Skip to main content

Long Term Evolution Network Security and Real-Time Data Extraction

  • Chapter
  • First Online:
Cyber and Digital Forensic Investigations

Part of the book series: Studies in Big Data ((SBD,volume 74))

Abstract

Long Term Evolution (“LTE”) or 4G data services are relied upon by many people to process information such as payments, VOIP and applications on their mobile devices. Today this technology is widely used and many people depend upon its security every day for all manner of tasks. GSM traffic, SMS traffic and data traffic are encrypted by the network to prevent third party access. In this paper, we are going to investigate a methodology to overcome the security restrictions of LTE network to extract data from mobile device in real-time. The outcome of this research not only assists the digital investigators to tackle the challenges of extracting relevant artefacts from suspect devices using LTE network but also allows us to evaluate the possibility of extract important data from LTE security network in real-time. We also test our approach with real-world scenarios and services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bhandari, S., et al.: Android inter-app communication threats and detection techniques. Comput. Secur. 70, 392–421 (2017)

    Article  Google Scholar 

  2. Sgaras, C., Kechadi, T., Le-Khac, N.-A.: Forensics acquisition and analysis of instant messaging and VoIP applications. Lect. Notes Comput. Sci. 8915, 188–199 (2015). https://doi.org/10.1007/978-3-319-20125-2_16

    Article  Google Scholar 

  3. Faheem, M., Le-Khac, N.-A., Kechadi, T.: Smartphone forensics analysis: a case study for obtaining root access of an android samsung S3 device and analyse the image without an expensive commercial tool. J. Inf. Secur. 5(3), 83–90 (2014). https://doi.org/10.4236/jis.2014.53009

    Article  Google Scholar 

  4. Akhtyamov, et al.: An implementation of software defined radios for federated aerospace networks. Acta Astronaut. 123, 470–478 (2016)

    Article  Google Scholar 

  5. Ramsey, B.W., et al.: Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers. Int. J. Crit. Infrastruct. Prot. 8, 27–39 (2015)

    Article  Google Scholar 

  6. Balogun, A., Zhu, S.Y.: Privacy impacts of data encryption on the efficiency of digital forensics technology. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 4(5), 36–40 (2013)

    Google Scholar 

  7. Gold, S.: Cracking wireless networks. Netw. Secur. Mag. (November 2011)

    Google Scholar 

  8. Islam, S., Ajmal, F.: Developing and implementing encryption algorithm for addressing GSM security issues. In: IEEE International Conference on Emerging Technologies. Islamabad, Pakistan (October 2009)

    Google Scholar 

  9. Hossain, A., et al.: A proposal for enhancing the security system of short message service in GSM. In: 2nd International Conference on Anti-counterfeiting, Security and Identification. Guiyang, China (November 2008)

    Google Scholar 

  10. Shan, H., Zhang, W.: Forcing a targeted LTE cellphone into unsafe network, DEFCON 24. https://www.defcon.org/html/defcon-24/dc-24-speakers.html#Shan

  11. Hussain, S., et al.: LTEInspector: a systematic approach for adversarial testing of 4G LTE. In: Network and Distributed System Security Symposium. CA, USA (February 2018)

    Google Scholar 

  12. Shaik, A., et al.: Practical attacks against privacy and availability in 4G/LTE mobile communication systems. arXiv preprint arXiv:1510.07563 (2015)

  13. Amine, F., et al.: Security for 4G and 5G cellular networks: a survey of existing authentication and privacy-preserving schemes. J. Netw. Comput. Appl. 101(1), 55–82 (2018)

    Google Scholar 

  14. Rahmann, M.G., Imai, H.: Security in wireless communication. Wireless Pers. Commun. 22, 213–228 (2002)

    Article  Google Scholar 

  15. Tas, I.M., et al.: Novel session initiation protocol-based distributed denial-of-service attacks and effective defense strategies. Comput. Secur. 63, 29–44 (2016)

    Article  Google Scholar 

  16. Tsolkas, D., Passas, N., Merakos, L.: Device discovery in LTE networks: a radio access perspective. Comput. Netw. 106, 245–259 (2016)

    Article  Google Scholar 

  17. Doppler, K., Ribeiro, C.B., Kneckt, J.: Advances in D2D communications: energy efficient service and device discovery radio. In: 2nd International Wireless conference (Wireless VITAE). Chennai, India (February 2011)

    Google Scholar 

  18. Xenakis, C., Ntantogian, C.: An advanced persistent threat in 3G networks: attacking the home network from roaming networks. Comput. Secur. 40, 84–94 (2014)

    Article  Google Scholar 

  19. Dabrowski, A., et al.: IMSI-catch me if you can: IMSI-catcher-catchers. In: 30th Annual Computer Security Applications Conference. LA, USA (December 2014)

    Google Scholar 

  20. Fajkus, M., et al.: Speech quality measurement of GSM infrastructure built on USRP N210 and OpenBTS project. Infor. Commun. Technol. Serv. 12(4) (2014)

    Google Scholar 

  21. Chow, S.S.M.: Removing escrow from identity-based encryption, public key cryptography–PKC 2009, pp. 256–276. Springer, Berlin/Heidelberg (2009)

    Google Scholar 

  22. Thantilage, R., Le Khac, N.A.: Framework for the retrieval of social media and instant messaging evidence from volatile memory. In: 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom 2019) (2019). https://doi.org/10.1109/trustcom/bigdatase.2019.00070

  23. Chen, G., Rahman, F.: Analyzing privacy designs of mobile social networking applications. In: Proceedings of 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. Washington, DC, USA (2008)

    Google Scholar 

  24. Kouwen, A., Scanlon, M., Choo, K.-K.R., Le-Khac, N.-A.: Digital forensic investigation of two-way radio communication equipment and services. Digit. Invest. 26(1), S77–S86 (2018). https://doi.org/10.1016/j.diin.2018.04.007

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neil Redmond .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Redmond, N., Tran, LN., Choo, KK.R., Le-Khac, NA. (2020). Long Term Evolution Network Security and Real-Time Data Extraction. In: Le-Khac, NA., Choo, KK. (eds) Cyber and Digital Forensic Investigations. Studies in Big Data, vol 74. Springer, Cham. https://doi.org/10.1007/978-3-030-47131-6_9

Download citation

Publish with us

Policies and ethics