Security and privacy for 6G: A survey on prospective technologies and challenges
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-
ground integrated network environment, novel technologies, and an accessible user …
ground integrated network environment, novel technologies, and an accessible user …
Security requirements and challenges of 6G technologies and applications
After implementing 5G technology, academia and industry started researching 6th
generation wireless network technology (6G). 6G is expected to be implemented around the …
generation wireless network technology (6G). 6G is expected to be implemented around the …
Breaking LTE on layer two
Long Term Evolution (LTE) is the latest mobile communication standard and has a pivotal
role in our information society: LTE combines performance goals with modern security …
role in our information society: LTE combines performance goals with modern security …
LTEInspector: A systematic approach for adversarial testing of 4G LTE
In this paper, we investigate the security and privacy of the three critical procedures of the
4G LTE protocol (ie, attach, detach, and paging), and in the process, uncover potential …
4G LTE protocol (ie, attach, detach, and paging), and in the process, uncover potential …
5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol
The paper proposes 5GReasoner, a framework for property-guided formal verification of
control-plane protocols spanning across multiple layers of the 5G protocol stack. The …
control-plane protocols spanning across multiple layers of the 5G protocol stack. The …
Identity and content authentication for phone calls
H04L 9/32(2006.01) H04W 12/04(2009.01) H04L 29/06(2006.01) H04W 12/06(2009.01)
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …
[PDF][PDF] Privacy attacks to the 4G and 5G cellular paging protocols using side channel information
The cellular paging (broadcast) protocol strives to balance between a cellular device's
energy consumption and quality-of-service by allowing the device to only periodically poll for …
energy consumption and quality-of-service by allowing the device to only periodically poll for …
[PDF][PDF] IMP4GT: IMPersonation Attacks in 4G NeTworks.
Long Term Evolution (LTE/4G) establishes mutual authentication with a provably secure
Authentication and Key Agreement (AKA) protocol on layer three of the network stack …
Authentication and Key Agreement (AKA) protocol on layer three of the network stack …
On security research towards future mobile network generations
Over the last decades, numerous security and privacy issues in all three active mobile
network generations have been revealed that threaten users as well as network providers. In …
network generations have been revealed that threaten users as well as network providers. In …
5G SUCI-Catchers: Still catching them all?
In mobile networks, IMSI-Catchers identify and track users simply by requesting all users'
permanent identities (IMSI) in range. The 5G standard attempts to fix this issue by encrypting …
permanent identities (IMSI) in range. The 5G standard attempts to fix this issue by encrypting …