A Platform Based on srsRAN for Security Research in LTE Network

Shanshan Shen*, Hai Li

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Because of the fully IP-based heterogeneous network architecture, the Long-Term Evolution (LTE) network faces the threats of malicious attacks. Generally, the open-source Software-Definition Radio (SDR) can be used for attack verification in LTE network. In order to improve research efficiency, we develop a platform based on OAI for attack verification in LTE network, which is called LEAP. However, due to the limitations and flaws of LEAP, we further improve it and develop a platform based on srsRAN for security research in LTE network, which is called LSCAP. LSCAP provides the functions of strategies control, front-end interaction and security data collection. In addition, it uses multi-threading technology to better support the verification of concurrent attacks. Therefore, LSCAP is better at scalability and flexibility than LEAP. In this article, we will introduce the system design of LSCAP and our improvement on LEAP.

Original languageEnglish
Title of host publication2023 4th Information Communication Technologies Conference, ICTC 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages40-43
Number of pages4
ISBN (Electronic)9781665462587
DOIs
Publication statusPublished - 2023
Event4th Information Communication Technologies Conference, ICTC 2023 - Nanjing, China
Duration: 17 May 202319 May 2023

Publication series

Name2023 4th Information Communication Technologies Conference, ICTC 2023

Conference

Conference4th Information Communication Technologies Conference, ICTC 2023
Country/TerritoryChina
CityNanjing
Period17/05/2319/05/23

Keywords

  • LTE
  • attack verification
  • network security
  • srsRAN

Fingerprint

Dive into the research topics of 'A Platform Based on srsRAN for Security Research in LTE Network'. Together they form a unique fingerprint.

Cite this