{"title":"Non-access-stratum request attack in E-UTRAN","authors":"Da Yu, Wushao Wen","doi":"10.1109/COMCOMAP.2012.6154001","DOIUrl":null,"url":null,"abstract":"Long Term Evolution (LTE) is the evolution of Universal Mobile Telecommunications System (UMTS). LTE revises and improves system architecture from UMTS to provide services that are more efficient. Evolved-UTRAN (E-UTRAN) is the air interface of 3GPP and it is on the upgrade path for LTE mobile networks. E-UTRAN specifies better security architecture to protect users' information. However, E-UTRAN is still not perfect. This article studies vulnerabilities of non-access-stratum (NAS) of E-UTRAN. We present illustrative attacks to exploit such vulnerabilities and demonstrate the effectiveness and the impact of such attacks on normal users by using our self-developed simulation tool.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"25","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Computing, Communications and Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMCOMAP.2012.6154001","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 25
Abstract
Long Term Evolution (LTE) is the evolution of Universal Mobile Telecommunications System (UMTS). LTE revises and improves system architecture from UMTS to provide services that are more efficient. Evolved-UTRAN (E-UTRAN) is the air interface of 3GPP and it is on the upgrade path for LTE mobile networks. E-UTRAN specifies better security architecture to protect users' information. However, E-UTRAN is still not perfect. This article studies vulnerabilities of non-access-stratum (NAS) of E-UTRAN. We present illustrative attacks to exploit such vulnerabilities and demonstrate the effectiveness and the impact of such attacks on normal users by using our self-developed simulation tool.