Chapter 4 - LTE Flashcards

1
Q

What are some basic facts on 4G?

A
  • Evolved Packet System (EPS)
  • Evolved Packet Core (EPC)
  • Multiple radio access networks
    • E-UTRAN
    • UTRAN, GERAN
    • non-3GPP standards (e.g. WLAN)
  • EPC a.k.a System Architecture Evolution (SAE)
    • Connected to all-IP network
  • E-UTRAN a.k.a Long-Term Evolution (LTE)
    • 277 Mbit/s downlink, 75 Mbit/s uplink
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the components of a 4G network?

A
  • ME/ USIM
  • eNodeB in eUTRAN
  • Mobility Management Entity (MME)
  • Serving GPRS Support Node (SGSN)
  • Serving Gateway (S-GW)
  • Home Subscriber Server (HSS)
  • Packet Network Gateway (P-GW)
  • AuC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the tasks of the HSS and MME?

A

HSS:
- HLR
- Transport authentication and authorization information
MME:
- VLR / UE paging
- Authentication with UE
- Signalling with radio network for mobility
- P-GW and S-GW selection
- MME selection for handover
- SGSN selection for 2G/3G handover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the tasks of the S-GW and P-GW?

A

S-GW:
- Mobility anchor for inter-MME handover
- e.g. reroute traffic
P-GW:
- Per user packet filtering
- Local breakout: P-GW in serving network is used
- Home-routed: P-GW in home network is used
- UE IP allocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What traffic types exist in a 4G network?

A
  • Radio Resource Control (RRC)
    • Control traffic between UE and eNodeB
  • Non-Access Stratum (NAS)
    • Control traffic between UE and MME
  • User Plane (UP)
    • Traffic generated by UE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the underlying protocol stack on the air interface for UP traffic in 4G?

A
  1. PHY
  2. MAC
  3. Radio Link Control (RLC)
  4. Packet Data Convergence Protocol (PDCP)
  5. IP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the protocol stack in the 4G core network for UP traffic?

A
  1. PHY
  2. MAC
  3. IP/ UDP
  4. GPRS Tunneling Protocol for User Traffic (GTP-U)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which keys are used/ created in 4G and who uses them?

A
  • Ki (UE / AuC) - for key derivation
  • IK, CK (UE / HSS) - for key derivation
  • K_SN (UE / MME) - for key derivaiton of the specific serving network
  • K_NASenc K_NASint (UE / MME) - encryption and integrity protection of control traffic
  • K_eNB (UE / eNodeB) - for key derivation of the eNodeB
  • K_UPenc K_UPint - encryption and integrity protection of user plane traffic
  • K_RRCenc K_RRCint - encryption and integrity protection of radio control traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is 4G protected against bidding down?

A

NAS:
- Initial: UE indicates security capabilities
- On NAS security mode command: MME includes UE security capabilities in a integrity protected message
- If UE detects difference, drop connection
RRC / UP:
- eNodeB reveives K_eNB and UE capabilites from MME
- eNB chooses algorithms and derives keys for UP and RRC traffic
- eNB sends security mode command with chosen algorithms in integrity protected message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How are keys transferred on handovers within 4G?

A

Intra-MME:
- eNB derives next K_eNB from current K_eNB and cell ID and target cell downlink frequency
- new K_eNB is transferred directly between eNBs

Inter-MME:
- Current MME uses counter (NCC) and previous next hop parameter (NH) or initially K_eNB to generate new NH
- Transferred to new MME and then new eNB
- eNB uses NH and cell ID, downlink freq. to generate new K_eNB

  • Key change possible with active connection (other than in 2G/3G)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How are handovers between 4G and 3G/ 2G networks?

A

4G to 3G:
- CK, IK derived from K_SN by MME
- Transferred to SGSN

3G to 4G:
- CK, IK transferred to MME
- K_SN derived using additional nonce

2G to 4G:
via 3G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What attacks are known against 4G?

A
  • Location tracking (Passive / semi-passive / active)
  • Cipher (ZUC cypher weak)
  • DoS
  • Downgrading to 2G/ 3G
  • Authentication relay attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is passive/ semi-passive tracking attack done in 4G?

A

Use non-encrypted paging of eNB:
- Attacker has a sniffer in each cell of the tracking area (TA)
- Triggers paging (e.g. call or SMS)
- MME sends paging request to last eNB
- eNB broadcast unencrypted paging request with TMSI/ IMSI
- If not in cell, all eNB in TA broadcast
- UE replies with RRC connection request

Passive: Just listen to broadcast requests
Semi-passive: Trigger paging and get current cell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is a DoS attack done in 4G?

A

Attach request:
- UE initiates “attach request”, which is not integrity protected
- UE indicates service capabilities
- Man in the middle attack: Change to “SMS only”
- MME will block all calls to subscriber

Network-initiated detach:
- Network-initiated detach accepted, even if integrity protection is false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is an downgrading attack done in 4G?

A

TA-update:
- UE sends TA-update when moving to a new tracking area
- Attacker intercepts and replies with TAU reject (4G not supported)
- TAU-reject accepted with false integrity protection
- UE downgrades to 3G/2G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is an authentication relay attack done in 4G?

A
  • Attacker is man in the middle, between UE and eNB
  • Relays traffic between UE and eNB

Attacks:
- Eavesdrop if traffic not encrypted
- DoS if paging is done in wrong TA

NO UE impersonation possible, due to integrity protection