Q Assignment highlight about the evaluation of LTE networks attacks and the proper countermeasures for addressing them. Home, - Wireless Networks and Security Introduction The evolution of the cellular networks or the mobile networks is about how the link is done through wireless methods. Here, the network is distributed over the land areas with one fixed locationtransceiver and then handling the three cell sites or the base for the transceiver stations. It include the enabling of larger number of portable transceivers with the equipment of the mobile broadband modems. It includes the capacity of handling the single large capacitor to take hold of the signals that are transferred. The evolution has been through 1g.2g.3g.4g and now 5g networks. Here, 1G is the voice only, 2g with SMS and MMS, 3G Slow Data, 4G: Efficient speed, 5G fast speed. Report Layout The report will discuss about the Network Security Data Collection and Analysis with security measurement. It includes the legacy of cellular networks that are based on working with vulnerability to new security threats. It will include the comparison of the wireless communication technologies with evaluating the communication for the wireless cyber physical systems and internet of things . The report layout will highlight about the evaluation of LTE networks attacks and the proper countermeasures for addressing them. LTE/LTE-A Architecture The architecture network of LTE is based on the User Equipment, Evolvement of the UMTS Terrestrial Radio Access Network & Evolved Packet Core (EPC). The EPC is for the communication of the packet data with the network set out of the world. Here, the private corporate networks and the IP multimedia system works with handling the interfaces with the system that tends to denote about the transmission The User Equipment is for handling the architecture with Mobile Termination for communication functions. It includes the terminal equipment and the Universal Integrated Circuit Card for the handling of applications and then user specific data that is for the 3G SIM card. EUTRAN works on handling the radio communication mainly in between the mobile and the packet core which has the evolvement of the base stations as well. The communication is with the base stations and the one-cell at a time where the functions include the sending of information sending and receiving the transmissions for the analogy and the digital signal processing. The controls are determined for the lower operations of the mobiles and then signaling the messages with handing over the commands. The mobile management is about controlling the higher level of the operations with signaling the messages and the Home Subscriber Servers as well. The LTE security is based on handling the impairing of the confidentiality with privacy set for the LTE communication. Here, the specifications are based on demonstrating the attacks and the resource allocation as well. It includes the performance through website fingerprinting that enables the attacker to learn about the website for the user to access it. The focus is on presenting the passive identity and then working towards handling the passive attacker with properly focusing on the allocation of resources . There are different attacks that have been seen in the architecture which leads to the modification of the message payload. Apart from this, the focus is on the proof-of-concept demonstration with the active attackers working on redirecting the requests of DNS and then working on the performances which are related to handling the malicious website requests as well. The proof of concept is about how the attacker can easily redirect to the malicious websites. It has been seen that the LTE attack works with stabilizing the radio layers and then preventing the unintended interference with the real network. Hence, there is a need to set up the services with proper simulation that can help in working for the DNS services with specific DNS queries as well. Evaluation of attacks on access and core networks The mobile career generally offers LTE with focusing on the network communication. The research is about how the mobile device needs to allow the sophisticated hackers for spying on the users of cellular networks with modifying the content of communication. The attacks and the network vulnerabilities are about mapping the user’s identity and then fingerprint the websites that they tend to visit . This leads to redirecting them to the malicious websites with tampering and the DNS lookups. The attacks are seen with the data link layer that lies on the top with handling the physical channels that are important to be maintained for the wireless communication mainly in between the users and the network. It is important to organize the different users for properly accessing the resources on the network with correcting the transmission errors through encryption process. The identity mapping with website fingerprinting are the passive attacks which leads to spying and then focusing on how the data is being passed in between the base station and the end users with the airwaves from the target phone. DNS attack spoofing is set with alter that is an active attack which allows the attacker to perform the man-in-the-middle attacks with interception communications and then redirecting them to the malicious websites through using the DNS spoofing techniques and attacks. There are results which include the redirection to the malicious websites and can be performed when the attacker is setting an example for the control of one hope to the other hopping. Here, the attacker only needs to focus on the proximity of the attacks. aLTEr Attack is about how the data link layer of the LTE network is encrypted with handling the integrity protection where the attacker tends to modify the bits with the encrypted data packet. It is then later decrypted for a related plaintext as well. The attack exploits with the user data with the encrypted with the counter mode but not integrity protected with allowing the modification messages payload. The encryption algorithm is malleable with the adversary working on the modification of cyphertext that is set into the ciphertext with later decrypted to the related plaintext . The attacker pretends to be real cell tower for the victim with the pretending about the intercepts for the communication mainly in between the victim and the real network. With the proof of the concept demonstration, there are active attackers who tend to redirect the DNS requests with the spoofing attack, that leads to major problems and then causing the issues with the use of malicious DNS services. It is seen that the attack is dangerous and could lead to the problems related to the abusing through the attack. It has been seen that 5G networks are also vulnerable to the attacks where there are supporting of the authenticated encryption with the features that are not mandatory as well. They are having the patches related to the use of authenticated encryption and there are certain disclosures as well. The groups analyses the development of standards with the telecommunication industry. It includes the carriers like the Verizon & AT&T that has been working on the implementation of the 5G protocol setup. The web fingerprinting is about the meta information with the data link layer leak information with consumption of data over the time in unit. It includes the information and then looking for the patterns that are for the websites visiting with a probability. The layers are unprotected, and the attacker can easily forward the higher layer messages as well . Identification and Analysis Hence, for the protection of the system, there is a need to focus on: a. The updating of the specifications: Here, the carriers are banding together for fixing the issues with the specifications for using the encryption protocol and then handling the authentication like the AES-GCM. Here, the researchers also believe that this is not feasible as there are implementation of the devices which leads to the higher financial efforts where the carriers are not bothering about it. b. The correction of the HTTPs configuration: This is the effective solution for the websites in order to adapt to the HTTP Strict Transport Security Policy with the additional layer of protection and helping in the prevention and redirection of the users towards a malicious website. Hence, the team is also focusing on the handling of the attacks through the use of security and privacy data standards. In order to provide the security, there is a need to use the mutual authentication with eh network and the phone that works on the verification of the partner identity. It includes the communication that has been mainly from the derived key for the encryption of control and then using the traffic as well. Here, the protection is for the integrity with attacker who is not able to manipulate the traffic at the time of transmission. Even after the security, there is a need to take care of the passive attacks and the active attacks as well. Conclusion The LTE services are important for handling the mobile communication and have been playing an important role in the information society. They need to handle the performance goals with the modern security standards that will help in improving the critical infrastructure and the public safety patterns. The scenarios are depending upon the resilient and the secured specifications with open attack vectors that are leading to the different severe risks. There are protocol security forms and standards with identification of crucial attacks for the physical and the network layers.