This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8-security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures.
Report
Share
Report
Share
1 of 9
Download to read offline
More Related Content
Similar to COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
Security Models in Cellular Wireless NetworksWilliam Chipman
- Wireless networks and cellular networks are increasingly used for sensitive data transfer, raising security concerns.
- There are four main approaches to cellular network security: authentication, authorization, encryption, and physical security. Newer approaches include sandboxing on smartphones.
- As cellular and wireless networks continue integrating, new security risks emerge that require comprehensive security models across both network types.
Whenyour computer isconnected to the Internet, you expose your computer to a variety of potentialthreats. The Internet isdesigned in such a waythat if you have access to the Internet, all other computers on the Internet canconnect to yourcomputer.Thisleavesyouvulnerable to variouscommonattacks. This isespeciallytroubling as severalpopular programs open services on your computer thatallowothers to view files on your computer! Whilethisfunctionalityisexpected, the difficultyisthatsecurityerrors are detectedthatalwaysallow hackers to attackyour computer with the ability to view or destroy sensitive information stored on your computer. To protectyour computer fromsuchattacksyouneed to "teach" your computer to ignore or resistexternaltestingattempts. The commonname for such a program is Firewall. A firewall is software thatcreates a secureenvironmentwhosefunctionis to block or restrictincoming and outgoing information over a network. These firewalls actually do not work and are not suitable for business premises to maintain information securitywhilesupporting free exchange of ideas. Firewall are becoming more and more sophisticated in the day, and new features are beingadded all the time, sothat, despitecriticism and intimidatingdevelopmentmethods, they are still a powerfuldefense. In thispaper, weread a network firewall thathelps the corporateenvironment and other networks thatwant to exchange information over the network. The firewall protects the flow of trafficthrough the internet and limits the amount of external and internal information and provides the internal user with the illusion of anonymous FTP and www online communications.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Unleashing the Power of Telecom Network Security.pdfSecurityGen1
Telecommunications networks face increasing security threats as they converge with IT technologies and rely more on virtualization and third party suppliers. This exposes sensitive subscriber data and critical network functions to risk. Regulators have established guidelines for telecom supply chain security, but recent breaches show these risks are not always adequately addressed. MNOs must implement stringent security for new services like 5G roaming to properly inspect, protect, and detect threats across complex interconnections between networks.
Strengthening Your Network Against Future Incidents with SecurityGenSecurityGen1
Prevention is the cornerstone of a resilient network defense strategy. SecurityGen empowers you to take a proactive stance against potential incidents, fortifying your network against future threats. This segment outlines the proactive defense mechanisms offered by SecurityGen, highlighting how these measures can bolster your network's security posture and provide peace of mind in an ever-evolving digital landscape.
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceSecurityGen1
The digital age has redefined the way we communicate, relying on a complex network of telecommunications infrastructure to bridge distances and connect individuals, organizations, and nations. However, as the reliance on these interconnected systems grows, so does the potential for cyber threats to disrupt these vital connections. "Telecom Cybersecurity" takes center stage as the safeguarding force that strengthens the resilience of these networks against cyberattacks and breaches
Survey of Security and Privacy Issues of Internet of ThingsEswar Publications
This paper is a general survey of all the security issues existing in the Internet of Things (IoT) along with an analysis of the privacy issues that an end-user may face as a consequence of the spread of IoT. The majority of the survey is focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks has been analyzed in the paper.
Advanced Security Management in Metro Ethernet NetworksIJNSA Journal
With the rapid increase in bandwidth and the introduction of advanced IP services including voice, high-speed internet access, and video/IPTV, consumers are more vulnerable to malicious users than ever. In recent years, roviding safe and sound networks and services have been the zenith priority for service providers and network carriers alike. Users are hesitant to subscribe to new services unless service providers guarantee secure connections. More importantly, government agencies of many countries have introduced legislations requiring service providers to keep track and records of owners of IP and MAC addresses at all time. In this paper, we first present an overview of Metro Ethernet (or Ethernet-To-The-Home/Business (ETTx)) and compare with various IP broadband access technologies including DSL, wireless and cable. We then outline major security concerns for Metro Ethernet networks including network and subscriber/end user security. Next we introduce state-of-the-art algorithms to prevent attackers from stealing any IP or MAC addresses. Our proposal is to use network management in conjunction with hardware features for security management to provide a secure and spoofing-free ETTx network. The key idea behind our proposal is to utilize network management to enforce strict (port, MAC, IP) binding in the access network to provide subscriber security. The paper then proposes an adaptive policy-based security controller to quickly identify suspected malicious users, temporarily isolate them without disconnecting them from the network or validating their contracts, and then carry the required analysis. The proposed controller identifies malicious users without compromising between accurate but lengthy traffic analysis and premature decision. It also provides the ability to make granular corrective actions that are adaptive to any defined network condition.
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
The potential of wireless communications, has resulted in a wide expand of wireless networks. However, the vulnerabilities and threats that wireless networks are subjectedto resulted in higher risk for unauthorized users to access the computer networks.This research evaluates the deployed Wireless Network in Jordan as well as the use of the security setting of the systems and equipment used. Caution will be taken to avoid network access as only existence of the network is sought. Wardriving involve the use of freeware tools such as NetStumbler, or Kismet, which was originally developed to be used for helping network administrators make their systems more secure. Thestudy is carried out through field evaluation of the Wireless Local Area Network (WLAN)in light of the use of Wardriving, and proposessome measures that can be taken to improve securityof the wireless network by the users.
an overview of wireless local area networks and security systemIJAEMSJORNAL
Wireless Communication is one of the fastest growing technologies in the world which is an application of technology and science in the modern life. Radio and telephone to current devices such as mobile phone, laptops, television broadcasting are the most essential part of our life. Wireless LAN, Cellular Telephony and Satellite based communication networks are the several parts of the wireless communication industry. In this paper, we have emphasized on a study of Wireless LAN technologies and its concerned issues: Wireless Networking, What WLANs are, History of WLAN, Need of WLAN, Types of WLAN, Advantages of WLAN, IEEE 802.11 Standards, Network Security.
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
This document discusses recent developments in wireless networking and wireless security. It describes enhancements to wireless standards including 802.11ac which provides speeds up to 1 Gbps, 802.11n which provides speeds up to 600 Mbps, and research achieving speeds of 40 Gbps over 1 km. It also discusses DARPA's efforts to develop more resilient military wireless networks and Google's plans to expand wireless networks in developing areas. The document outlines various methods for securing wireless networks including using WPA2 encryption, changing default passwords, hiding the SSID, limiting DHCP assignments, and disabling remote administration.
The VLR is a database that contains temporary information about subscribers that are visiting its
serving area. The VLR is associated with one or more MSCs. When a subscriber enters a new MSC area, the
VLR associated with that MSC requests data about the subscriber from the HLR. This data is stored in the VLR
as long as the subscriber remains in the MSC area.
4.1.8 Equipment Identity Register (EIR): The EIR is a database that contains a list of all valid mobile
equipment on the network in the form of their International Mobile Equipment Identities (IMEI). The EIR is
consulted by the VLR to check if a particular mobile is allowed to be used
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
- The document summarizes a study that evaluated the security of wireless networks in Jordan through a process called "wardriving" where the researchers drove around with wireless network detection tools.
- The results found that the majority (79.52%) of wireless networks tested were unsecured and vulnerable. Most networks used either low levels of encryption (68.67%) or no encryption at all (11.45%).
- Nearly all networks broadcast the default SSID (92.17%), leaving them exposed to potential hackers since changing the SSID is a basic security precaution.
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
The document discusses security attacks on wireless sensor networks, describing various types of attacks like jamming, impersonation, replay attacks, and denial of service attacks that can occur at different layers of the network. It analyzes key security objectives for wireless sensor networks like availability, authentication, integrity, and confidentiality. The document also outlines the architecture of wireless sensor networks, including the five layers of the OSI model and three cross-layer planes, and components of sensor nodes.
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIJNSA Journal
This paper is mainly based on providing security to the wireless networks through which devices like
Bluetooth gets connected. The Wi-Fi connections are also prone to various attacks these days. The
protocols that are required to provide security to wireless networks can be implemented by creating a
wireless scenario using the software Network Simulator. This paper illustrates a scenario to check the
security protocol. As NS2 mainly has the implementation of routing protocols, a new protocol should be
designed especially for security purpose. This is done by following many tutorials to get a minimum basic
knowledge of NS2, C/C++ coding. The security feature followed in the paper is encryption/decryption of
the data that is being exchanged. Data should be ensured as and then there will be a perfect
implementation of the protocol. So, the paper throughout concentrates on adding a new security protocol to
NS2 and implementation of that protocol by providing a wireless scenario.
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IJNSA Journal
This paper is mainly based on providing security to the wireless networks through which devices like Bluetooth gets connected. The Wi-Fi connections are also prone to various attacks these days. The protocols that are required to provide security to wireless networks can be implemented by creating a wireless scenario using the software Network Simulator. This paper illustrates a scenario to check the security protocol. As NS2 mainly has the implementation of routing protocols, a new protocol should be designed especially for security purpose. This is done by following many tutorials to get a minimum basic
knowledge of NS2, C/C++ coding. The security feature followed in the paper is encryption/decryption of the data that is being exchanged. Data should be ensured as and then there will be a perfect implementation of the protocol. So, the paper throughout concentrates on adding a new security protocol to NS2 and implementation of that protocol by providing a wireless scenario.
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
Determination of the position enables location awareness for mobile computers in any place and persistent wireless computing. In addition utilizing location information, location aware computers can render location based services possible for mobile users. In order to design and implement a technique to identify the source network interface card, a feasibility study should be done to keep the project within the budget; also tracking of new technologies will enhance the methodology of choosing these techniques. Wireless Local Area Network (WLAN) is vulnerable to malicious attacks due to their shared medium in unlicensed frequency spectrum, thus requiring security features for a variety of applications. This paper will discuss a technique that helps in determining the best location for access points using GPS system, in order to choose the optimal number of them; which guide to localize and identify attacks with optimal IDS method and cheapest price. The other thing is to locate the intruder within the monitored area by using a hybrid technique, which came from exist techniques, by focusing on the advantages of these techniques and come with a new one to give more accurate results with less price by using available resources
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...IRJET Journal
1) The document proposes a technique to detect and prevent rogue relay node attacks in 4G multihop wireless networks using a QoS-aware distributed security architecture based on Elliptic Curve Diffie-Hellman (ECDH) algorithm.
2) It generates a 4G multihop WiMAX network and implements ECDH for secure initial connection setup and authentication. It then generates a rogue node attack and uses ECDH's hop-by-hop authentication to detect the rogue node.
3) The architecture prevents the detected rogue node and forwards messages securely to the destination node. It evaluates the scheme's performance on QoS metrics like latency, jitter and packet loss rate.
In our research work we are improving the performance of mobile ad hoc networks under jamming attack by using an integrated approach. The proposed work includes a network with high mobility, using IEEE Along g standard jamming attacks and countermeasures in wireless sensor networks
Similar to COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS (20)
Conservation of Taksar through Economic RegenerationPriyankaKarn3
This was our 9th Sem Design Studio Project, introduced as Conservation of Taksar Bazar, Bhojpur, an ancient city famous for Taksar- Making Coins. Taksar Bazaar has a civilization of Newars shifted from Patan, with huge socio-economic and cultural significance having a settlement of about 300 years. But in the present scenario, Taksar Bazar has lost its charm and importance, due to various reasons like, migration, unemployment, shift of economic activities to Bhojpur and many more. The scenario was so pityful that when we went to make inventories, take survey and study the site, the people and the context, we barely found any youth of our age! Many houses were vacant, the earthquake devasted and ruined heritages.
Conservation of those heritages, ancient marvels,a nd history was in dire need, so we proposed the Conservation of Taksar through economic regeneration because the lack of economy was the main reason for the people to leave the settlement and the reason for the overall declination.
Online music portal management system project report.pdfKamal Acharya
The iMMS is a unique application that is synchronizing both user
experience and copyrights while providing services like online music
management, legal downloads, artists’ management. There are several
other applications available in the market that either provides some
specific services or large scale integrated solutions. Our product differs
from the rest in a way that we give more power to the users remaining
within the copyrights circle.
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...IJAEMSJORNAL
This study aimed to profile the coffee shops in Talavera, Nueva Ecija, to develop a standardized checklist for aspiring entrepreneurs. The researchers surveyed 10 coffee shop owners in the municipality of Talavera. Through surveys, the researchers delved into the Owner's Demographic, Business details, Financial Requirements, and other requirements needed to consider starting up a coffee shop. Furthermore, through accurate analysis, the data obtained from the coffee shop owners are arranged to derive key insights. By analyzing this data, the study identifies best practices associated with start-up coffee shops’ profitability in Talavera. These findings were translated into a standardized checklist outlining essential procedures including the lists of equipment needed, financial requirements, and the Traditional and Social Media Marketing techniques. This standardized checklist served as a valuable tool for aspiring and existing coffee shop owners in Talavera, streamlining operations, ensuring consistency, and contributing to business success.
OCS Training Institute is pleased to co-operate with
a Global provider of Rig Inspection/Audits,
Commission-ing, Compliance & Acceptance as well as
& Engineering for Offshore Drilling Rigs, to deliver
Drilling Rig Inspec-tion Workshops (RIW) which
teaches the inspection & maintenance procedures
required to ensure equipment integrity. Candidates
learn to implement the relevant standards &
understand industry requirements so that they can
verify the condition of a rig’s equipment & improve
safety, thus reducing the number of accidents and
protecting the asset.
20CDE09- INFORMATION DESIGN
UNIT I INCEPTION OF INFORMATION DESIGN
Introduction and Definition
History of Information Design
Need of Information Design
Types of Information Design
Identifying audience
Defining the audience and their needs
Inclusivity and Visual impairment
Case study.
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...YanKing2
Pre-trained Large Language Models (LLM) have achieved remarkable successes in several domains. However, code-oriented LLMs are often heavy in computational complexity, and quadratically with the length of the input code sequence. Toward simplifying the input program of an LLM, the state-of-the-art approach has the strategies to filter the input code tokens based on the attention scores given by the LLM. The decision to simplify the input program should not rely on the attention patterns of an LLM, as these patterns are influenced by both the model architecture and the pre-training dataset. Since the model and dataset are part of the solution domain, not the problem domain where the input program belongs, the outcome may differ when the model is trained on a different dataset. We propose SlimCode, a model-agnostic code simplification solution for LLMs that depends on the nature of input code tokens. As an empirical study on the LLMs including CodeBERT, CodeT5, and GPT-4 for two main tasks: code search and summarization. We reported that 1) the reduction ratio of code has a linear-like relation with the saving ratio on training time, 2) the impact of categorized tokens on code simplification can vary significantly, 3) the impact of categorized tokens on code simplification is task-specific but model-agnostic, and 4) the above findings hold for the paradigm–prompt engineering and interactive in-context learning and this study can save reduce the cost of invoking GPT-4 by 24%per API query. Importantly, SlimCode simplifies the input code with its greedy strategy and can obtain at most 133 times faster than the state-of-the-art technique with a significant improvement. This paper calls for a new direction on code-based, model-agnostic code simplification solutions to further empower LLMs.
A brief introduction to quadcopter (drone) working. It provides an overview of flight stability, dynamics, general control system block diagram, and the electronic hardware.
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...IJAEMSJORNAL
This study primarily aimed to determine the best practices of clothing businesses to use it as a foundation of strategic business advancements. Moreover, the frequency with which the business's best practices are tracked, which best practices are the most targeted of the apparel firms to be retained, and how does best practices can be used as strategic business advancement. The respondents of the study is the owners of clothing businesses in Talavera, Nueva Ecija. Data were collected and analyzed using a quantitative approach and utilizing a descriptive research design. Unveiling best practices of clothing businesses as a foundation for strategic business advancement through statistical analysis: frequency and percentage, and weighted means analyzing the data in terms of identifying the most to the least important performance indicators of the businesses among all of the variables. Based on the survey conducted on clothing businesses in Talavera, Nueva Ecija, several best practices emerge across different areas of business operations. These practices are categorized into three main sections, section one being the Business Profile and Legal Requirements, followed by the tracking of indicators in terms of Product, Place, Promotion, and Price, and Key Performance Indicators (KPIs) covering finance, marketing, production, technical, and distribution aspects. The research study delved into identifying the core best practices of clothing businesses, serving as a strategic guide for their advancement. Through meticulous analysis, several key findings emerged. Firstly, prioritizing product factors, such as maintaining optimal stock levels and maximizing customer satisfaction, was deemed essential for driving sales and fostering loyalty. Additionally, selecting the right store location was crucial for visibility and accessibility, directly impacting footfall and sales. Vigilance towards competitors and demographic shifts was highlighted as essential for maintaining relevance. Understanding the relationship between marketing spend and customer acquisition proved pivotal for optimizing budgets and achieving a higher ROI. Strategic analysis of profit margins across clothing items emerged as crucial for maximizing profitability and revenue. Creating a positive customer experience, investing in employee training, and implementing effective inventory management practices were also identified as critical success factors. In essence, these findings underscored the holistic approach needed for sustainable growth in the clothing business, emphasizing the importance of product management, marketing strategies, customer experience, and operational efficiency.
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
1. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
DOI : 10.5121/ijnsa.2015.7205 61
COMPREHENSIVE SURVEY OF POSSIBLE
SECURITY ISSUES ON 4G NETWORKS
Sumant Ku Mohapatra1
, BiswaRanjan Swain1
and Pravanjan Das1
Department of Electronics & Telecommunication Engineering, Trident Academy of
Technology, Bhubaneswar,Odisha, India
Ericson Global private limited, Kolkata, India
ABSTRACT:
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a
number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and
their design decisions. Second, the security of 4G architecture with next generation network security and 8-
security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed.
Finally, we proposed four layer security model which manages to ensure more secure packets transmission
by taking all the necessary security measures.
KEYWORDS
Network security, Security architecture, 4G, 3GPP, WiMAX, Threats
1.INTRODUCTION
The recent advances in wireless network technologies and the rising applications as web 2-0,
mobile TV and streaming content led to the standardization of the 3rd generation partnership
project (3GPP). The next generation wireless communication systems world wide standardized as
4G which has increased security and very much reliable communication. In terms of architectural
design 4G is more interoperability across the HetNet environments and also it is operate on the
TCP/IP architectural design procedure[3].When 3rd generation communication is moving to the
4th generation communication, many organizations are repairing for their 4G such as
IEEE802.16m, International Telecommunication union (ITU), Vodafone, China mobile
communications and many next generation mobile network vendors like Motorola and
Samsung[2]. Now a days many definitions of 4G arises which provides a bandwidth of 1000
Mbps in mobile equipment and in normal 1Gbps. It is surrounding with heterogeneous networks
having number of Radio Access Technology and Radio Access network[1]. The enabling
technologies which is interconnected for 4G are orthogonal frequency division multiplexing,
vertical handover protocols and in advance multiple input and multiple output and cognitive radio
network are also included. Table 1 shows main threads and risk and design decisions of 4G is
given below.
2. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
62
Table-1-4G Main threats and risk and their design decisions
This paper studies different security issues and challenges in 4G technologies in section 3. The
Remainder of this paper is organized as follows. Section 2 discuss 4G network technology
architecture[7].Section 4 proposed a four layer security model which manages to ensure more
secure packet transmission by taking all the necessary security measures such as taking the form
of intrusion detection systems, Firewalls and IPsec and manipulating network resources in an
intelligent manner using sophisticated authentication protocols.
2. 4G NETWORK ARCHITECTURE
The 4G network architecture is combination of multiple heterogeneous networks such as WiMAX
and 3G[8]. Among the multiple access networks, anyone can used by the service subscriber and
also it provides services from the same service unit like the IP Multimedia subsystems. Figure 1
shows aIMT-advanced 4G network system specified in ITU.
3. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
63
Figure 1: IMT-advanced 4G network system specified in ITU
The Wimax architecture has an access serving network to provide the service stations or mobile
stations which is a connection to network service provider. But the 3GPP LTE architecture has
two core networks such as GPRS and EPC network. The GPRS core network offer network
connections for existing RANs and Evolved packet core network to give network connections to
evolved RAN and 3 GPP IP Access.
2.1 IP Multimedia subsystem security architecture
The IMS (IP Multimedia subsystems) is an important overlay on top of the network infrastructure
like 3 GPP. It aims to protect the all IMS sessions in between the end-users and IMS servers. It
also offering it’s authentication and authorization mechanisms. There are two parts of IMS
security and are described below.
• First-hop Security: It secures the first hop from the end-user to the proxy-call session
control function.
• Network domain security: It protects the rest of hops between call session control
functions inside IME core.
2.2 Next Generation network security architecture
The next generation network security mostly secures the IMS security. It divided in to two
security domains.
4. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
64
• Access view security: it secures the first hop for the end-user device to access the
network.
• Core view security: It covers security within intra operated domain.
2.3 8-Security dimensions of 4G Network
The 8-security dimensions take care to measures implemented to counter threats and potential
attacks.
Figure 2: 8-Security dimension analysis
• Access control which measures protection level against unauthorized use of network
resources.
• Authentication which measures confirmation level for the identities of each entity using
the network.
• Non-repudiation which prove the origin of the data or identifies the cause of an event or
action.
• Data confidentiality is to ensure that data is not disclosed to unauthorized users.
• Communication security is to allow information to flow only between authorized end
points.
• Data integrity is to ensure the accuracy of data so it can be modified, deleted, created or
replicated without authorization and also provides an indication of unauthorized attempts
to change the data.
• Availability is to ensure that there is no denial of authorized access to network elements,
stored information, Information flows, services and applications due to network-
impacting events.
5. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
65
• Privacy is to provide for the protection of information that could be derived from the
observation of network activities.
3. 4G WIRELESS SECURITY ISSUES
3.1 Physical layer issues
Both WIMAX and LTE are subject to two key vulnerabilities at the physical layer. By
deliberately inserting man-made interference on to a medium, a communication system can stop
functioning due to a high signal-to-noise ratio. There are two types of interference that can be
carried out: (i) noise (ii) multicarrier. Noise interference can be performed using white Gaussian
noise (WGN). In the case of Multi-carrier interference, the attacker identifies carriers used by the
system and injects a very narrowband signal on to those carriers[4]. Interference attacks can be
easily carried out as the equipment and knowledge to carry out such attacks are widely available.
Our analysis indicates that interference is easy to detect using radio spectrum monitoring
equipments. Using radio-direction-finding tools, the interfering source can be traced[1]. In
addition, increasing the power of the source signal and using spreading techniques can increase
it’s resilience against interference. While the possibility of interference is significant, since it is
easy to detect and address, we believe it’s impact on the WIMAX/LTE network and users will be
limited[13].
3.2 WiMAX-MAC-Layer security issues
To establish initial access with base station then IEEE802.16[11] Radio interface standard
describes several steps in order for a mobile station, that includes seven steps.The steps are initial
ranging and time synchronization, upper level parameter acquisition, basic capabiliiities
negotiation, scanning and synchronization, mobile station authorization and key exchange,
registration with the serving base station and the last step by which connection established.
Among these steps five step involved non secure traffic and two other two steps involved secure
traffic exchange based on the device authentication standards of Wi-max[6].
3.3 Denial of service security issues
The DoSattack are a concern for Wi-max network. These attack can be initiated through simple
flooding attacking on authenticated management frames[2].
3.4 Wi-Fi security issues
Wireless LANs based on WI-FI technology have been available for more than a decade.
However, the WI-Fi technology has most often been used in homes and public places such as
airports, hostels, and shopping malls where security is seeming less critical, although the cost
benefits of Wi-Fi could be attractive to enterprise environments thanks to increased mobility,
lower operational costs, and flexibility. Accordingly, security researchers have focused on
security threats and solutions in Wi-Fi networks to make it applicable to the enterprise
6. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
66
environments. The original security mechanism of Wi-Fi called wired equivalent privacy (WEP),
had a number of security flaws arising from the mis-application of cryptography, e.g. the use
of RC4 stream cipher and CRC-32 authentication[3]. Regarding this, a comprehensive security
evaluation based on the ITU-T X.805 standard has been performed[9].To remedy the security
flaws of Wi-Fi, several solutions have been proposed. The Robust Security Network (RSN) for
the IEEE 802.Ix standard’s port based network access control is a layer-2 authentication
mechanism and specifies how EAP can be encapsulated in the Ethernet frames. RSA Laboratory
and Cisco have developed TKIP to mitigate the weakness of RC4 via frequent renewal of
encryption key[5].
3.5. Possible Threats on 4G
The 4G may face lot of possible security Risks. The various heterogeneous technologies access
the infrastructure, so potential security needed to secure technologies . Also it may collapse of the
entire network infrastructure when multiple service providers share the core network
infrastructure. In 4G wireless , end-user equipments can also become a source of malicious
attacks worms, viruses, calls and spam mails and so on. The spam over internet, the new spam for
VoIP results a serious problem like the today’s E-mail spam[2]. As like the above VoIP threats
other 3 more VoIP Threats are (1) spoofing that misdirects communications, modifies data, or
transfers cash from a stolen credit card number. (2) Standard input point registration hijacking
that substitutes the IP address of packet header with attacker’s own. (3)Dropping of private
conversation that intercepts and CRYPT arises IP packets.
4. PROPOSED 4G FOUR LAYER SECURITY MODEL
The proposed 4 layer security model integrated into the two frameworks, peripheral and core
which allows to explore new security concepts. In this model 3 separate security layers such as
network architecture security, network transport security and service and application security are
used. It is designed to provide coherent heterogeneous communication on a global scale and it
also provide continuous connectivity through the seem less operation of multiple mobile
networks. These are accessible by mobile nodes, providing features like cognitive radio and
vertical handover.
7. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
67
Peripheral network
Core network
Figure 3-Proposed four layer security model which is integrated in to the two frameworks
In this proposed model two frame works are used.
• Peripheral frame work which runs on the mobile node and interacts with wireless
access networks.
• Core framework which runs in a distributed fashion in the core infrastructure.
By this double organized frame work, a multi layer security system arises that interacts with
those two frameworks to provide a secure environment.
8. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
68
5. CONCLUSION
To better understand the security of 4G network we represent their different security accepts like
physical layer issues, WiMAX-MAC layer issues, QoS issues and 4G Wi-Fi security issue. This
study also discussed 8-security dimension of 4G network and represent possible threats on 4G.
By the proposed four layer security model we try to avoid unsecureness of next generation
wireless communication.
REFERENCES
[1] N. Borisov, I. Goldberg, and D. Wagner, “Intercepting Mobile Communications: The Insecurity of
802.11,” Proceedings of ACM MobiCom’2001, Rome, Italy, July 2001.
[2] T. Park, H. Wang, M. Cho, and K. G. Shin, “Enhanced Wired Equivalent Privacy for IEEE 802.11
Wireless LANs,” CSE-TR-469-02,University of Michigan, November 2002, available from
http://www.eecs.umich.edu/techreports/cse/02/CSE-TR-469-02.pdf.
[3] Bell Labs, “The Bell Labs Security Framework: Making the Case for End-to-End Wi-Fi Security,”
2006.
[4] IEEE Draft 802.1x/D1, “Port Based Network Access Control,” available from
http://www.ieee802.org/1/mirror/8021/docs99/PortNACIEEE.pdf.
[5] I.S. Comsa et al., “Reinforcement Learning Based Radio Resource Scheduling in LTE-Advanced,”
Proc. 17th Int’l Conf. Automation and Computing (ICAC 11), IEEE, 2011,pp. 219–224.
[6] J. Berkmann et al., “On 3G LTE Terminal Implementation—Algorithms,ComplexitiesAnd
Challenges,” Proc. Int’l Wireless Communications andMobile Computing Conf. (IWCMC 08), IEEE,
2008; doi:10.1109/IWCMC.2008.168
[7] Z. Shi et al., “Layered Security Approach in LTE and Sim-ulation,” Proc. 3rd Int’l Conf.Anti-
counterfeiting, Security,and Identification in Communication (ASID 09),
IEEE,2009;doi:10.1109/ICASID.2009.5276930.
[8] C. Vintila, V. Patriciu, and I. Bica, “Security Analysis of LTE Access Network,” Proc.10th Int’l Conf.
Networks (ICN 11), Int’l Academy, Research, and Industry Assoc.,2011, pp. 29– 34.
[9] Network Architecture, tech. specification 3GPP TS 23.002 V9.1.0, 3GPP, 2009.
[10] D. Forsberg, LTE Security, John Wiley, 2013.
[11] H. Mun, K.Han, and K. Kim, “3G-WLAN Interwork-ing: Security Analysis and New Authentication
and Key Agreement Based on EAP-AKA,” Wireless Telecommunications Symp.(WTS 2009), IEEE,
2009; doi:10.1109/ WTS.2009.5068983.
[12] N. Seddigh et al., “Security Advances and Challenges in 4G Wireless Networks,” Proc..8th Conf.
Privacy Security and Trust (PST 10), 2010,IEEE; doi:10.1109/PST.2010.5593244
[13] L. Huang et al., “Performance of Authentication Protocols in LTE Environments,”;Proc.Int’l Conf.
Compu-tational Intelligence and Security (CIS 09), IEEE, 2009. doi:10.1109/CIS.2009.50
[14] L. Hui and B. Shuo, “Research and Implementation of LTE NAS Security,” Proc. Int’l .
doi:10.1109/ICEIT.2010.5607551
[15] 3G Security: Security Threats and Requirements, tech. specification TS 21.133, 3GPP,2001. Conf.
Educational and Information Technology (ICEIT 10), IEEE, 2010;
9. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
69
Authors
Sumant Ku Mohapatra is working as Assistant Professor in Trident Academy of
Technology, Bhubaneswar affiliated to B.P.U.T, Odisha, India. His research interests
include wireless communication, digital signal processing, image processing and optical
fiber communication
BiswaRanjan Swain is working as Assistant Professor in Trident Academy of
Technology; Bhubaneswar affiliated to B.P.U.T, Odisha, India. His areas of research
interests are in satellite & wireless communication, digital image processing and optical
fiber communication .
Pravanjan Das worked in Trident Academy of Technology, B.P.U.T, Bhubaneswar,
Odisha, India as an Assistant Professor. His research interest is in wireless communication.
Now he is working in Ericsson India Global Services Pvt. Ltd, Kolkata, India