New error detection in 4G LTE protocol
Scientists from Purdue and Iowa University have discovered new vulnerabilities in the main protocol of the 4G LTE mobile network - currently very popular in the world.
The vulnerability affects the process of mounting, splitting, wrapping - part of Long Term Evolution (LTE), the high-speed wireless communication standard on mobile devices.
The vulnerability can lead to blocking or falsifying messages
The researchers say the bug allows an attacker to connect to the 4G LTE network without authentication. By connecting via another user identity, the attacker sends a message that fakes the user, blocks the message, fakes the device's address and even forces other devices to disconnect from the network.
4G LTE is not yet 4G, but is very popular
Researchers worry that this error will be used in practice to hide crime. For example, an offender in the United States can assume the address as if he were in Europe.
Vulnerability using LTEInspector tool
Researchers use a special tool called LTEInspector to detect these errors - 10 new vulnerabilities and 9 known vulnerabilities. They also demonstrate the accuracy of their tools by exploiting 8 of the 10 new vulnerabilities by testing and faking the network, using the available software.
Each error found by LTEInspector is detailed in the research report. This tool is also available for free on GitHub.https://github.com/relentless-warrior/LTEInspector
See more:
- Are 4G and 4G LTE networks the same?
- Learn about 5G network, future mobile platform
You should read it
May be interested
- Learn about DNSCrypt protocoldns or domain name server is a service that is mapped to an address (ip address) to the url of the website you open in your browser.
- Learn about the IMAP protocolinternet messaging access protocol (imap) is an internet standard that describes a protocol for retrieving mail from email servers.
- Learn about Telnet protocoltelnet is a command line protocol used to manage various devices such as servers, pcs, routers, switches, cameras, and remote firewalls.
- Download Broke Protocol, the 'weird' game between GTA and Minecraft is free on Steambroke protocol is currently free on steam for 100 hours from 0:00 on august 16.
- Use NSLOOKUP to diagnose the DNS Serverthe dns protocol has been around for years and still represents a stable and reliable protocol. however, dns sometimes has some problems with the problem. these problems may stem from disconnection, an error dns record or some other problem.
- What is Post Office Protocol (POP)?post office protocol (pop) is an internet standard that allows downloading email from an email server to a computer. pop has been updated twice since its first launch in 1984 under the name pop1.
- Learn about Border Gateway Protocol (BGP)border gateway protocol (bgp) is used to exchange routing information for the internet and is the protocol used between isps (which are different ass).
- How to enable password leak detection on Chromepassword leak detection on chrome is a security feature that notifies users if any passwords are at risk of being leaked or in a data breach.
- How HTTP workshypertext transfer protocol (http) provides a network protocol standard that web browsers and servers use to communicate. you see http every day because when you visit a website, the protocol is written right in the url.
- What are Protocol Attacks? How to Detect and Prevent Attacksprotocol attacks are a type of cyber attack that is carried out by exploiting weaknesses in communication protocols.