesthissortofissue[12]. Programmerstargetweb administrationsofnumerousonline networks, servers of managing account divisions, and other internet-based life after that they scramble all information documentsandrequestcashtore- establish back [11]. Countermeasures The issue of DOS and DDOS assaults can belessenedbyreceivingnumerous securityframeworkandnumerous associationscreatedcredibleservers andsecuritydesigns[10].Thereare differentsortsofaprocessthrough whichindividualscanmaintaina strategic distance from these kinds of assaults,forinstance,theencryption technique,thecryptographyprocess, firewall, and example acknowledgment. Every one of these strategies ought to lessen numerous dangers and assaults in remote systems [11]. Conclusion LTE is a kind of remote system which is the fourth era cell organizes that stay away from the issue of long separation correspondence. This report evaluated
R SLTE NETWO K 6 different types of cellular networks and engineeringofLTE,anddifferent assaultsinLTEsystems.Thereare numerous assaults identified in LTE, for example,areafollowing,discloserof IMSI, DOS assaults, and insider assaults. Individualscanmaintainastrategic distancefromthiskindofriskby utilizingsecurityframeworks,the encryptionprocessandbyreceiving firewallprogramming.Many organizations use cloud-based services toprotecttheirpersonalinformation and people should update their software on a daily basis.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
R SLTE NETWO K 7 References 1. Gupta, T. Verma, S. Bali, and S. Kaul, ‘‘Detecting MS initiated signaling DDoS attacks in 3G/4G wireless networks,’’ in Proc. Int. Conf. Commun. Syst. Netw., 2013, pp. 1–60. 2. M. Pavloski, G. Go9rbil, and E. Gelenbe, ‘‘Bandwidth usage—Based detection of signaling attacks,’’ Inf. Sci. Syst., vol. 363, pp. 105–114, Sep. 2015. 3.S.Wahl,K.Rieck,P.Laskov,P. Domschitz, and K. R. Mu9ller, ‘‘Securing IMS against novel threats,’’ Bell Labs Tech. J., vol. 14, no. 1, pp. 243–257, 2009. 4. M. Nassar, R. State, and O. Festor, ‘‘MonitoringSIPtrafficusingsupport vectormachines,’’inProc.Int. WorkshopRecentAdv.Intrusion Detection, 2008, pp. 311–330. 5. D. Seo, H. Lee, and E. Nuwere, ‘‘SIPAD: SIP-VoIPanomalydetectionusinga stateful rule tree,’’ Comput. Commun., vol. 36, no. 5, pp. 562–574, Mar. 2013. 6. S. Zhang, L. Zhou, M. Wu, Z. Tang, N. Ruan, and H. Zhu, ‘‘Automatic detection of SIP-aware attacks on VoLTE device,’’ in Proc. IEEE Veh. Technol. Conf., Sep. 2016, pp. 1–5 7. R.A., Ruiter, L.T., Kessels, G.J.Y. Peters and G., Kok, “Sixty years of fear appeal research:Currentstateofthe evidence.” Internationaljournalof psychology,vol.49,no.2,pp.63-70, 2014. 8. R., Zhang, M., Wang, L.X., Cai, Z., Zheng, X. Shen and L.L., Xie. “LTE-unlicensed: the future of spectrum aggregation for cellularnetworks. IEEEWireless Communications,vol.22, no. 3, pp.150- 159, 2015. 9. A., Laya, L. Alonso and J., Alonso, “Is the Random Access Channel of LTE and LTE-ASuitableforM2M Communications?ASurveyof Alternatives.” IEEECommunications SurveysandTutorials,vol.16,no.1, pp.4-16, 2014. 10. J., Lee, Y., Kim, Y., Kwak, J., Zhang, A., Papasakellariou, T., Nolan, C. Sun and Y., Li. “LTE-advanced in 3GPP Rel-13/14: anevolutiontoward5G.” IEEE Communications Magazine,vol.54, no. 3, pp.36-42, 2016.
R SLTE NETWO K 8 11. A., Al, S., Ni, Q. Rubaye and E., Sousa, “5Gcommunicationsrace:Pursuitof morecapacitytriggersLTEinan unlicensedband.” IEEEvehicular technologymagazine,vol.10,no.1, pp.43-51, 2015. 12. S., Deb, P., Monogioudis, J. Miernik andJ.P.,Seymour,“Algorithmsfor enhancedinter-cellinterference coordination(eICIC)inLTE HetNets.” IEEE/ACMtransactionson networking,vol.22,no.1,pp.137-150, 2014. 13. P., Bru9ll, L.T., Kessels, L., Repetto, A. Dirkson and R.A., Ruiter. “ERPs Reveal DisengagementProcessesRelatedto CondomUseEmbarrassmentin Intention-Behavior Inconsistent Young Adults.” Archives of sexual behavior, vol. 12, pp.1-12, 2018.