Abstract
The access network is the most important part of the 4G mobile communication network, connecting user equipment with E-UTRAN Node B. Several mechanisms are designed for the protection of this connection, but the access network still suffers from man-in-the-middle (MITM) problem, which is one of traditional network security threats, causing privacy leak and data tampering. This paper proposes a new protection method against the MITM problem of 4G access network. By analyzing the feature of this problem, we find out the difference between regular connection and MITM connection and use this as a signal of suffering MITM attack. Besides, we discover the potentiality for the MITM model in the 4G access network which can be used to build a compliance detection system in a more privacy-friendly way. Finally, several experiments have been accomplished to verification of the protection method and compliance detection system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wu, T., Gong, G.: The weakness of integrity protection for LTE. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (2013)
Rupprecht, D., et al.: Breaking LTE on layer two. In: 2019 IEEE Symposium on Security and Privacy (SP). IEEE (2019)
Rupprecht, D., et al.: IMP4GT: IMPersonation Attacks in 4G NeTworks. NDSS (2020)
Shaik, A., et al.: New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities. Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks (2019)
Cheng, Z., et al.: Watching your call: breaking VoLTE privacy in LTE/5G networks. arXiv preprint arXiv:2301.02487 (2023)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Chen, Z., Cui, B., Cheng, Z. (2024). 4G Access Network Protection and Compliance Detection Based on Man-in-the-Middle Model. In: Barolli, L. (eds) Advances in Internet, Data & Web Technologies. EIDWT 2024. Lecture Notes on Data Engineering and Communications Technologies, vol 193. Springer, Cham. https://doi.org/10.1007/978-3-031-53555-0_38
Download citation
DOI: https://doi.org/10.1007/978-3-031-53555-0_38
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-53554-3
Online ISBN: 978-3-031-53555-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)