The present disclosure relates generally to wireless communications and more particularly to preventing the misuse of the random access procedure by malicious user terminals in wireless communication systems.
In 3GPP LTE, the RACH procedure consists of a UE sending a random access (RA) preamble to the eNB in a RACH occasion and receiving a random access response from the eNB. The RA response includes the RACH preamble used, a temporary C-RNTI assignment, and an UL resource assignment. The UE transmits “message 3” on the resource assigned in the RA response. The RA response is addressed (on the PDCCH) to the RA-RNTI corresponding to the RACH occasion that was used by the UE to transmit the RA preamble. In the contention based RACH procedure, message 3 can be an RRC Connection establishment request or an RRC Connection Re-establishment request. Below we show that the RACH procedure has a loophole that a malicious UE can exploit to deny service to other UEs. The LTE random access procedure is illustrated in
Prior art FIG. 2 illustrates a known procedure for exploiting a RACH loophole. The malicious UE can simply listen for RA responses (by searching for valid RA-RNTIs on the PDCCH) and acquire the UL grants. It can then use the resource assigned in the UL grant to send a fake message 3. For example, the malicious UE sends an RRC Connection Re-establishment request as message 3 including in it a randomly chosen MAC-I, any C-RNTI and PCI. The eNB cannot identify the UE requesting the re-establishment; therefore it rejects the RRC connection establishment. The legitimate UE may have started the RACH procedure for an RRC connection re-establishment or an RRC connection establishment. In both cases the legitimate UE's attempt to send message 3 fails and it re-attempts the procedure. The malicious UE repeats the procedure and this leads to a denial of service to the legitimate UE.
Even with the non-contention RACH procedure, a malicious UE can deny service to the legitimate UE. For example, when UE performs a RACH for UL synchronization to a target cell during a handover, the malicious UE can capture the RA response and use the resource indicated in the UL grant to send an RRC connection re-establishment request indicating a handover failure. This leads the legitimate UE eventually to a handover failure.
The current LTE MAC specification TS 36.321 lists the structure of the Random access response message as illustrated in
The various aspects, features and advantages of the disclosure will become more fully apparent to those having ordinary skill in the art upon a careful consideration of the following Detailed Description thereof with the accompanying drawings described below. The drawings may have been simplified for clarity and are not necessarily drawn to scale.
The disclosure focuses on constructing the Random access response such that only the intended UE can correctly utilize the UL grant included in it.
In a first embodiment of the disclosure, the UL grant is scrambled within the RA response message so that the malicious UE cannot correctly decode it. According to this embodiment, the eNB is configured to: compute a CRC over the MAC RAR block (shown in
A UE that receives the RA response message and the MAC RAR block within it is configured to de-scramble the received MAC RAR block and the corresponding received CRC using the RA preamble it transmitted to obtain RAR-descrambled and CRC-descrambled respectively; and compute the CRC of RAR-descrambled. If the CRC of RAR-descrambled is equal to CRC-descrambled, then the UE considers the RAR to be intended for itself. Otherwise, the RAR is intended for a different UE. The RA preamble used by the legitimate UE is not known to the malicious UE. A malicious UE would have to try all of the 64 RA preambles to try to successfully decode the message. The CRC can be transmitted in place of the RA preamble ID (“RAPID”) in the current PDU structure.
According to another embodiment of the disclosure, the eNB addresses the RA response message to an RNTI that is offset from the (actual) RA-RNTI by the RA preamble received. Currently after transmitting a RACH preamble a UE awaits an RA response message addressed to an RA-RNTI, where RA-RNTI is t_id+10×f_id; where 0≦t_id<10 and 0≦f_id<6. The maximum value of the RA-RNTI is 59. Instead of this UE would await an RA response message addressed to an RNTI t_id+10×f_id+(pr×64), where pr is the RA-preamble received by the eNB. This ensures that the 6 least significant bits of the RNTI are the RA-RNTI and the next 6 least significant bits are the preamble pr.
A UE receives the RA response message by looking for the correct RNTI and a malicious UE is unable to determine the correct RNTI to look for because it is not aware of the RA preamble transmitted by the legitimate UE. This embodiment can be implemented entirely as a change in the MAC specification. It also eliminates the need to echo the RA preamble in the RA response message, thus making the RA response message smaller. Note that currently the MAC specification allows multiple RA responses to be included in a single RA response message. For the second embodiment to be used only one RA response can be included in a RA response message and this would require a change to the 3GPP LTE MAC specification.
According to a third embodiment of the disclosure, the eNB transmits a bit string S which is the result of applying a scrambling function SCR on the RA preamble ID. The intended UE can use this for verification. eNB assigns a resource R for message 3 transmission by signaling resource R+f(pr) in the UL grant, where pr is the RA preamble transmitted by the UE, and f is a function that maps preambles to discrete numerical offsets. The offsets can be either frequency offsets or time offsets. Note that if frequency offsets are used, f depends on the cell bandwidth.
A UE that receives the RA response message de-scrambles all the scrambled preamble IDs received and checks to see if the results include the preamble it transmitted. If the preamble ID it transmitted is included, it determines the starting resource block for message 3 transmission from the RB R′ signaled in the RA response as R′−f(pr).
While the present disclosure and the best modes thereof have been described in a manner establishing possession and enabling those of ordinary skill to make and use the same, it will be understood and appreciated that there are equivalents to the exemplary embodiments disclosed herein and that modifications and variations may be made thereto without departing from the scope and spirit of the inventions, which are to be limited not by the exemplary embodiments but by the appended claims.
Number | Date | Country | |
---|---|---|---|
61088230 | Aug 2008 | US |