Font Size: a A A

Analysis And Implementation Of Vulnerability In LTE-A Communication Network

Posted on:2022-09-07Degree:MasterType:Thesis
Country:ChinaCandidate:X L WuFull Text:PDF
GTID:2518306575968389Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the update and iteration of mobile communication technology and the popularization of smart phones,people's demand for using wireless mobile communication networks has expanded from voice services and short message services to various fields such as interpersonal communication,mobile payment,and mobile banking.Because the interactive information needs to be transmitted through the air interface,the openness of the air interface makes the information vulnerable to various attacks during the transmission process.Long Term Evolution-Advanced(LTE-A)is currently the mainstream of mobile communication technology,and its security issues have received extensive attention from research organizations at home and abroad.This thesis focuses on the analysis of 3GPP related protocol standards and combined with the actual needs of the project,in-depth research on paging vulnerabilities,pseudo base station attacks,and man-in-the-middle attacks.In the LTE-A live network environment,the design and verification of the vulnerability attack scheme was completed,and the test results met the project requirements.The main work and innovations of this thesis are as follows:1.Focus on the paging related process and find that the terminal location will be leaked when the terminal uses a certain temporary identity for a long time and sends a silent short message to the target terminal with a specific rule.On the basis of obtaining target terminal location information and paging privacy information,complete the design of the target terminal International Mobile Subscriber Identity(IMSI)information cracking scheme.After obtaining the IMSI of the target terminal,a new type of denial of service attack scheme was designed based on the loopholes in the 3GPP protocol.2.Through the man-in-the-middle research and analysis of Global System for Mobile Communication(GSM),the problem of man-in-the-middle attacks in the LTE-A environment is discussed.This article aims to replace the target terminal with the manin-the-middle terminal to complete the signaling interaction with the commercial network.A man-in-the-middle attack scheme in a network environment.3.Four vulnerability attack schemes are designed from the perspective of live network deployment and signaling process,and the security problems that may be caused by the vulnerability attack scheme are tested in the live network: Target terminal location;cracking target The IMSI information of the terminal;Make the target terminal unavailable for service;Complete the man-in-the-middle attack under the LTE-A network based on the man-in-the-middle of the GSM network;the test results verify the correctness of the relevant vulnerabilities and the design of the attack scheme.Aiming at the new denial of service attack,this paper proposes a defense plan and a targeted mitigation plan.The simulation results show that the targeted mitigation plan can greatly increase the difficulty of the attacker's attack.
Keywords/Search Tags:LTE-A, communication security, paging vulnerability, pseudo base station
PDF Full Text Request
Related items