Security and privacy for 6G: A survey on prospective technologies and challenges

VL Nguyen, PC Lin, BC Cheng… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-
ground integrated network environment, novel technologies, and an accessible user …

Security requirements and challenges of 6G technologies and applications

SA Abdel Hakeem, HH Hussein, HW Kim - Sensors, 2022 - mdpi.com
After implementing 5G technology, academia and industry started researching 6th
generation wireless network technology (6G). 6G is expected to be implemented around the …

Breaking LTE on layer two

D Rupprecht, K Kohls, T Holz… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
Long Term Evolution (LTE) is the latest mobile communication standard and has a pivotal
role in our information society: LTE combines performance goals with modern security …

LTEInspector: A systematic approach for adversarial testing of 4G LTE

S Hussain, O Chowdhury, S Mehnaz… - Network and Distributed …, 2018 - par.nsf.gov
In this paper, we investigate the security and privacy of the three critical procedures of the
4G LTE protocol (ie, attach, detach, and paging), and in the process, uncover potential …

5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol

SR Hussain, M Echeverria, I Karim… - Proceedings of the …, 2019 - dl.acm.org
The paper proposes 5GReasoner, a framework for property-guided formal verification of
control-plane protocols spanning across multiple layers of the 5G protocol stack. The …

Identity and content authentication for phone calls

PG Traynor, BG Reaves, LE Blue, L Vargas… - US Patent …, 2020 - Google Patents
H04L 9/32(2006.01) H04W 12/04(2009.01) H04L 29/06(2006.01) H04W 12/06(2009.01)
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …

[PDF][PDF] Privacy attacks to the 4G and 5G cellular paging protocols using side channel information

SR Hussain, M Echeverria, O Chowdhury, N Li… - Network and distributed …, 2019 - par.nsf.gov
The cellular paging (broadcast) protocol strives to balance between a cellular device's
energy consumption and quality-of-service by allowing the device to only periodically poll for …

[PDF][PDF] IMP4GT: IMPersonation Attacks in 4G NeTworks.

D Rupprecht, K Kohls, T Holz, C Pöpper - NDSS, 2020 - ndss-symposium.org
Long Term Evolution (LTE/4G) establishes mutual authentication with a provably secure
Authentication and Key Agreement (AKA) protocol on layer three of the network stack …

On security research towards future mobile network generations

D Rupprecht, A Dabrowski, T Holz… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last decades, numerous security and privacy issues in all three active mobile
network generations have been revealed that threaten users as well as network providers. In …

5G SUCI-Catchers: Still catching them all?

M Chlosta, D Rupprecht, C Pöpper, T Holz - Proceedings of the 14th …, 2021 - dl.acm.org
In mobile networks, IMSI-Catchers identify and track users simply by requesting all users'
permanent identities (IMSI) in range. The 5G standard attempts to fix this issue by encrypting …