語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security of Long Term Evolution (LTE...
~
The Catholic University of America.
Security of Long Term Evolution (LTE) Mobile Networks.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Security of Long Term Evolution (LTE) Mobile Networks./
作者:
Al Mazroa, Alanoud S.
面頁冊數:
1 online resource (245 pages)
附註:
Source: Dissertation Abstracts International, Volume: 77-10(E), Section: B.
Contained By:
Dissertation Abstracts International77-10B(E).
標題:
Computer science. -
電子資源:
click for full text (PQDT)
ISBN:
9781339788890
Security of Long Term Evolution (LTE) Mobile Networks.
Al Mazroa, Alanoud S.
Security of Long Term Evolution (LTE) Mobile Networks.
- 1 online resource (245 pages)
Source: Dissertation Abstracts International, Volume: 77-10(E), Section: B.
Thesis (Ph.D.)
Includes bibliographical references
The LTE (Long Term Evolution) is quickly becoming the network technology of choice for 4G deployments around the world. As user demand for mobile broadband services continues to rise, LTE and its ability to cost-effectively provide very fast, highly responsive mobile data services appears to be the right technology at the right time. However, an LTE network attacker can set up a rogue base station easily to make the victim user equipment (UE) connect to such base station and get the UEs International Mobile Subscriber Identity (IMSI) as the objective is to access sensitive information and/or create a Denial of Service (DoS). The privacy of the UE will be compromised and if there is a security vulnerability then the LTE network will not be used by the people. So this dissertation discusses the ways of protecting the LTE network against security attacks.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9781339788890Subjects--Topical Terms:
573171
Computer science.
Index Terms--Genre/Form:
554714
Electronic books.
Security of Long Term Evolution (LTE) Mobile Networks.
LDR
:04240ntm a2200349Ki 4500
001
909409
005
20180426100010.5
006
m o u
007
cr mn||||a|a||
008
190606s2016 xx obm 000 0 eng d
020
$a
9781339788890
035
$a
(MiAaPQ)AAI10117514
035
$a
(MiAaPQ)cua:10658
035
$a
AAI10117514
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
099
$a
TUL
$f
hyy
$c
available through World Wide Web
100
1
$a
Al Mazroa, Alanoud S.
$3
1180188
245
1 0
$a
Security of Long Term Evolution (LTE) Mobile Networks.
264
0
$c
2016
300
$a
1 online resource (245 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 77-10(E), Section: B.
500
$a
Adviser: Mohammad Arozullah.
502
$a
Thesis (Ph.D.)
$c
The Catholic University of America
$d
2016.
504
$a
Includes bibliographical references
520
$a
The LTE (Long Term Evolution) is quickly becoming the network technology of choice for 4G deployments around the world. As user demand for mobile broadband services continues to rise, LTE and its ability to cost-effectively provide very fast, highly responsive mobile data services appears to be the right technology at the right time. However, an LTE network attacker can set up a rogue base station easily to make the victim user equipment (UE) connect to such base station and get the UEs International Mobile Subscriber Identity (IMSI) as the objective is to access sensitive information and/or create a Denial of Service (DoS). The privacy of the UE will be compromised and if there is a security vulnerability then the LTE network will not be used by the people. So this dissertation discusses the ways of protecting the LTE network against security attacks.
520
$a
To address this issue, two different methods are proposed to preserve the sensitive information of users. First, a rogue base station identification protocol is proposed to protect UE privacy. The proposed protocol utilizes the mobile property of the UE and is designed based on the observation that a rogue base station can only cover a small area. The proposed protocol uses the measurements of UE in different locations to estimate the power and location of the base stations. The UE also tracks the signatures of each legitimate base station. If the base station is already verified by the detection protocol, then the UE connects to the base station according to LTE standard. For any new appearing base stations it sends the power of the base station and the GPS location itself to a cloud server to verify the legitimacy of the base station. The cloud server maintains a database of real base stations. The proposed protocol does not need to change existing LTE standard and no base station modification is required. The proposed protocol is implemented on NS3 LTE module and evaluated with various practical settings. The results indicate the proposed protocol can ensure that the UE can successfully detect rogue base stations and avoid sending privacy data to rogue base stations. Second, a protocol is proposed to identify fake base stations to protect user privacy. The basic idea is to synchronize to all base stations in range and collect the network IDs. Based on the fact that legitimate base stations have the same network ID that is different from fake ones, the UE can connect to the legitimate base station with the strongest power instead of any base station with the strongest power in traditional design. The proposed protocol is a UE side solution and no base station modification is required. This protocol can be deployed in the future. The proposed protocol is implemented on NS3 LTE module and evaluated with various practical settings. The results indicate the proposed protocol can ensure that the UE can always connect to the legitimate base station with the strongest power.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Computer science.
$3
573171
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0984
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
The Catholic University of America.
$b
Electrical Engineering and Computer Science.
$3
1180189
773
0
$t
Dissertation Abstracts International
$g
77-10B(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10117514
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入