Αξιολόγηση Ασφάλειας 3GPP LTE - Femtocell Home evolved Node B - (HeNB)
View/ Open
Subject
Συστήματα ασύρματων επικοινωνιών ; Συστήματα κινητής επικοινωνίας ; Τηλεπικοινωνιακά συστήματα -- Μέτρα ασφαλείας ; Wireless communication systems ; Mobile communication systems ; Telecommunication systems -- Security measuresAbstract
The safety of mobile communications in its infancy was not something that directly employed providers, the cost was great and any malicious action be considered difficult on proprietary voice networks. This has changed, the mobile networks are becoming the most dominant data networks, with the gradual elimination of hierarchical architectures and the convening of the IP architecture, using sophisticated technological standards such as LTE and LTE-Advanced. The convening of this alongside the penetration of "smart" widgets on the mobile communications market, have led to the rapid growth of malware and attacks against vulnerabilities of networks with a view to tapping conversations, preventing credential modification but communications and other types of attacks. The interest of this thesis focuses on weaknesses and vulnerabilities identified in the security architecture of LTE Femtocells. Talking about the piece of architecture that is untrustworthy and is exposed to threats or combination of threats. The aim is to identify threats/vulnerabilities, but also the processes which form the countermeasures for treating and protecting against them. Even an attempt to group the potential threats, be classified in relation to their risk and to propose specific ways to tackle them. The structure of the work is as follows: In chapter one becomes an introductory time approach to mobile networks from the first generation (1G) mobile communications, up to the present time, with the development of the fourth generation (4G) mobile communications to be at the technological forefront. Important historical model is GSM (second generation-2G) which marked the beginning of the widespread development of mobile telecommunications. The scepters of second generation takes the UMTS (third generation-3G) where new features were added by improving existing networks. Formed the basis for the template on which this paper is based and is LTE (Long Term Evolution). Makes a reference to the basic features of earlier points of technologies GSM, UMTS, insisting on weaknesses that needed to be addressed but also the advantages that have continued their operation and in LTE. End note how necessary and urgent is the need for network security both on the part of providers and the services they offer, as well as from the side of customers/users. In chapter two it becomes a reference to standard LTE - (Long Term Evolution), with emphasis on the security architecture. Identify the major components of the system (trunk and access) and examined from the standpoint of security. The third chapter refers to the condition of Femtocell, on the grounds that becomes an attraction for more and more providers, what are the advantages and the difficulties encountered in using them and why it is necessary to separate study of safety issues that arise. Finally, there is a reference to the basic principles of security and methods of dealing with threats presented in a Femtocell, and a separation of the 3G UMTS security architectures Femtocell and LTE Femtocell. The fourth chapter focuses extensively on security architecture of LTE Femtocell, covering all entities involved in the emergence of non-trusted data, i.e. the affected parties that anyone can take advantage and benefit accordingly. Describes the characteristics, processes and security mechanisms and requirements. The fifth chapter focuses in greater detail on threats against HeNB, while assessing the danger posed by the network from the perspective of the provider, and the user.