5G Technology World

  • 5G Technology and Engineering
  • FAQs
  • Apps
  • Devices
  • IoT
  • RF
  • Radar
  • Wireless Design
  • Learn
    • 5G Videos
    • Ebooks
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Handbooks
    • 2024
    • 2023
    • 2022
    • 2021
  • Resources
    • Design Guide Library
    • EE World Digital Issues
    • Engineering Diversity & Inclusion
    • Engineering Training Days
    • LEAP Awards
  • Advertise
  • Subscribe

Study Outlines 10 New Vulnerabilities in LTE Networks

By Andy Szal | March 16, 2018

A new report suggests flaws in 4G LTE networks could allow attackers to fabricate messages from devices or impersonate their locations.

Researchers from Purdue University and the University of Iowa detailed 10 new potential attacks and nine previously known vulnerabilities in a paper released this week.

Computer scientists used a tool known as the “LTEInspector” — which combines a symbolic model checker and a protocol verifier — to identify the issues, then validated eight of the 10 new problems with experiments in a real testbed.

The attacks could occur within the attach, detach and paging procedures of the 4G LTE protocol, which allow users to connect and disconnect from networks and receive calls and messages.

“Our tool is the first one that provides a systematic analysis for these three particular procedures in 4G LTE networks,” Purdue graduate student Syed Hussain said in a statement.

In one scenario, hackers could conduct an authentication relay attack to connect to core networks, without the necessary credentials, then establish a false location of a device.

In another, attackers could use information about a user’s location to perform a denial of service attack — hijacking the device’s paging channel to stop notifications or fabricate messages.

Other flaws could allow hackers to disconnect devices from the core network, force devices to perform actions that drain the battery or send fake emergency messages to many other devices.

In addition, researchers suggested that a “major overhaul of the entire system” could be needed to address the problems completely.

“Device manufacturers and cell phone networks will both need to work to fix these problems,” Hussain said.


Filed Under: Devices

 

Next Article

← Previous Article
Next Article →

Related Articles Read More >

High-directivity couplers optimized for 225 – 750 MHz applications
Integrated into IoT devices, iSIM poised to make inroads
Triple-radio and multiprotocol MCUs add application processors
5G vectors
How RedCap fits into 5G and IoT

Featured Contributions

  • Overcome Open RAN test and certification challenges
  • Wireless engineers need AI to build networks
  • Why AI chips need PCIe 7.0 IP interconnects
  • circuit board timing How timing and synchronization improve 5G spectrum efficiency
  • Wi-Fi 7 and 5G for FWA need testing
More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: Internet of Things
Explore practical strategies for minimizing attack surfaces, managing memory efficiently, and securing firmware. Download now to ensure your IoT implementations remain secure, efficient, and future-ready.

EE LEARNING CENTER

EE Learning Center
“5g
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

Engineering Training Days

engineering
“bills
5G Technology World
  • Enews Signup
  • EE World Online
  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Microcontroller Tips
  • Analogic Tips
  • Connector Tips
  • Engineer’s Garage
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips
  • About Us
  • Contact Us
  • Advertise

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy

Search 5G Technology World