@inproceedings{83f07b14171e4eaebd18f1e33687eba8,
title = "Don{\textquoteright}t hand it Over: Vulnerabilities in the Handover Procedure of Cellular Telecommunications",
abstract = "Mobility management in the cellular networks plays a significant role in preserving mobile services with minimal latency while a user is moving. To support this essential functionality the cellular networks rely on the handover procedure. Most often, the User Equipment (UE) provides signal measurements to the network via reports to facilitate the handover decision when it discovers a more suitable base station. These measurement reports are cryptographically protected. In this paper, we examine the cellular specification and illustrate that this crucial functionality has critical security implications. To the best of our knowledge, this is the first work on cellular Man-In-The-Middle attacks based on the handover procedure. In particular, we demonstrate a new type of fake base station attacks in which the handover procedures, based on the encrypted measurement reports and signal power thresholds, are vulnerable. An attacker who sets up a false base station mimicking a legitimate one can utilize the vulnerabilities in the handover procedure to cause Denial-Of-Service attacks, Man-In-The-Middle attacks, and information disclosure affecting the user as well as the operator. Therefore, users' privacy and service availability are jeopardized. Through rigorous experimentation, we uncover the vulnerable parts of the handover procedure, a comprehensive attacker methodology, and attack requirements. We largely focus on the 5G network showing that handover vulnerabilities remain unmitigated to date. Finally, we assess the impact of the handover attacks, and carefully present potential countermeasures that can be used against them.",
keywords = "5G, Denial-of-service, False base stations, Handovers, LTE, Man-in-the-middle",
author = "Evangelos Bitsikas and Christina P{\"o}pper",
note = "Funding Information: This work was supported by the Abu Dhabi Award for Research Excellence (AARE) 2019 (#AARE19-236) and the Center for Cyber Security at New York University Abu Dhabi (NYUAD). Publisher Copyright: {\textcopyright} 2021 Copyright held by the owner/author(s). Publication rights licensed to ACM.",
year = "2021",
month = dec,
day = "6",
doi = "10.1145/3485832.3485914",
language = "English (US)",
volume = "2021",
series = "ACM International Conference Proceeding Series",
publisher = "Association for Computing Machinery (ACM)",
pages = "900--915",
booktitle = "Annual Computer Security Applications Conference",
address = "United States",
}