The Borneo Post

Attacks on 4G LTE networks could send fake emergency alerts

-

WEST LAFAYETTE, Indiana: Researcher­s have identified several new vulnerabil­ities in 4G LTE networks, potentiall­y allowing hackers to forge the location of a mobile device and fabricate messages.

Ten new and nine prior attacks were outlined in a paper, including the authentica­tion relay attack, which enables an adversary to connect to core networks without the necessary credential­s.

This allows the adversary to impersonat­e and fake the location of a victim device, according to researcher­s from Purdue University and the University of Iowa.

Another noteworthy attack allows adversarie­s to obtain a user’s location informatio­n and perform denial of service attacks. By hijacking the device’s paging channel, the attacker can stop notificati­ons from coming in and even fabricate messages.

Other attacks identified in the paper enable adversarie­s to send fake emergency paging messages to a large number of devices, drain a victim device’s battery by forcing it to perform expensive cryptograp­hic operations, and disconnect a device from the core network.

These attacks occur within three critical procedures of the 4G LTE protocol: Attach, detach and paging. These processes allow a user to connect to the network, disconnect from the network, and receive calls and messages. These procedures are also critical to the reliable functional­ity of several other procedures.

The researcher­s used a testing approach they call “LTEInspect­or” to expose the vulnerabil­ities. The tool combines the power of a symbolic model checker and a protocol verifier.

“Our tool is the first one that provides a systematic analysis for these three particular procedures in 4G LTE networks,” said Syed Hussain, a graduate student in computer science at Purdue University. “Combining the strength of these two tools is novel in the context of 4G LTE.”

To confirm that the attacks identified in the paper pose a real threat, the researcher­s validated eight of the 10 new attacks through experiment­ation in a real testbed.

It looks as though there is no easy way to fix these vulnerabil­ities. Retrospect­ively adding security into an existing system without breaking backward compatibil­ity often yields Band-Aid like solutions, which don’t hold up under extreme circumstan­ces, according to the paper. Addressing the authentica­tion relay attacks may require a major infrastruc­tural overhaul.

“Device manufactur­ers and cell phone networks will both need to work to fix these problems,” Hussain said. “We need a major overhaul of the entire system to eliminate these vulnerabil­ities.” — Purdue News

 ??  ?? The Google logo at the company’s Asia-Pacific headquarte­rs in Singapore, on Nov. 10, 2016. —WP-Bloomberg photo
The Google logo at the company’s Asia-Pacific headquarte­rs in Singapore, on Nov. 10, 2016. —WP-Bloomberg photo
 ??  ?? Attacks on 4G LTE identified in the paper enable adversarie­s to send fake emergency paging messages to a large number of devices, drain a victim device’s battery by forcing it to perform expensive cryptograp­hic operations, and disconnect a device from...
Attacks on 4G LTE identified in the paper enable adversarie­s to send fake emergency paging messages to a large number of devices, drain a victim device’s battery by forcing it to perform expensive cryptograp­hic operations, and disconnect a device from...

Newspapers in English

Newspapers from Malaysia