An Analysis of Emerging Security Threats in 3G/4G Cellular Network Deployment in Pakistan
Total Page:16
File Type:pdf, Size:1020Kb
International Journal of Computer and Information Technology (ISSN: 2279 – 0764) Volume 04 – Issue 02, March 2015 An Analysis of Emerging Security Threats in 3G/4G Cellular Network Deployment in Pakistan Muhammad Ahmad*, Munam Ali Shah, Manzoor Ilahi Tamimy Department of Computer Science COMSATS Institute of Information Technology Islamabad, Pakistan *Email: mahmad.comsats [AT] gmail.com Abstract—The advancements in wireless communication are where different wireless technologies are merged to form an increasing tremendously. The transition from legacy cellular IP based core network. This technology also provides networks to 3rd Generation (3G) cellular networks and 4th continuous services to their consumer with improved quality Generation (4G) cellular networks has globally taken of service (QoS) fast Internet and mobile TV [4][5]. Other place.The Government of Pakistan has announced the applications of 3G/4G technology are video conferencing, deployment of 3G/4G technology in the country. In this paper, online examination and consultancy by a doctor, and banking we investigate the emerging security threats to 3G/4G cellular industry [6]. Online tutoring, online lecture and quickly network in Pakistan. Our contribution is twofold. Firstly, we tracking student and teachers performance are some of the highlight modern security attacks that can hinder the smooth other exciting features of 3G/4G networks[7][8]. In addition delivery of mobile phone services and secondly, we conduct a to the technical reasons, the service providers must make survey questionnaire about the emerging security threats to mobile users in Pakistan. The results obtained from the survey sure that their infrastructure and services are resilient against reveals some interesting facts which will help the stake holders all kinds of security threats and vulnerabilities. It is very of 3G/4G networks in Pakistan to take appropriate security important for service providers to protect their network measures in time. communication not only for successful commercialization of their services but also for improved users’ experience. Keywords—3G/4G cellular network; security threats; attacks. Before we further explore the modern security threats to 3G/4G networks we briefly review some key features of this technology. I. INTRODUCTION Currently, cellular companies are providing second A. Seamless Verified Handover generation (2G) and 2.5G cellular services in Pakistan. The 3G/4G offers intra-and-inter technology handover. This telecommunication industry has shown a mixed behavior rd th is the characteristic of a base station in 3G network which towards 3 Generation (3G)/4 Generation (4G). Though, ensures service connection with zero or minimum 2G and 2.5G have well-served the end-users and have shown disturbance, and with no notable failure in service quality. efficient results of cellular network performance in Pakistan, This function provides nonstop visible protection of active the 3G/4G network deployment is still showing a nervous service instances and addition of various types of access behavior towards its evolution in Pakistan. Due to major technologies, from Wi-Fi to Orthogonal Frequency-Division security weaknesses in 2G and 2.5G networks [1] and to Multiple (OFDMA)[8][9]. enable data, voice and video transmission at higher rates, the 3G/4G networks are successfully deployed in the country. B. Selection and Detection of Network There is no doubt that 3G will boom the telecom industry The characteristics of mobile terminal with multiple and mobile market of Pakistan because of its salient features radio technologies allow access to multiple networks such as quality of service (QoS), better coverage and higher simultaneously [10]. It improves call quality within cellular data rates. networks[9]. It is also believed that when something new is introduced C. Key Management then society adopts it in both positive and negative aspects. 3G can also negatively impact the market by abusing the best The main security vulnerability in 2G networks has features of 3G networks such as video calling which may been addressed in 3G networks. For improved security badly impact our social lives. As far as services are measure, authentication and key agreement (AKA) [1] compared, 3G offers Universal Mobile Telecommunication method has been developed. The main advantages of AKA System (UTMS) [2]. This is a new locality dependent service are: long authentication keys; stronger hash function; support which promises faster voice and video calling services, fax of mutual authentication[11];support for signaling message and non-stop Internet, mobile applications and multimedia data; massage encryption and user data encryption[12]. content [3]. 4G networks provide a unique environment www.ijcit.com 435 International Journal of Computer and Information Technology (ISSN: 2279 – 0764) Volume 04 – Issue 02, March 2015 D. Quality of Service and Support for Multiple Applications improvements in recent. However, the new security threats [16][17]are still a challenge for researchers and developers. 4G networks are specially designed to support multimedia applications. The developed scheduling C. WiMAX security algorithms for 4G networks provide improved QoS to the end-user[13].4G also provides support for unicast and WiMAX use bothPhysicallayer and Link layer, so multicast services and applications. Enforcement of service thesecurity attacks can be at variance depending on which level agreements (SLA) offer strong confidentiality for method is applied. Currently, WiMAX is using the IEEE multiple applications [8]. 802.16 standard composed of IEEE 802.16-2004 and Table 1: Salient Features of 1G to 4G Cellular Networks Emerging 1G 2G 2.5G 3G 4G Technology Higher Capacity, Completely IP Higher Capacity, Services Analog voice Digital Voice broadband data up to based, speed up to Packetized 2mbps hundreds of MBs NMT, AMPS, Hicap, WCDMA, CDMA Standard GSM, iDEN, D-MPS GPRS, EDGE etc. Single standard CDPD, TACS, ETACS 2000 Data Bandwidth 1.9 kbps 14.4 kbps 384 kbps 2 Mbps 200 Mbps Multiplexing FDMA TDMA, CDMA TDMA, CDMA CDMA CDMA PSTN, Packet Core Network PSTN PSTN Packet Network Internet Network 802.16e-2005 [16] for fixed and mobile architecture. IEEE We briefly reviewed some of the key features of 3G/4G 802.16-2004 defines confidentiality key managing protocol networks. Table 1 summarizes a comparison of different by which mobile station is authorized from the base station features of 1G, 2G, 2.5G, 3G and 4G cellular networks. In [18]. However, in IEEE 802.16-2004 a variety of this paper we investigate security threats and vulnerabilities weaknesses were to 3G/4G deployment in Pakistan and based on survey results, we present appropriate security measures that can be discovered such as access vulnerability, weak encryption set up for secure and efficient usage of 3G/4G cellular key and lastly denial of service (DoS) attacks. The WiMAX networks. The rest of the paper is organized as follow. IEEE 802.16-2005 addresses all the weakness of IEEE Section II reviews related studies. Section III analyzes 802.16-2004. However, it still suffers from few security emerging security threats in Pakistan. Section IV presents weaknesses. Similarly in case of Wi-Fi, it is important to summary and findings and the paper is concluded in Section deploy better security protocols to address all possible IV. known attacks and weakness. D. Possible Threats on 4G. II. RELATED STUDIES The security threats and vulnerabilities to 3G/4G Due to the open nature of 4G, a number of security cellular networks have been intensively investigated. In this risks have emerged. New end-user equipment can also section, we provide an overview of different security aspects become a cause of DoS[19]. One type of attack is VoIP in 3G/4G networks. spam. It is similar to spam in inbox email. Due to the unlocked nature of VoIP, it has become easy for an attacker A. User identity to transmit VoIP Spam over Internet Telephony (SPIT). The Maintaining user individuality during transmission is VoIP threats include the eavesdropping of confidential or very crucial. As sending user identity in plain text can allow private conversation, attacks on user names, password, an eavesdropper to intercept the communication and to track confidential key, credit card and social security number and the subscriber cell locality by means of user International compromise on bank accounts [20]. mobile subscriber identity (IMSI) impersonation and relay E. Social Aspects of 3G/4G. of user message [14]. The 3G/4G technology provides high speed Internet B. Wi-Fi security access to the end-user to use Internet services on cell phone The open environment and less secure behavior of and computer[21]. Fast Internet speed means a new concern wireless LAN has created many security threats. It is very for security threats. The capability of 3G mobile important to secure the Wi-Fi networks in public areas[15]. communications could make a criminal and terrorism Different solutions have been proposed, e.g., [16]. To activity convenient. The development of social networks has summarize, the security of Wi-Fi has made significant exploded over the last 4years [22].According to Facebook website pages, the site has over 200 million active users, of www.ijcit.com 436 International Journal of Computer and Information Technology (ISSN: 2279 – 0764) Volume 04 – Issue 02, March 2015 which over 100 million log on every day [23]. Majority of Our first question was about the awareness of people use Internet and Facebook in positive way but these respondents regarding 3G/4G deployment in Pakistan and are also used for destructive activities.In European their eagerness to use the new technology. The results countries, the high speed Internet connectivity has given obtained are plotted in Figure 2. It could be observed that birth to many dating websites [24] where people meet online 70% of the respondents know about the launch of this with each other. However, this feature should not be technology and are willing to use the services.