Research Article

Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment

Table 2

Studies on LTE protocol security.

LTEInspector [5]LTE layer 2 vul. [6]LTEFuzz [7]

Analysis target protocolNAS (attach, paging, detach)MAC and PDCPRRC and NAS
ApproachModel-based adversarial approachManual analysisSemi-automatic fuzzing
PrerequisiteAdversarial model construction[Fingerprinting attack] websites metadata acquisitionBuilding pack DB for fuzzing
Security property definition[aLTEr attack] deleting victim’s DNS and http cacheTargeting TMSI acquisition
ConsManually prepare the prerequisitesProposing the results in experimental environmentNo protocol interaction for fuzzing
[Fingerprinting attack] low website coverageGenerated fuzzing message simply by packet field mutation
[aLTEr attack] unrealistic prerequisite