![]() ![]() It is well known that, the encryption and integrity protection components in LTE use mature and well-tested crypto algorithms that have been used for decades. In this paper, we examine the LTE security from a new perspective. Together, such procedures provide all key security functions of authentication, encryption, integrity and access control. Different from the wired Internet, LTE has made security a top design goal, thus deploying several built-in security mechanisms. ![]() The current fourth-generation (4G) Long Term Evolution (LTE) technology provides billions of users their daily mobile Internet access. We further propose remedies to defend against such threats. We have confirmed our findings with two major US operators, and found that such attacks can be launched with software-defined radio devices that cost about $299. Moreover, it may also deregister the victim from the LTE network. This control-plane attack hijacks the location update procedure, thus rendering the device to be unreachable from the Internet. He consequently breaks message encryption, when he tricks the victim to use the same pair of keys and counter value to encrypt multiple messages. The adversary can thus exploit the disjoint security setup procedures, and launch the key stream reuse attacks. The keys are installed through one procedure, whereas their associated parameters (such as uplink and downlink counters) are reset through another different procedure. Specifically, on the control plane, the LTE security association setup procedures, which establish security between the device and the network, are disconnected. In this paper, we show that several design choices in the current LTE security setup are vulnerable to key reinstallation attacks. However, if the keys are not updated and counters are reset, key reinstallation attacks may arise. ![]() It is well known that LTE uses session keys for confidentiality and integrity protection of its control-plane signaling packets. This paper studies the feasibility of key reinstallation attacks in the 4G LTE network. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |