Vulnerability Analysis of LTE Location Services

被引:8
|
作者
Hofer, Mark [1 ]
McEachen, John [1 ]
Tummala, Murali [1 ]
机构
[1] Naval Postgrad Sch, Dept Elect & Comp Engn, Monterey, CA 93943 USA
来源
2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS) | 2014年
关键词
3GPP; LTE; Vulnerability Assessment; mobile positioning;
D O I
10.1109/HICSS.2014.635
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To meet government requirements for positioning emergency services, Long Term Evolution (LTE), the latest generation of mobile communications popular in North America and Europe, incorporates the ability to ascertain the position of the user equipment via the network. This additional signaling means that there is also the chance that the user position may be vulnerable to being intercepted by unauthorized parties. Several different potential vulnerabilities are explored in this paper and is a proof of concept for three vulnerabilities, including the presence of location data on the network when there is no authorized request for that data active. A series of simulations were constructed to analyze and test the logical flow of messages through the LTE core network and to see what vulnerabilities existed. The first simulation established a baseline, and each additional simulation examined a possible vulnerability.
引用
收藏
页码:5162 / 5166
页数:5
相关论文
共 50 条
  • [1] Combination of LTE and IMS to deliver location based services
    GhasemiNajm, M.
    Sibley, M. J. N.
    Jafarian, A.
    2012 20TH TELECOMMUNICATIONS FORUM (TELFOR), 2012, : 56 - 59
  • [2] Vulnerability Analysis and Verification for LTE Initial Synchronization Mechanism
    Li, Xiaona
    Xie, Xue
    Zeng, Juan
    Wang, Yongming
    2015 36TH IEEE SARNOFF SYMPOSIUM, 2015, : 150 - 154
  • [3] Analysis of Quality of Services in LTE and Mobile WiMAX
    Roodaki, Maryam
    Raahemifar, Kaamran
    Raahemi, Bijan
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (05) : 1508 - 1523
  • [4] Vulnerability of LTE to Hostile Interference
    Lichtman, Marc
    Reed, Jeffrey H.
    Clancy, T. Charles
    Norton, Mark
    2013 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2013, : 285 - 288
  • [5] Automating environmental vulnerability analysis for network services
    Koutras, Dimitris
    Grigoriadis, Christos
    Papadopoullos, Michalis
    Kotzanikolaou, Panayiotis
    Douligeris, Christos
    2022 27TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2022), 2022,
  • [6] On Location Privacy in LTE Networks
    Roth, John D.
    Tummala, Murali
    McEachen, John C.
    Scrofani, James W.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (06) : 1358 - 1368
  • [7] Charged location aware services -: A privacy analysis
    Langendörfer, P
    Piotrowski, K
    Maaser, M
    ICMB 2005: International Conference on Mobile Business, 2005, : 116 - 120
  • [8] Vulnerability Analysis and Exploitation of Location Privacy Leakage in Webcasting Platforms
    Yue H.-Z.
    Zhang Y.-Q.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (05): : 1095 - 1111
  • [9] Vulnerability and Essential Services
    Graham, C.
    JOURNAL OF CONSUMER POLICY, 2023, 46 (04) : 465 - 482
  • [10] Vulnerability and Essential Services
    C. Graham
    Journal of Consumer Policy, 2023, 46 : 465 - 482