The study uncovers security flaws in lower layers of cellular networks, emphasizing passive and active attacks that exploit information leakage and control message injection. Attacks include user localization, tracking, throughput reduction, and network disruption. The research evaluates real-world scenarios and operator configurations to validate the impact of these vulnerabilities.
Over the years, security vulnerabilities in cellular systems have been demonstrated in literature. While higher layers are protected, lower layers like PHY and MAC are vulnerable. The complexity of cellular standards makes security analysis challenging. The study identifies new passive and active attacks due to information leakage in beamforming procedures. These attacks can disrupt user communications by tricking connected UEs or disconnecting active users stealthily.
The paper evaluates practicality by measuring current operators' configurations across three countries. Results show attackers can localize users with high accuracy, track their movements, reduce throughput significantly, and disrupt communication effectively within seconds. Spoofing MAC CEs can drain users' battery life and impact network performance. The study highlights the need for enhanced security measures in lower protocol layers to mitigate these risks.
翻譯成其他語言
從原文內容
arxiv.org
深入探究