C. Interoperability
3GPP establishes the conditions to migrate security
contexts associated to an user, considering the classification
of the access network. Direct context transference is only
possible when the two technologies belong to 3GPP trusted
access networks, but for a limited period of time. UE must
be re-authenticated once the migration process is completed
without interrupt the service.
Nevertheless, multi-access and seamless mobility requires
a strong collaboration between the different operators and a
restricted interoperability policy to avoid unauthorized access
to the system. Furthermore, compatibility with legacy systems
is also an acceptance of their vulnerabilities. GSM is a clear
example of a vulnerable system, with remarkable weaknesses
identified, such as a man-in-the-middle attack (MITM) [8].
D. RRC signalling
3GPP specifications files include a few RRC signalling
messages whose transmission happens in clear-text, before
the security domain is established. These messages can be
easily sniffed, and replied towards the eNB several times to
collapse the system with a traffic-injection attack. The serving
network is unable to detect the attack and process all the
petitions, reducing the resources to attend real service request.
The attacker simulates a usual behaviour of a legitimate UE
with a direct consequence, a deny-of-service (DoS) attack [9].
E. Other threats
Being an all-IP networks makes the system vulnerable
against IP attacks, such Deny of Service (DoS) over the
public IP addresses of the core network interfaces, traffic
eavesdropping and injection attacks. Selective flooding attacks
may reduce the QoS or even cut the service of the legitimate
users.
Furthermore, physical protection over the access network
infrastructure must be considered, besides of the core-network
elements and wired connections. Specially for HeNBs, as we
pointed out above, where the devices are easily accessible by
bad-intentioned users.
IV. ALTERNATIVE SOLUTIONS
Numerous alternatives have been designed all over the
world, in order to increase the security and mitigate threats.
Most of them are focused on the AKA protocol, proposing
alternative authentication schemes to accomplish similar
functionality of EPS-AKA. Other papers re-design part of
the core-network architecture, adding new entities to manage
authentication functions or act as trusted third parties.
A solution is focused on the seamless mobility scheme,
identifying threats of the AKA protocol used for 3G/WLAN
interworking that can be extrapolated to 4G systems, as
EAP-AKA is the designed protocol in 4G interoperability.
They proposed an amendment of the EAP-AKA specified
C. Interoperability
3GPP establishes the conditions to migrate security
contexts associated to an user, considering the classification
of the access network. Direct context transference is only
possible when the two technologies belong to 3GPP trusted
access networks, but for a limited period of time. UE must
be re-authenticated once the migration process is completed
without interrupt the service.
Nevertheless, multi-access and seamless mobility requires
a strong collaboration between the different operators and a
restricted interoperability policy to avoid unauthorized access
to the system. Furthermore, compatibility with legacy systems
is also an acceptance of their vulnerabilities. GSM is a clear
example of a vulnerable system, with remarkable weaknesses
identified, such as a man-in-the-middle attack (MITM) [8].
D. RRC signalling
3GPP specifications files include a few RRC signalling
messages whose transmission happens in clear-text, before
the security domain is established. These messages can be
easily sniffed, and replied towards the eNB several times to
collapse the system with a traffic-injection attack. The serving
network is unable to detect the attack and process all the
petitions, reducing the resources to attend real service request.
The attacker simulates a usual behaviour of a legitimate UE
with a direct consequence, a deny-of-service (DoS) attack [9].
E. Other threats
Being an all-IP networks makes the system vulnerable
against IP attacks, such Deny of Service (DoS) over the
public IP addresses of the core network interfaces, traffic
eavesdropping and injection attacks. Selective flooding attacks
may reduce the QoS or even cut the service of the legitimate
users.
Furthermore, physical protection over the access network
infrastructure must be considered, besides of the core-network
elements and wired connections. Specially for HeNBs, as we
pointed out above, where the devices are easily accessible by
bad-intentioned users.
IV. ALTERNATIVE SOLUTIONS
Numerous alternatives have been designed all over the
world, in order to increase the security and mitigate threats.
Most of them are focused on the AKA protocol, proposing
alternative authentication schemes to accomplish similar
functionality of EPS-AKA. Other papers re-design part of
the core-network architecture, adding new entities to manage
authentication functions or act as trusted third parties.
A solution is focused on the seamless mobility scheme,
identifying threats of the AKA protocol used for 3G/WLAN
interworking that can be extrapolated to 4G systems, as
EAP-AKA is the designed protocol in 4G interoperability.
They proposed an amendment of the EAP-AKA specified
การแปล กรุณารอสักครู่..