Spectrum and Spread Range
The Long term Evolution (LTE)/ Advanced Long Term Evolution (LTE-A) is a wireless communication standard for mobile devices and data networks. LTE provides high speed connectivity due of its higher bandwidths, superior spectrum efficiency with lower latency rates. This report describes about comparison of cellular networks with LTE network and architecture of LTE along with the attacks on LTE network.
Comparison of Cellular Networks
- Communication Spectrum
Spectrum is defined as the variation of radio frequencies within a specified range to transmit data wirelessly over the network.
Spread range various access correspondence referred to financially as cdma code division numerous entrance is a driving innovation behind the quickly propelling spread range different access correspondence referred to monetarily as cdma code division numerous entrance is a driving innovation behind the quickly progressing CDMA. [1]
2G stays for second-age remote telephone development, 1G frameworks used are straightforward, 2G frameworks are electronic and 3G (third-age) advancement is used to enhance PDA standards.3G serves to at the same time trade both voice data (a telephone call) and non-voice data, (for instance, downloading information, exchanging email, and messaging. The element of 3G is video correspondence. 4G advancement stands to be the future standard of remote contraptions with an essentially higher range.
- Modulation techniques
Modulation technique is defined as the way the data transmission takes place. In 1G network, analog signal is used to transmit data. In this, centrally controlled base station is there each providing service to a small area. In 2G network, advanced transmission was utilized to transmit information and also by the introduction of bleeding edge and fast phone to-sort out hailing. The climb in wireless use in light of 2G was unsafe and this period similarly watched the approach of prepaid mobile phones. In 3G arrange, fast IP information organize was utilized. The use of packet switching made the data transmission faster and reliable. In 4G network, the growth of mobile broadband took place and with this evolution the data transmission rate reached almost 100mbps.
- Medium Access Control Techniques
Medium access control is responsible for sharing of data packets across the network. MAC decides how the data can be delivered safely without collision.
Carrier Sense Multiple Access with Collision Detection (CSMA/CD), which is utilized in Ethernet organizing. [2] Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), which is utilized in AppleTalk organizing.
Token passing, which is utilized in Token Ring and Fiber Distributed Data Interface (FDDI) networking.
- Network Speed and bandwidth utilization
The remote innovations have gained an enormous ground in the most recent decade, and give a universal registering and correspondence condition for expanded true applications. A perfect testing apparatus was given exact estimation of accessible transmission capacity before sending information bundles. In the PATHON show, there is no necessity to test learning and administration control over the system to give a conclusion to end estimation of accessible data transmission. Keeping in mind the end goal to decrease the estimation time, it considers less activity. The usage of the system association is estimated by utilizing the Tri Packets Method characterized in examining procedure [6]. The Packet Pair Probing Technique is utilized by remote systems for data transmission estimation while considering the limit and the cross activity variety of remote connections.
- Security techniques and risk
Modulation Technique and Medium Access Control
Real affirmation of supporters of confirmation the worthwhile individuals are utilizing the system. Unwavering quality with associations, for example, SMS, visit and report exchange it is fundamental that the information gets in contact with no adjustments. [3] Mystery with the broadened utilization of PDAs in temperamental correspondence, there is an essential for a safe possess recalling the genuine goal to transmit data. The Cell gadget may have files that need limited access to them. The gadget may get to a database where some kind of part based access control is crucial Contamination And Malware with expanded handiness gave in cell structures, issues overpowering in more prominent frameworks, for example, maladies and malware create. The main sickness that showed up on cell gadgets was Freedom. An affected contraption can also be utilized to assault the cell coordinate structure by winding up some piece of a colossal scale inconsistency of association snare.
A remote correspondence standard planned and created by third era organization venture (3GPP) called Long term advancement (LTE) is intended with the end goal of rapid web network. It is the overhauled type of CDMA and UMTS. Its design is made out of three primary segment i.e. Client gear (UE), Evolved UMTS Terrestrial Radio Access Network likewise called as E-UTRAN and the developed parcel center (EPC).
- User equipment (UE) – The inward working of the client outline for LTE is unclear to the one utilized by UMTS and GSM which is greatly a Versatile Hardware (ME). [4] The conservative gear contained the running with major modules: Convenient End (MT): This handles all as far as possible. Terminal Gear (TE): This terminations the information streams. Exhaustive Incorporated Circuit Card (UICC): This is by and large called the SIM card for LTE sorts of mechanical assembly. It runs an application known as the All inclusive Endorser Personality Module (USIM). A USIM stores client particular information on an exceptionally essential level the same as 3G SIM card. This keeps data about the client’s telephone number, home system character and security keys and so on.
- E-UTRAN (The Access Network) – The radio access organize i.e. E-UTRAN is in charge of radio correspondences between the center system and versatile. E-UTRAN is made out of developed base stations called e-NodeBS. This developed base station covers at least one cells for portable system and the serving base station is called eNB. eNB has two principle works that are:
- Sending and getting radio signs utilizing computerized and simple elements of the LTE organize.
- It likewise keeps up low level activities by sending them signally messages, for example, handover messages. [5] Every eBN associates with EPC its uses S1 interface and to interface with each other it utilizes X2 interface which is in charge of flagging and parcel sending amid handover.
- The Evolved packet Core (EPC)
This inside framework has the portions like shudder and tsunami forewarning system, approach control and charging Rules work (PCRF) and the rigging Identity enlist. HSS is a central database that contains information about all framework director supporters.
The trans-portability association segment (MME) controls the bizarre state activity of the adaptable by procedures for hailing messages and Home Subscriber Server (HSS). [6]
The Policy Control and Charging Rules Function (PCRF) is an area which isn’t appeared in the above structure yet it is responsible for system control fundamental organization, and besides to control the stream based charging functionalities in the Policy Control Enforcement Function (PCEF), which stays in the P-GW.
The long term evolution (LTE)/LTE-Advanced (LTE-A) furnishes propelled administrations with higher data transfer capacities, better range effectiveness and lower inactivity contrasted with the heritage cell systems. The LTE/LTE-An is an all IP-based design, which makes it powerless against new security dangers. A portion of the assaults are:
- Disclosure of The International Mobile Subscriber Identity (IMSI)
IMSI is a persisting personality of a supporter. It ought to be transmitted as every so often as useful for privacy of client character. LTE/LTE-A particulars control the IMSI transmission rehash over the air interface. In the radio transmission, a Globally Unique Temporary Identifier (GUTI) is utilized to perceive endorsers.
- Location Tracking
LTE/LTE-A Network Architecture
Without a doubt, the area information of cell phone clients are considered as private individual data. The outline of portable correspondence innovations permits the versatile administrators to know the physical areas of the clients to perform nonstop cell administrations. What’s more, the progress of ongoing situating advances and area based administrations likewise represent a danger to client area confidentiality.
- Radio Frequency Jamming, Spoofing and sniffing
Wireless systems are powerless against sticking style assaults in light of their common medium. Like different remote frameworks, the LTE/LTE-A system can likewise experience the ill effects of RF sticking, spoofing, and sniffing, which are all regular physical layer. [7]
- DOS/DDOS Attacks
DoS and Distributed Denial of Service (DDoS) assaults are both unprecedented strikes on LTE/LTE-A system. A typical strategy for DoS assaults is that aggressors send oods of messages to an objective server and fumes its CPU assets, affecting the objective to unfit to offer associations to true blue clients. Regardless of this sort of DoS assaults, particular DoS strikes continually misuse the stipulation in the LTE/LTE-A structure custom. In the DDoS ambushes, aggressors can make liberal improvement volume utilizing botnet managed by Command and Control Focuses (C&C) or hacked adaptable UE. An attacker can mishandle the security escape states of the working framework and applications downloaded from application stores to trade off versatile contraptions. [8]
Disclosure of IMSI is the most critical attack of all the attacks. By this impersonators can intercept mobile phone traffic and track user’s location. Based on IMSI, available tools can utilize unreservedly accessible instruments and even form their own particular phony GSM BTS to screen and control interchanges, remarkably to steal passwords or Visa information from individuals adjacent who make buys on their phones.
Countermeasure for the attacks is the Android-IMSI-Catcher-Detector (short: AIMSICD) is an Android open-source based undertaking to recognize and dodge counterfeit base stations (IMSI-Catchers) or other base-stations (versatile receiving wires) with poor/no encryption, conceived in 2012 on XDA.
Another is DoS attack which can fatal to the LTE/LTE-A network. Protection against Dos can be achieved by the determination vulnerabilities in charge of DoS assaults in light of TAU technique (D1 and D2) can be settled without changes in the convention itself. The 3GPP SA3 gathering may propose another system in light of a counter or clock an incentive to recoup from DoS assaults. In the event that the UE is withdrawn from the system for a specific length because of a TAU dismiss messages, it should reset the setup settings in the USIM or baseband to re-append itself with the system without pestering the client, i.e., without rebooting or require re-addition of USIM
Conclusion
In this report, correlation of 2G, 3G, 4G cell arrange is discussed with respect to correspondence run, direction methods, medium access control framework, sort out speed and exchange speed use close by security systems and danger. A short blueprint of LTE/LTE-A designing is displayed close by the security risks and countermeasures.
References
[1] L. He, Z. Yan and M. Atiquzzaman, “LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey,” in IEEE Access, vol. 6, pp. 4220-4242, 2018.
[2] J. Cao, M. Ma, H. Li, Y. Zhang, and Z. Luo, “A survey on security aspects for LTE and LTE-A networks,” IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 283302, 1st Quart., 2014.
[3] 3rd Generation Partnership Project; Technical Specication Group Ser- vices and System Aspects; Architecture Enhancement for Non-3GPP Accesses (Release 14), document 3GPP TS 23.402 V14.3.0, 2017.
[4] S. P. Rao, B. T. Kotte, and S. Holtmanns, “Privacy in LTE networks,” in Proc. EAI Int. Conf. Mob. Multimedia Commun. (ICST), 2016, pp. 176183.
[5] S. P. Rao, B. T. Kotte, and S. Holtmanns, “Privacy in LTE networks,” in Proc. EAI Int. Conf. Mob. Multimedia Commun. (ICST), 2016, pp. 176183.
[6] M. Lichtman, R. P. Jover, M. Labib, R. Rao, V. Marojevic, and J. H. Reed, “LTE/LTE-A jamming, spoong, and snifng: Threat assessment and mitigation,” IEEE Commun. Mag., vol. 54, no. 4, pp. 5461, Apr. 2016.
[7] J. Henrydoss and T. Boult, “Critical security review and study of DDoS attacks on LTE mobile network,” in Proc. IEEE AsiaPacic Conf. Wireless Mobile, Aug. 2014, pp. 194200.
[8] [21] M. Khosroshahy, D. Qiu, and M. K. M. Ali, “Botnets in 4G cellular networks: Platforms to launch DDoS attacks against the air interface,” in Proc. MoWNeT, 2013, pp. 3035.