National Interests: Priorities and Security
 

Abstracting and Indexing

РИНЦ
Referativny Zhurnal VINITI RAS
Worldcat
LCCN Permalink
Google Scholar

Online available

EBSCOhost
Eastview
Elibrary
Biblioclub

Archiving

Cyberleninka (12 month OA embargo)

Analysis of the protection of the LTE-A security system from the targeted exposure of DoS attack

Vol. 15, Iss. 2, FEBRUARY 2019

Received: 30 November 2018

Received in revised form: 20 December 2018

Accepted: 11 January 2019

Available online: 15 February 2019

Subject Heading: THREATS AND SECURITY

JEL Classification: C63, М15

Pages: 376–392

https://doi.org/10.24891/ni.15.2.376

Kormil'tsev N.V. Kazan National Technical Research Technical University named after A.N. Tupolev – KAI (KNRTU-KAI), Kazan, Republic of Tatarstan, Russian Federation
kormiltcev@hotmail.com

https://orcid.org/0000-0002-2289-5672

Uvarov A.D. Kazan National Technical Research Technical University named after A.N. Tupolev – KAI (KNRTU-KAI), Kazan, Republic of Tatarstan, Russian Federation
obg-96@mail.ru

https://orcid.org/0000-0003-0337-2689

Khamatnurov I.I. Kazan National Technical Research Technical University named after A.N. Tupolev – KAI (KNRTU-KAI), Kazan, Republic of Tatarstan, Russian Federation
Ildarka96@mail.ru

https://orcid.org/0000-0002-4853-6774

Tumbinskaya M.V. Kazan National Technical Research Technical University named after A.N. Tupolev – KAI (KNRTU-KAI), Kazan, Republic of Tatarstan, Russian Federation
tumbinskaya@inbox.ru

ORCID id: not available

Subject The article analyzes to what extent the LTE Advanced networks are protected from the DoS attacks.
Objectives The research attempts to detect and analyze vulnerable loops in the LTE security system, which is a modern means of communication. However, it is often exposed to some malpractices, such as DoS attacks.
Methods The research discusses the specifics of Network Attached Storage access to Evolved UMTS Terrestrial Radio Access Network (E-UTRAN). We also describe two instances of the protocol being exposed to DoS attack through the Tracking Area Update procedure (TAU).
Results We conducted an analysis of some exposures as part of E-UTRAN and TAU procedures and figured out what disrupted the service of TRACKINGAREAUPDATEREJECT warning system.
Conclusions and Relevance Although LTE-A standard provides for some mechanisms to enhance the security of mobile communication, we actually detected an unprotected transfer of messages to launch DoS attacks. We also proved deficiencies in the network security system. The drawbacks can be eliminated with the system recovery timer, which disconnects mobile stations from the networks and notifies TAU procedure is denied throughout a protracted period of time. Afterwards mobile stations regain access to the network without disturbing other users.

Keywords: LTE-A, information security, tracking area update, DoS

References:

  1. Komysov P.V., Nadymov A.V. [Investigation of interference in the heterogeneous networks of the LTE-A standard]. Izvestiya YuFU. Tekhnicheskie nauki = Izvestiya SFedU. Engineering Sciences, 2018, no. 1, pp. 220–227. (In Russ.)
  2. Drozdova V.G., Zav'yalova D.V. [Analysis and optimization of handover key performance indicators in LTE mobile networks]. Vestnik kibernetiki = Proceedings in Cybernetics, 2017, no. 4, pp. 146–153. (In Russ.)
  3. Abdyraeva N.R. [Feature of wireless communication LTE using a fractal antenna based on Koch curve]. Byulleten' nauki i praktiki = Bulletin of Practice and Sciences, 2018, no. 3, pp. 164–169. (In Russ.)
  4. Tikhnonov V., Nesterenko S., Babich Yu. et al. [Developing the architecture of integrated 5G mobile network based on the adaptation of LTE technology]. Vostochno-evropeiskii zhurnal peredovykh tekhnologii = Eastern European Journal of Enterprise Technologies, 2017, vol. 5, no. 2, pp. 42–49. (In Russ.) URL: Link
  5. Korionov I.P., Orlov V.G. [User-related aspects of security in LTE networks]. Telekommunikatsii i informatsionnye tekhnologii = Telecommunications and Information Technologies, 2017, no. 2, pp. 16–21. (In Russ.)
  6. Naumov V.A., Mokrov E.V., Samuilov K.E. [Performance measures analysis of data transfer process to mobile users in LTE cell]. Informatika i ee primeneniya = Informatics and Applications, 2017, no. 4, pp. 79–84. (In Russ.)
  7. Ermakov S.A., Kolenbet N.S., Yurasov V.G., Bataronov I.L. [Architecture of the security system in the cellular networks of the LTE standard]. Informatsiya i bezopasnost'= Information and Security, 2014, no. 4, pp. 626–629. (In Russ.)
  8. Gudkova I.A., Markova E.V. [On radio admission control scheme model for non-real-time services with maximum bit rate in LTE network]. T-COMM: Telekommunikatsii i transport = T-COMM: Telecommunications and Transport, 2014, no. 8, pp. 28–31. URL: Link (In Russ.)
  9. Mazhar J., Filin M. [Optimization of network load based on LTE Advanced and frequency substitution]. Nauka i biznes: puti razvitiya = Science and Business: Ways of Development, 2015, no. 6, pp. 128–130. (In Russ.)
  10. Konstantinov A.S., Pestryakov A.V. [Analysis of the fundamental limitations of the maximum data rate in the LTE-Advanced network]. T-COMM: Telekommunikatsii i transport = T-COMM: Telecommunications and Transport, 2017, no. 12, pp. 60–63. (In Russ.)
  11. Listopad M.E., Korotchenko S.E. [Improving the method for evaluation of the information security system in Russia]. Natsional'nye interesy: prioritety i bezopasnost' = National Interests: Priorities and Security, 2017, vol. 13, no. 6, pp. 1162–1175. (In Russ.) URL: Link
  12. Terent'ev A.M. [Choice of adequate information security software PC in Russia]. Natsional'nye interesy: prioritety i bezopasnost' = National Interests: Priorities and Security, 2012, no. 33, pp. 37–42. URL: Link (In Russ.)
  13. Revenkov P.V., Berdyugin A.A. [Cybersecurity in the Internet of Things and electronic banking]. Natsional'nye interesy: prioritety i bezopasnost' = National Interests: Priorities and Security, 2016, vol. 12, no. 11, pp. 158–169. URL: Link (In Russ.)
  14. Barmina S.S., Tadzhibaeva F.M., Tumbinskaya M.V. [Correlation analysis and forecasting of SYN-flood attacks]. Prikladnaya informatika = Applied Informatics, 2018, no. 4, pp. 93–102. (In Russ.)
  15. Petrenko A.A., Petrenko S.A. [Method for increasing the LTE-network stability in a destructive cyber attacks]. Voprosy kiberbezopasnosti = Cybersecurity Issues, 2015, no. 2, pp. 36–42. URL: Link (In Russ.)
  16. Asiryan V.M., Shishkin M.O., Stepanov M.S. [Evaluation of the LTE network cell when serving elastic traffic]. Telekommunikatsii i informatsionnye tekhnologii = Telecommunications and Information Technologies, 2018, no. 1, pp. 76–82. (In Russ.)
  17. Tumbinskaya M.V., Safiullina A.M. [Decision-making information system in identifying the competences of management personnel of enterprises with different ownership forms]. Menedzhment v Rossii i za rubezhom = Management in Russia and Abroad, 2013, no. 6, pp. 105–109. (In Russ.)
  18. Tumbinskaya M.V. [Providing protection from targeted information in social networks]. Vestnik Mordovskogo universiteta = Bulletin of Mordovian University, 2017, no. 2, pp. 264–288. (In Russ.)

View all articles of issue

 

ISSN 2311-875X (Online)
ISSN 2073-2872 (Print)

Journal current issue

Vol. 15, Iss. 3
March 2019

Archive