DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Kim, Yongdae | - |
dc.contributor.advisor | 김용대 | - |
dc.contributor.author | Lee, Eunkyu | - |
dc.date.accessioned | 2019-09-04T02:40:26Z | - |
dc.date.available | 2019-09-04T02:40:26Z | - |
dc.date.issued | 2019 | - |
dc.identifier.uri | http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=843414&flag=dissertation | en_US |
dc.identifier.uri | http://hdl.handle.net/10203/266721 | - |
dc.description | 학위논문(석사) - 한국과학기술원 : 전기및전자공학부, 2019.2,[iv, 29 p. :] | - |
dc.description.abstract | Compare to previous cellular network generation, Long Term Evolution (LTE) has achieved significant improvements in terms of security aspect. Especially in the Radio Access Network (RAN), even though LTE RAN is designed with security awareness, there have been a number of previous researches that try to uncover under-explored vulnerabilities that could exist across the entire LTE RAN. However, while there have been many previous researches analyzing the security requirements on the protocols used in LTE RAN, some limitations still exist. First, while many previous researches have been focused on vulnerabilities in the network layer (Layer 3) and physical layer (Layer 1), there have been a few studies focusing on data link layer (Layer 2). The second limitation is that even in the previous security analysis of layer 3, while most of the studies focus on protocol (e.g., RRC, NAS) conformance tests which check whether the LTE components handle the abnormal inputs properly, there is no systematic security analysis awaring the entire flow of the control plane protocol. Motivated by the fact that systematic approach on both layer 2 and layer 3 of the control protocol in RAN is still under-explored, we investigated potential vulnerabilities across the layer with awareness of the flow of the control plane procedure. We use an empirical approach to examine the vulnerabilities on LTE layer 2 protocol, and perform a stateful downlink fuzzing to find misimplementation issues for LTE layer 3 protocol. As a result, we found several vulnerabilities in each layer which are either previously discovered or unknown. Next, based on the results, we could successfully conduct PoC attacks in realistic setup which are not shown in previous researches. | - |
dc.language | eng | - |
dc.publisher | 한국과학기술원 | - |
dc.subject | Random access▼aradio access network▼acellular network▼asecurity▼aNAS▼aRRC | - |
dc.subject | 제어 평면▼a보안 취약점▼a이동통신망▼a퍼징▼a초기 접속 | - |
dc.title | (A) study on the protocol vulnerability of LTE radio access network | - |
dc.title.alternative | 이동통신 무선 구간 프로토콜 취약점에 관한 연구 | - |
dc.type | Thesis(Master) | - |
dc.identifier.CNRN | 325007 | - |
dc.description.department | 한국과학기술원 :전기및전자공학부, | - |
dc.contributor.alternativeauthor | 이은규 | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.