Security Vulnerabilities and Threats of LTE Networks

HWANGUK, KIM and SEKWON, KIM (2015) Security Vulnerabilities and Threats of LTE Networks. In: International Conference on Advances in Computing, Control and Networking - ACCN 2015, 21 - 22 February 2015, Hotel Lebua at State Tower.

20150309_070156.pdf - Published Version

Download (628kB) | Preview
Official URL:


The popularity of LTE and its entailing expansion of mobile services have led directly to the explosion of data traffic flowing through networks since LTE was launched in 2011. And as the tethering service based on LTE’s high-speed capabilities has become popular, the malicious traffic of the wired environment consisting of PCs has been flowing into the LTE network. In response to this, mobile carriers have been configuring their LTE networks using NAT and have also installed IP-based security equipment between the LTE network and external Internet network. However, the NAT and IP-based security equipment cannot detect/block attacks from within LTE networks, and are limited in their ability to protect LTE networks from abnormal traffic from the outside. This paper describes the security vulnerabilities of LTE networks and security threats likely to occur due to attacks abusing such vulnerabilities.fSekwon Kim

Item Type: Conference or Workshop Item (Paper)
Depositing User: Mr. John Steve
Date Deposited: 09 May 2019 11:07
Last Modified: 09 May 2019 11:07

Actions (login required)

View Item View Item