Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization Based on the Standard Platform

Author(s):
Message:
Article Type:
Research/Original Article (دارای رتبه معتبر)
Abstract:
Both Long-Term Evolution (LTE) and Long-Term Evolution Advanced (LTE-A) technologies have been designed to provide fourth-generation telecommunications and high-speed broadband Internet access,   although it was LTE-A that ultimately supported the requirements for the fourth generation of telecommunication systems, and is accepted as the 4G. The specifications for 4G networks were released over the years by 3rd Generation Partnership Project (3GPP). The main objective for the 4G network is providing IP-based capabilities such as high network speed, high network capacity, and voice and data  support through unifying the existing mobile networks and creating a central and global IP-based network. Due to the unique features of the LTE networks, there exist new challenges in designing their network mechanisms, which have consequently resulted in network security vulnerabilities. This article is the result of years of research on LTE network and its security and vulnerability analysis, as well as the feasibility of localizing the network security based on the standard platform. In this article, initially an overview of the LTE/SEA system structure is provided, and the sectors involved with network security are outlined. Then, the authentication process, protocols setup, and key agreement between different sectors of the network are described and analyzed specifically for LTE networks. Afterwards, considering the significance of specific key management in this type of network, its advantages and disadvantages are examined. Furthermore,  security pathology of this network is described with a comprehensive outlook and finally, the feasibility of LTE network localization based on the standard platform is investigated. The localization results presented as a table at the end of the article are obtained through 3GPP standards analysis, investigation of all    common protocols for different sectors of the network, and the feasibility study of localization capacity while maintaining compliance with the standard. This table is crucial in terms of network security, and demonstrates the localization capacities within the network structure accurately.
Language:
Persian
Published:
Journal of Electronic and Cyber Defense, Volume:7 Issue: 2, 2019
Pages:
121 to 132
magiran.com/p2007919  
دانلود و مطالعه متن این مقاله با یکی از روشهای زیر امکان پذیر است:
اشتراک شخصی
با عضویت و پرداخت آنلاین حق اشتراک یک‌ساله به مبلغ 1,390,000ريال می‌توانید 70 عنوان مطلب دانلود کنید!
اشتراک سازمانی
به کتابخانه دانشگاه یا محل کار خود پیشنهاد کنید تا اشتراک سازمانی این پایگاه را برای دسترسی نامحدود همه کاربران به متن مطالب تهیه نمایند!
توجه!
  • حق عضویت دریافتی صرف حمایت از نشریات عضو و نگهداری، تکمیل و توسعه مگیران می‌شود.
  • پرداخت حق اشتراک و دانلود مقالات اجازه بازنشر آن در سایر رسانه‌های چاپی و دیجیتال را به کاربر نمی‌دهد.
دسترسی سراسری کاربران دانشگاه پیام نور!
اعضای هیئت علمی و دانشجویان دانشگاه پیام نور در سراسر کشور، در صورت ثبت نام با ایمیل دانشگاهی، تا پایان فروردین ماه 1403 به مقالات سایت دسترسی خواهند داشت!
In order to view content subscription is required

Personal subscription
Subscribe magiran.com for 70 € euros via PayPal and download 70 articles during a year.
Organization subscription
Please contact us to subscribe your university or library for unlimited access!