{"title":"Security Analysis of TAU Procedure in LTE Network","authors":"Li Qiang, Wen’an Zhou, Baojiang Cui, Liu Na","doi":"10.1109/3PGCIC.2014.124","DOIUrl":null,"url":null,"abstract":"LTE has become a commercial communication technology worldwide, and its security issues are attracting more and more attention. Tracking Area Update (TAU) is a series of procedures performed by LTE system when users update Tracking Area (TA). The security of TAU procedure directly affects the whole system. This paper first analyzes the security of LTE core networks when the TA updates, then it puts forward a security enhancement scheme by borrowing the thoughts of denial of service (DoS). Therefore, it is important to protect Serving Gateway from overload problems. The proposed scheme is simple, and it also can prevent Serving Gateway from being attacked by malicious requests.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/3PGCIC.2014.124","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
LTE has become a commercial communication technology worldwide, and its security issues are attracting more and more attention. Tracking Area Update (TAU) is a series of procedures performed by LTE system when users update Tracking Area (TA). The security of TAU procedure directly affects the whole system. This paper first analyzes the security of LTE core networks when the TA updates, then it puts forward a security enhancement scheme by borrowing the thoughts of denial of service (DoS). Therefore, it is important to protect Serving Gateway from overload problems. The proposed scheme is simple, and it also can prevent Serving Gateway from being attacked by malicious requests.