The talk discusses the vulnerabilities and consequences of operating a rogue base station in an automated 4G/LTE network and suggests mitigations from the mobile network operators perspective.
- Introduction to 4G/LTE and automated operations in mobile networks
- Exploitation of vulnerabilities in 4G/LTE mobile phones and SON protocols to inject malicious packets into the network
- Demonstration of three types of denial of service attacks and their impact
- Status of vulnerabilities and with whom they are closed
- Mitigations and takeaways for mobile network operators
The speaker and his colleague shifted their focus from mobile devices to base stations and network automation. They discovered vulnerabilities in the automated operations of mobile networks and demonstrated several attacks against the network. They suggest that mobile network operators should verify the information received from different areas and base network decisions on several parameters, not just a cell ID. They also suggest creating authentication of broadcast messages and adding intelligence to self-organizing networks. The speaker emphasizes the importance of having self-organizing networks ready to handle 5G networks and the need to fix vulnerabilities in mobile networks.