Font Size: a A A

Research On Analysis And Scheme Design Of LTE-A System Security Vulnerabilities

Posted on:2019-05-19Degree:MasterType:Thesis
Country:ChinaCandidate:W CaoFull Text:PDF
GTID:2348330542498402Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of mobile communication technology,the development of speed and system capacity has been emphasized for a long time,while the security issues have been lagging behind with less attention.Based on a cooperation project of a domestic communications instrumentation company and a domestic safety assessment center,the thesis analyzes the Long Term Evolution-Advanced(LTE-A)system from the perspective of protocol security.Based on the analysis of the LTE-A system architecture,security mechanism and air interface protocol stack,especially the related content of 3GPP layer three protocol and NAS layer protocol standard,the thesis designs five kinds of security vulnerabilities schemes from the view of signaling flow,and uses LTE-A protocol conformance development platform to complete the coding and debugging processes of the corresponding program.Finally,the thesis verifies the correctness and feasibility of the proposed schemes based on the test results.The main work and innovation points of the thesis are as follows:First of all,the thesis summarizes the background and significance of the topics and its main researches and achievements.Combining the LTE-A system architecture and the wireless interface protocol stack,the thesis studies security mechanism,and identifies the target range of scheme design.Secondly,the thesis,based on the access process and the tracking area updating process,designs five abnormal signaling schemes,including two types of denial-of-service attack,obtaining International Mobile Subscriber Identification Number(IMSI)number,terminal redirection and terminal location leaked.Thirdly,on the LTE-A protocol conformance development platform,the hardware and software structure and the function of each module are mainly studied.With the aid of the adaptation layer and the TTCN-3 language,the study completes the corresponding test case writing requirements,including the testing procedure,parameters configuration,etc.Later,the implementation scheme is analyzed and verified.In the end,the thesis summarizes the full text and looks into the future of the project.
Keywords/Search Tags:LTE-A, protocol security analysis, TTCN-3, adapter layer, conformance testing
PDF Full Text Request
Related items