Award Abstract # 1421933
TWC: Small: Collaborative: Secure Data Charging Architecture for Mobile Devices in 3G/4G Cellular Networks: Vulnerabilities and Solutions

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: OHIO STATE UNIVERSITY, THE
Initial Amendment Date: June 20, 2014
Latest Amendment Date: June 20, 2014
Award Number: 1421933
Award Instrument: Standard Grant
Program Manager: Thyagarajan Nandagopal
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: July 1, 2014
End Date: December 31, 2017 (Estimated)
Total Intended Award Amount: $245,581.00
Total Awarded Amount to Date: $245,581.00
Funds Obligated to Date: FY 2014 = $166,996.00
History of Investigator:
  • Chunyi Peng (Principal Investigator)
    chunyi@purdue.edu
Recipient Sponsored Research Office: Ohio State University
1960 KENNY RD
COLUMBUS
OH  US  43210-1016
(614)688-8735
Sponsor Congressional District: 03
Primary Place of Performance: Ohio State University
2015 Neil Ave
Columbus
OH  US  43210-1277
Primary Place of Performance
Congressional District:
03
Unique Entity Identifier (UEI): DLWBSLWAJWR1
Parent UEI: MN4MDDMN8529
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01001415DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 7434, 7923, 9102
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Wireless cellular networks serve as an essential cyber-infrastructure for mobile users. Unlike the Internet, cellular networks have adopted usage-based charging, rather than the simpler flat-rate charging. Data-plan subscribers have to pay their data bills based on the consumed traffic volume in 3G/4G networks. Although this metered charging system has been operational and generally successful for years, the security study of such a system remains largely unaddressed. The objective of this research is to investigate the insecurity aspects of large-scale cellular network infrastructures, identify their security loopholes, sketch novel attacks that exploit such loopholes, devise defenses that protect from such attacks, and validate the attacks and the defenses via real experiments in operational carriers. The proposed study helps us to better understand how various forms of vulnerabilities exhibit in the cellular system, open new venue for secure system design and operations, and refine the networking design that makes both the infrastructure and the user devices more resilient against malicious threats.

By addressing the key security issues of mobile data charging, the proposed research helps to protect the multi-trillion dollar network operations. It not only secures revenues of global cellular operators, but also protects the monetary rights of billions of mobile users. The proposed solutions will help to renovate the existing network infrastructure, and shape the upcoming 5G cellular technology in its standardization. It will also train a new generation of engineers and students in this field. The PIs will interact closely with industry for possible technology transfer.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Chiyu Li, Guanhua Tu, Chunyi Peng, Zengwen Yuan, Yuanjie Li, Songwu Lu, Xinbing Wang "Insecurity of Voice Solution VoLTE in LTE Mobile Networks" Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS'15) , Denver, Colorado, Oct. 2015. , 2015
Chunyi Peng, Chiyu Li, Hongyi Wang, Guanhua Tu, Songwu Lu "Real Threats to Your Data Bills: Security Loopholes and Defense in Mobile Data Charging" Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS'14 ), Scottsdale, Arizona, Nov. 2014 , 2014
Guanhua Tu, Chiyu Li, Chunyi Peng, Songwu Lu "How Voice Call Technology Poses Security Threats in 4G LTE Networks" proceedings of tthe IEEE Conference on Communications and Network Security(CNS'15),Florence, Italy, Sep. 2015. , 2015

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page