(A) study on systematic security analysis of cellular network control plane procedures체계적인 이동통신 네트워크 제어 평면 보안성 분석에 관한 연구

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 83
  • Download : 0
The control plane procedures of cellular networks play a critical role in tasks such as network registration, tracking the location of user devices, and data session management, providing fast and reliable data communication, as well as voice-centric services. In the standards of cellular network technology, the control plane provides functions of mutual authentication and key agreement procedure to ensure the confidentiality and integrity of wireless communication between devices and the network. In particular, long-term evolution (LTE), is widely deployed by commercial mobile network operators to provide significantly improved security features as compared to earlier networks (e.g., the use of stronger encryption and integrity protection algorithms, the mandatory use of integrity protection in control plane procedures). However, despite these efforts to improve security and privacy, previous studies have manually uncovered vulnerabilities in control plane procedures. These vulnerabilities could be exploited by an active adversary to perform user impersonations, location tracking, and denial of service attack. As cellular networks are widely used for numerous safety-critical applications such as nation-wide emergency notification, autonomous vehicles, and railway communication, users could face a significant threat to their safety if adversaries exploit the existing vulnerabilities to disrupt the confidentiality, integrity protection, or availability of the network system. Therefore, it is crucial to identify potential security and privacy threats in both specifications and actual implementations of network components to prevent such threats in advance. In this dissertation, we present a systematic approach to analyzing both the protocol specifications and its implementations of commercial network components. First, we analyzed the standard control plane procedures by formally specifying the protocol models and verifying their secrecy and authentication properties under a reasonable adversary model. Given the attack traces from the formal verification process, we empirically evaluated their validity and potential security implications in our own practical testing framework. Second, we present a dynamic security testing methodology to effectively inspect bad practices of implementations and configurations of commercial network components. To this end, we implemented a semi-automatic testing framework with a simple decision tree logic to classify problematic cases based on open-source LTE baseband and control traffic monitoring tools. We also demonstrate all of the resultant attacks by exploiting the vulnerabilities we found in the operational networks while strictly following ethics requirements.
Advisors
Kim, Yongdaeresearcher김용대researcher
Description
한국과학기술원 :전기및전자공학부,
Publisher
한국과학기술원
Issue Date
2020
Identifier
325007
Language
eng
Description

학위논문(박사) - 한국과학기술원 : 전기및전자공학부, 2020.8,[vii, 91 p. :]

Keywords

Cellular network▼aLTE▼a5G▼aControl plane procedures▼aFormal analysis▼aDynamic testing; 이동통신▼aLTE▼a5G▼a제어평면▼a정형 분석▼a동적 보안성 분석

URI
http://hdl.handle.net/10203/295617
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=986285&flag=dissertation
Appears in Collection
EE-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0