On security research towards future mobile network generations
Over the last decades, numerous security and privacy issues in all three active mobile
network generations have been revealed that threaten users as well as network providers. In …
network generations have been revealed that threaten users as well as network providers. In …
[HTML][HTML] A technical review of wireless security for the internet of things: Software defined radio perspective
The increase of cyberattacks by using the Internet of Things devices has exposed multiple
vulnerabilities not only on devices but also on IoT infrastructures. Now, small devices can …
vulnerabilities not only on devices but also on IoT infrastructures. Now, small devices can …
Breaking LTE on layer two
Long Term Evolution (LTE) is the latest mobile communication standard and has a pivotal
role in our information society: LTE combines performance goals with modern security …
role in our information society: LTE combines performance goals with modern security …
5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol
The paper proposes 5GReasoner, a framework for property-guided formal verification of
control-plane protocols spanning across multiple layers of the 5G protocol stack. The …
control-plane protocols spanning across multiple layers of the 5G protocol stack. The …
[PDF][PDF] IMP4GT: IMPersonation Attacks in 4G NeTworks.
Long Term Evolution (LTE/4G) establishes mutual authentication with a provably secure
Authentication and Key Agreement (AKA) protocol on layer three of the network stack …
Authentication and Key Agreement (AKA) protocol on layer three of the network stack …
5G SUCI-Catchers: Still catching them all?
In mobile networks, IMSI-Catchers identify and track users simply by requesting all users'
permanent identities (IMSI) in range. The 5G standard attempts to fix this issue by encrypting …
permanent identities (IMSI) in range. The 5G standard attempts to fix this issue by encrypting …
Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers
C Yu, S Chen, F Wang, Z Wei - Computer Networks, 2021 - Elsevier
Abstract The 4G/Long Term Evolution (LTE) has become the dominant mobile access
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …
Bookworm game: Automatic discovery of lte vulnerabilities through documentation analysis
In the past decade, the security of cellular networks has been increasingly under scrutiny,
leading to the discovery of numerous vulnerabilities that expose the network and its users to …
leading to the discovery of numerous vulnerabilities that expose the network and its users to …
Hiding in plain signal: Physical signal overshadowing attack on {LTE}
Long-Term Evolution (LTE) communication is based on an open medium; thus, a legitimate
signal can potentially be counterfeited by a malicious signal. Although most LTE signaling …
signal can potentially be counterfeited by a malicious signal. Although most LTE signaling …
Call me maybe: Eavesdrop** encrypted {LTE} calls with {ReVoLTE}
Voice over LTE (VoLTE) is a packet-based telephony service seamlessly integrated into the
Long Term Evolution (LTE) standard and deployed by most telecommunication providers in …
Long Term Evolution (LTE) standard and deployed by most telecommunication providers in …