New Vulnerabilities in 4G and 5G Cellular Access Networkprotocols Exposing Device Capabilities
New Vulnerabilities in 4G and 5G Cellular Access Networkprotocols Exposing Device Capabilities
ABSTRACT fifth generation networks in short 4G (also called Long Term Evolu-
Cellular devices support various technical features and services for tion (LTE)) and 5G respectively, are built to support a wide range of
2G, 3G, 4G and upcoming 5G networks. For example, these tech- applications including smart homes, critical infrastructure, indus-
nical features contain physical layer throughput categories, radio try processes, HD media delivery, automated cars, and etc. Besides,
protocol information, security algorithm, carrier aggregation bands low-cost and low-energy mobile devices referred as Narrow Band -
and type of services such as GSM-R, Voice over LTE etc. In the Internet of Things (NB-IoT) and and LTE - Machine type communi-
cellular security standardisation context, these technical features cations (LTE-M)1 are redefining the IoT market with a brand new
and network services termed as device capabilities and exchanged LTE protocol suite tailored for IoT applications.
with the network during the device registration phase. In this paper, The standard body 3rd Generation Partnership project (3GPP)
we study device capabilities information specified for 4G and 5G has designed several capabilities in 4G and 5G specifications to
devices and their role in establishing security association between address these applications and control them via mobile networks.
the device and network. Our research results reveal that device These capabilities are communicated to the network by mobile
capabilities are exchanged with the network before the authentica- devices during the registration process. The device capabilities play
tion stage without any protection and not verified by the network. an essential role in defining the communication model between
Consequently, we present three novel classes of attacks exploiting the device and the network. For instance, they define the speed,
unprotected device capabilities information in 4G and upcoming frequency bands, security parameters, application specific param-
5G networks – identification attacks, bidding down attacks, and eters such as telephony capabilities of the device. This allows the
battery drain attacks against cellular devices. We implement proof- network to recognise the application type and accordingly offer
of-concept attacks using low-cost hardware and software setup to the appropriate service. For example, a automated car indicates its
evaluate their impact against commercially available 4G devices Vehicle-2-Vehicle (V2V) support to the network and receives the
and networks. We reported identified vulnerabilities to the relevant required parameters to establish communication with surrounding
standardisation bodies and provide countermeasure to mitigate vehicles. Similarly, high end smartphones indicate their support
device capabilities attacks in 4G and upcoming 5G networks. for carrier aggregation and Multiple-Input and Multiple-Output
(MIMO) techniques to receive high data rates from the network.
ACM Reference Format:
Also, low-powered and light weight IoT devices indicate their sup-
Altaf Shaik, Ravishankar Borgaonkar, Shinjo Park, and Jean-Pierre Seifert.
2019. New vulnerabilities in 4G and 5G cellular access network protocols :
port for power consumption techniques and accordingly activate
exposing device capabilities. In 12th ACM Conference on Security and Privacy them after negotiating with the network. Hence, capability infor-
in Wireless and Mobile Networks (WiSec ’19), May 15–17, 2019, Miami, FL, USA. mation of device plays an essential role for the right operation of
ACM, New York, NY, USA, 12 pages. https://doi.org/10.1145/3317549.3319728 the device with respect to its application.
In this paper, we analyse device capabilities specified in 4G and
1 INTRODUCTION 5G network standards with respect to security aspects. Our research
As mobile network generations advance, new technologies and in- study reveals that device capability information is exchanged with
novative applications come into existence. From tiny low-powered the network without any protection during the device registration
sensors to vehicular networks everything can be now controlled phase. Consequently, the device capability information can be mis-
and managed via mobile networks. Current fourth generation and used by an adversary to perform several attacks against the mobile
subscriber. We present three classes of attacks – a) Identifica-
Permission to make digital or hard copies of all or part of this work for personal or tion attacks allow an adversary to discover devices on the mobile
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
network and reveal their hardware and software characteristics
on the first page. Copyrights for components of this work owned by others than ACM (such as model, manufacturer, version) and applications running on
must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, them; b) Bidding down attacks that hijack the device capabilities
to post on servers or to redistribute to lists, requires prior specific permission and/or a
fee. Request permissions from [email protected]. exposed on the LTE air-interface and degrade the data-rate of a
WiSec ’19, May 15–17, 2019, Miami, FL, USA device from 27 Mbps to 3.7 Mbps and further deny Voice Over LTE
© 2019 Association for Computing Machinery.
1 LTE-M is the term for the LTE-MTC low power wide area (LPWA) technology standard
ACM ISBN 978-1-4503-6726-4/19/05. . . $15.00
https://doi.org/10.1145/3317549.3319728 published by 3GPP in the Release 13 specification.
(VoLTE) services to LTE subscribers and downgrade them to 3G/2G 2.2 LTE Registration
networks; c) Battery draining attacks that target NB-IoT and A typical registration procedure in LTE network is performed using
LTE-M devices to breakdown their power saving abilities and drain control plane messages as shown in Figure 1. To begin, upon turning
their battery life 5 times faster than the expected lifetime. ON, a UE sends an attach request message to the MME indicating
We have implemented all our attacks and tested them using its request for voice/data services or both. It primarily consists of
commercial LTE devices and also on real LTE networks. As the subscriber identities such as International Mobile Subscriber Identity
vulnerabilities we identified are present in the 3GPP standards, all (IMSI) or Temporary Mobile Subscriber Identity (TMSI) and UE’s
the devices supporting LTE (and upcoming 5G as well) standards core network capabilities. Since Attach Request is a first message to
are affected. Moreover our attacks are silent and persistent for the network it is sent in plaintext. Upon identifying the subscriber,
several days and fortunately require minor fixes to mitigate them. both UE and network perform mutual authentication and estab-
Our research results are reported to the cellular standardisation lish the first level of security. In particular, Non-Access Stratum
bodies (SA3), network operators and remedial actions are underway. (NAS) security is established between the UE and the MME to en-
We hope to see changes to the 3GPP 5G specifications to address able encryption and integrity protection of the messages hereafter
the shortcomings we outlined in this paper. Our contributions in exchanged between them.
this paper are the following:
• A new vulnerability in the LTE and 5G specifications that en-
ables device identification attacks. As a consequence of this
specification vulnerability, an implementation vulnerability
is found in network operator equipment that is exploited
during LTE device registration procedure. Further, a protocol
vulnerability in the first release of LTE NB-IoT protocols that
compromises the battery life of low-powered devices.
• A low cost experimental setup built using off-the-shelf hard-
ware and openly available software. Implementation of var-
ious proof-of-concept attacks and their evaluation using
commercial devices and cellular networks.
• Countermeasures to mitigate the attacks that can be included
into 4G protocols and also as recommendations to the ongo-
ing second phase 5G security standard design.
2 BACKGROUND
We first present different type of capabilities defined for mobile Figure 1: LTE Registration Procedure
devices and then discuss the standardized registration procedure Next, the MME instructs the eNodeB to fetch UE’s radio access
as defined by the 3GPP. Next, we introduce cellular IoT devices capabilities. Thus upon receiving a UE Capability Enquiry message
and their operate in LTE networks. In 3GPP terminology a mo- from eNodeB, UE transfers the requested radio access capabilities
bile device, a base station and a core network are referred to as using UE Capability Information message. eNodeB forwards these
User Equipment (UE), evolved NodeB (eNodeB) and Mobility Man- capabilities to MME and are stored there until the UE de-registers
agement Entity (MME) respectively. A UE (phone, router, or IoT from the network. Further, eNodeB and UE establish a second level
gateway, etc) with a valid SIM card can register to a mobile network of security called Radio Resource Control (RRC) security. Hereafter
and receive access to call/data services. A eNodeB is responsible the messages exchange between UE and eNodeB are encrypted and
for the radio transmission and reception with the UEs and a MME integrity-protected. In the coming sections we highlight that the
handles administrative tasks such as the authentication, security sequence of radio access capability transaction and the RRC security
and management of the subscribers. Hereafter we refer to a device setup varies among operators. Following this, the registration is
as a UE. successfully completed when the UE receives an Attach Accept
message. Now the UE can utilize voice and data services offered by
2.1 UE Capabilities the network.
A UE supports several capabilities for various LTE services and LTE network deployments divide a geographical location into
operations. They are classified into core network capabilities [9, 15] Tracking Areas (TAs) and each TA is assigned with an identifier
and radio access capabilities [6, 8] and are exercised by the MME called TA Code (TAC). While moving from one TA to other, a regis-
and the eNodeB respectively. The core network capabilities contain tered UE should perform a Tracking Area Update (TAU) procedure
non-radio related capabilities, e.g. security algorithms, telephony in order to update its current location to the network. UE initiates
features and etc whereas radio access capabilities provide radio this procedure by sending a TAU Request message to MME and its
aspects of the UE, such as supported frequency bands, receive and contents are similar to Attach request message. Next, UE, eNodeB
transmit capabilities and etc. Further, a UE can support various radio and MME follow a similar procedure like in Figure 1 and complete
access technologies such as LTE, 3G, 2G, and CDMA and reports the update procedure with a TAU Accept message. Note that UE
its capabilities to the network during the registration procedure. reports its core network capabilities during the TAU procedure. A
2
similar update procedure known as periodic TAU is also performed
(even though UE did not change its location) by the UE upon the
expiry of a timer T3412. T3412 is sent to the UE in Attach Accept
and TAU Accept messages.
4
Figure 3: Device type identification levels
also the application. they have different operational aspects. NB-IoT uses different ra-
dio channels compared to LTE-M and hence easily distinguishable
Cellular vs Cellular IoT. 3GPP defines various UE Categories from each other. The separation of these two categories assists in
(Cat) depending on their LTE specifications and the supporting identifying the underlying IoT application.
technical capabilities [8], between 0 and 19. Further, NB-IoT and
LTE-M are different categories and features defined especially for Android vs iOS. iPhones have constantly been using basebands
IoT applications. These categories do not support voice calling fea- from either Qualcomm or Intel. Thus, devices using other basebands
tures and instead support power saving features. As shown in table are not considered as an iOS device. Although an Android devices
Appendix C, timers T3324 and T3412 ext are included in Attach Re- can use Qualcomm or Intel baseband, we noticed multiple differ-
quest message to indicate power saving features [15]. Hence when ences between Android and iOS devices with the same baseband as
these timers are active we can accurately make a decision at level shown in tableAppendix E. MS assisted GPS is a capability that we
two that they are a certain type of cellular IoT devices. found disabled in all tested iPhone models but whereas it is always
enable across android models using Qualcomm and Intel baseband.
Phone vs Others. The primary use of a mobile phone is to make Note that we did not consider phones with other operating systems
voice calls, therefore voice capability is activated by default. In con- such as Windows and Firefox due to their low market share.
trast, there are cellular modems dedicated to data-only purposes
without voice calls, hence we categorize them as “others”. These Android Device Manufacturers. Based on our analysis An-
include data sticks, cars, hotspots, wearables like watches, and etc. droid device manufacturers have certain preferences in choosing
The device capabilities in table Appendix D clearly distinguish UEs their basebands. Huawei and Samsung basebands are exclusively
that are phones from all other UEs that are not phones. Unlike used in-house. Other manufacturers such as LG, Nokia, HTC use
“others”, a phone indicates its UE Usage Setting, Voice Domain Pref- basebands from multiple vendors such as MediaTek, Qualcomm
erences and voice codec support to the network and activates voice and Intel. Hence, by referring to the device list [2, 3] it is possible to
calling capabilities. iPhone models can be distinguished based on narrow down the possible options and determine the right phone
the specification release and also UE category whereas we have a manufacturer.
different approach to distinguish various android manufacturers.
A UE fixed in a car requires GPS features to be constantly turned Application. Cellular types devices are multi-purpose devices
ON. Further, in LTE and 5G networks, UE capabilities indicate V2X with moderate to high computing capabilities and can be identified
or V2V support. When such a capability is detected it can be re- based on above techniques. For example, upon detecting a router its
ferred to as a vehicle. A railway specific modem has special features operating system can be inferred from various internet sources. In
that support frequencies dedicated to railways such as GSM-R [20]. contrast, cellular IoT type devices have less computing power and
Differently, USB dongles and routers (also hotspots) are purely are dedicated to single application usage. LTE-M provides better
data-oriented and lacks any voice codec facilities. These distinct latency than NB-IoT, making it suitable for mission-critical applica-
capabilities can distinguish different devices at level 3. tions such as those involving emergency data and precision tracking
data. A wide range of applications and the appropriate category is
NB-IoT vs LTE-M. While both NB-IoT and LTE-M are targeting defined in [22] as a recommendation to the device manufacturers.
low-powered IoT applications with 10 years of battery life [7, 22], Similarly, the application can be inferred based on the requested
5
timer values. A UE can request lower T3412 values such as 15 sec- on the reference model and publicly available databases to infer
onds or less to save more power. This could be translated to a device the device-type information. Hence a bigger and diverse reference
or a sensor like smart-meter that only pushes data to a server and model is required for an accurate device-type identification.
do not expect any responses. Differently, a vending machine or an Phones, tablets, routers and automotive devices are easily identi-
asset trackers require up to 1 minute active state depending on the fied using our reference model whereas determining the application
requirements. However, this heavily depends on the settings of the of cellular IoT device is challenging due to its limited set of capabili-
application. Some device may use the default value supplied by the ties and similarities among several applications. Another challenge
baseband manufacturer, which may not be optimal for their specific is to determine the application OS version since the baseband model
use case. and mobile OS versions are not linked and not synchronously up-
dated. Besides, in certain UEs (especially phones) a USIM card can
4.3 Mobile Network Mapping (MNmap) activate/deactivate certain capabilities. For e.g., frequency bands
are enabled and disabled according to certain settings by the net-
The primary goal of this attack is to identify devices on a mobile
work operator. Hence, identification is affected by the USIM card
network by analyzing their capabilities. Since a UE transfers its ca-
setting and should be considered during MNmap attack.
pabilities to the network without performing authentication [6], an
active adversary can acquire these capabilities (both core and radio)
by operating a rogue eNodeB as described in our setup. Besides, a 5 DEVICE BIDDING DOWN
passive adversary can also acquire UE’s core network capabilities This section presents a bidding down attack performed on a UE by
but not the radio capabilities (provided they are exchanged after hijacking its capabilities. We first discuss the capabilities that are
RRC security setup). In this section we perform the attack being exploited and followed by an experimental attack and its evaluation
an active adversary as we require both core and radio capabilities on commercial networks. We finally present the feasibility and
to perform a granular identification. We perform an experiment impact related issues of this attack.
with an unknown UE and apply our reference model to determine
its device-type. Upon receiving a TAU Request message from the 5.1 LTE Radio Access Capabilities
UE, we extract the core network capabilities and send a UE Ca-
A UE communicates its radio access capabilities [6] with the eNodeB
pability Enquiry message. The UE responds with a UE Capability
and indicate its support for specific radio operations. A eNodeB
Information message and we extract the radio capabilities from it
needs to respect the received UE radio access capabilities when
and release the UE to a legitimate network using a RRC Release
configuring and scheduling data/signaling for the UE [8, 26]. We
message.
now explain these capabilities that are exploited in our attacks
In our experiment, an unknown device was identified to use Intel
along with their usage in LTE network.
XMM7480 baseband based on our model, due to its Cat 6 support. It
is determined as a phone/tablet since the device has voice support
UE Category. It is used to set the number of bits allocated by
(ref table) and reports itself as a voice centric device. By searching
the eNodeB over the radio channels for a UE in both downlink and
the smartphones and tablets with Intel XMM7480 baseband, we
uplink transmissions [8]. The higher the category the higher the
could identify that this is an iPhone 8.
number of bits allocated. This directly translates to the data rate
The secondary goal of this attack is to determine potential vul-
of the UE over the air-interface. For instance, theoretically, a Cat
nerabilities applicable to the identified device. Precisely, MNmap
6 UE is entitled to receive a maximum of 300 Mbps speed on the
can be supplemented with vulnerability information from the ex-
downlink whereas a Cat 1 UE has a peak of 10 Mbps.
ternal sources such as vulnerability databases from baseband ven-
dors (Huawei [25], Qualcomm [29]), OS developers (Google [19],
Carrier Aggregation (CA) and Multi Input and Multi Out-
Apple [16]) and device manufacturers (Samsung [33]) and per-
put (MIMO). To boost the capacity of the network and offer higher
form targeted attacks. Further, these device fingerprints can be
bit rates, 3GPP introduced CA and MIMO technologies. Both CA
combined with the permanent identifier IMSI to track subscribers.
and MIMO increases the bitrate, but CA increases the bandwidth
While 5G prohibited the plaintext transmission of IMSI in any situ-
while MIMO uses multi-antenna techniques. A UE supporting these
ation [12, 14], fingerprinting of a device and user is still possible
technologies is entitled to receive higher bit rate provided that the
when the device-type information is unique among the nearby
network also supports it.
devices.
Bands. Bands refer to a set of radio frequencies supported by
4.4 Evaluation and Challenges the UE. Support of multiple bands are required for inter-frequency
While we only consider 5 major baseband manufacturers, our ref- handovers and facilitates international roaming across multiple
erence model is also expandable to other baseband manufacturers. regions. Most commercial UEs will normally support multiple fre-
Identifying the baseband vendor and chipset model is a biggest quency bands depending on the region they are sold. For instance,
achievement and can be easily accomplished with the set of param- band 3, 7 and 20 are operated in Europe whereas band 2, 4 and 12
eters we mentioned in the appendix. We evaluate our fingerprinting are widely used in the North America.
techniques with 10 other unknown UEs and could successfully deter-
mine their type up to the fourth level. These 10 devices are similar to Voice Over LTE (VoLTE). As LTE is an all-IP network, the
the devices registered in our reference model. The MNmap depends standard procedure for making voice calls is using Voice over LTE
6
(VoLTE) technology. The mandatory radio access capabilities re- allocated to the subscriber (based on USIM data plan). We discuss
quired [21] to support VoLTE are Robust Header Compression more on our experiments and evaluation with different UEs in the
(RoHC), Unacknowledge Mode (UM), Semi-Persistent Scheduling next subsection.
(SPS), and Transmission Time Interval (TTI) bundling. A UE that is
not supporting these capabilities is not entitled to receive VoLTE
operations but instead use the traditional circuit switched (2G/3G)
approach to making voice calls.
Current (mA)
[10] 3GPP. 2017. LTE;Evolved Universal Terrestrial Radio Access (E-UTRA); Packet Data [31] R.Borgaonkar, A.Shaik, N.Asokan ,V.Niemi, J.P.Seifert . 2015. LTE and IMSI
Convergence Protocol (PDCP) specification (3GPP TS 36.323 version 14.3.0 Release catcher myths; Blackhat EU. https://www.blackhat.com/docs/eu-15/materials/
14). TS 36.323. 3rd Generation Partnership Project (3GPP). http://www.3gpp.org/ eu-15-Borgaonkar-LTE-And-IMSI-Catcher-Myths.pdf. (Nov. 2015).
DynaReport/36323.htm [32] David Rupprecht, Katharina Kohls, Thorsten Holz, and Christina Pöpper. 2019.
[11] 3GPP. 2018. 3GPP System Architecture Evolution (SAE); Security architecture. Breaking LTE on Layer Two. In IEEE Symposium on Security & Privacy (SP). IEEE.
Technical Specification (TS) 33.401. 3rd Generation Partnership Project (3GPP). [33] Samsung Electronics. [n. d.]. Android Security Updates - Samsung Mobile Secu-
http://www.3gpp.org/DynaReport/33401.htm rity. https://security.samsungmobile.com/securityUpdate.smsb. ([n. d.]).
[12] 3GPP. 2018. Security architecture and procedures for 5G System. Technical [34] Semtech Corporation. 2015. LoRa Modulation Basics - AN1200.22. (2015).
Specification (TS) 33.501. 3rd Generation Partnership Project (3GPP). http: [35] Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi, and Jean-Pierre
//www.3gpp.org/DynaReport/33501.htm Seifert. 2016. Practical attacks against privacy and availability in 4G/LTE mobile
[13] 3GPP. 2018. Service requirements for V2X services. Technical Specification communication systems. In 23rd Annual Network and Distributed System Security
(TS) 22.185. 3rd Generation Partnership Project (3GPP). http://www.3gpp.org/ Symposium. The Internet Society, Reston, VA, USA.
DynaReport/22185.htm [36] Altaf Shaik, Ravishankar Borgaonkar, Shinjo Park, and Jean-Pierre Seifert. 2018.
[14] 3GPP. 2018. System architecture for the 5G System (5GS). Technical Specification On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks. In
(TS) 23.501. 3rd Generation Partnership Project (3GPP). http://www.3gpp.org/ Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and
DynaReport/23501.htm Mobile Networks (WiSec ’18). ACM, New York, NY, USA, 75–86. https://doi.org/
[15] 3GPP. 2018. Universal Mobile Telecommunications System (UMTS);LTE; 5G; Non- 10.1145/3212480.3212497
Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3 Release 15 [37] Sigfox S.A. 2017. Sigfox Technical Overview. (2017).
. TS 24.301. 3rd Generation Partnership Project (3GPP). http://www.3gpp.org/ [38] srsLTE. [n. d.]. ([n. d.]). https://github.com/srsLTE/srsLTE
DynaReport/24301.htm [39] Da-Zhi Sun, Yi Mu, and Willy Susilo. 2018. Man-in-the-middle Attacks on
[16] Apple Inc. [n. d.]. Apple security updates. https://support.apple.com/en-us/ Secure Simple Pairing in Bluetooth Standard V5.0 and Its Countermeasure. Per-
HT201222. ([n. d.]). sonal Ubiquitous Computing. 22, 1 (Feb. 2018), 55–67. https://doi.org/10.1007/
[17] Cisco. 2018. Power Saving Mode (PSM) in UEs, MME Administra- s00779-017-1081-6
tion Guide, StarOS Release 21. Technical Report. Cisco. https:
//www.cisco.com/c/en/us/td/docs/wireless/asr_5000/21/MME/b_21_MME_ A LIST OF ACRONYMS
Admin/b_21_MME_Admin_chapter_0111010.pdf
[18] Ettus. [n. d.]. USRP B210. ([n. d.]). http://www.ettus.com/product/details/
UB210-KIT Acronyms
[19] Google Inc. [n. d.]. Android Security Bulletin. https://source.android.com/ 3GPP Third Generation Partnership Project
security/bulletin. ([n. d.]). CA Carrier Aggregation
[20] GSM-R. [n. d.]. ([n. d.]). https://en.wikipedia.org/wiki/GSM-R
[21] GSMA. 2015. IMS Profile for Voice and SMS Version 9.008. Technical Report. GSMA.
DoS Denial-of-Service
https://www.gsma.com/newsroom/wp-content/uploads/IR.92-v9.0.pdf E-UTRAN Evolved Universal Terrestrial Radio Access Network
[22] GSMA. 2016. 3GPP Low Power Wide Area Technologies, GSMA white paper. Tech- eNodeB evolved NodeB
nical Report. GSMA. https://www.gsma.com/iot/wp-content/uploads/2016/10/ GSMA GSM Association
3GPP-Low-Power-Wide-Area-Technologies-GSMA-White-Paper.pdf
[23] K. Haataja and P. Toivanen. 2010. Two practical man-in-the-middle attacks on
LTE Long Term Evolution
Bluetooth secure simple pairing and countermeasures. IEEE Transactions on IMSI International Mobile Subscriber Identity
Wireless Communications 9, 1 (January 2010), 384–392. https://doi.org/10.1109/ IMEI International Mobile Equipment Identity
TWC.2010.01.090935 MitM Man in the Middle
[24] K. M. J. Haataja and K. Hypponen. 2008. Man-In-The-Middle attacks on bluetooth:
a comparative analysis, a novel attack, and countermeasures. In 2008 3rd Interna-
MIMO Multi Input Multi Output
tional Symposium on Communications, Control and Signal Processing. 1096–1102. MME Mobility Management Entity
https://doi.org/10.1109/ISCCSP.2008.4537388 MNmap Mobile Network mapping
[25] Huawei Technologies Co., Ltd. [n. d.]. All Bulletins - PSIRT. https://www.huawei. NAS Non Access Stratum
com/en/psirt/all-bulletins. ([n. d.]).
[26] HUAWEI TECHNOLOGIES CO., LTD. 2010. eRAN2.0 Fea-
NB-IoT Narrow Band - Internet of Things
ture Description. https://www.scribd.com/document/132066434/ PSM Power Saving Mode
Huawei-LTE-eRAN2-1-Feature-Description-doc. (Sept. 2010). RRC Radio Resource Control
[27] M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A. Sadeghi, and S. Tarkoma. 2017. TAU Tracking Area Update
IoT SENTINEL: Automated Device-Type Identification for Security Enforcement
in IoT. In 2017 IEEE 37th International Conference on Distributed Computing Systems
TAC Tracking Area Code
(ICDCS), Vol. 00. 2177–2184. https://doi.org/10.1109/ICDCS.2017.283 UE User Equipment
[28] P. OâĂŹHanlon, R. Borgaonkar, and L. Hirschi. 2017. Mobile Subscriber WiFi USIM Universal Subscriber Identity Module
Privacy. In 2017 IEEE Security and Privacy Workshops (SPW). 169–178. https: VoLTE Voice over LTE
//doi.org/10.1109/SPW.2017.14
[29] Qualcomm Technologies, Inc. [n. d.]. Qualcomm Technologies, Inc. Security
V2V Vehicle to Vehicle
Bulletin. https://www.qualcomm.com/company/product-security/bulletins. ([n. Table 2: Summary of Acronyms
d.]).
[30] Quectel. [n. d.]. LTE BC68 NB-IoT Module. https://www.quectel.com/product/
bc68.htm. ([n. d.]).
11
B DIFFERENCES AMONG BASEBAND F LIST OF TEST DEVICES
VENDORS We used the following devices to build the reference model.
E ANDROID VS IOS
12