Open, programmable, and virtualized 5G networks: State-of-the-art and the road ahead

L Bonati, M Polese, S D'Oro, S Basagni, T Melodia - Computer Networks, 2020 - Elsevier
Fifth generation (5G) cellular networks will serve a wide variety of heterogeneous use cases,
including mobile broadband users, ultra-low latency services and massively dense …

Securing UAV flying base station for mobile networking: A review

SY Chang, K Park, J Kim, J Kim - Future Internet, 2023 - mdpi.com
A flying base station based on an unmanned aerial vehicle (UAV) uses its mobility to extend
its connectivity coverage and improve its communication channel quality to achieve a …

Open RAN: A concise overview

MS Wani, M Kretschmer, B Schröder… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
Open RAN has emerged as a transformative approach in the evolution of cellular networks,
addressing challenges posed by modern applications and high network density. By …

Trust in 5G open RANs through machine learning: RF fingerprinting on the POWDER PAWR platform

G Reus-Muns, D Jaisinghani, K Sankhe… - … 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
5G and open radio access networks (Open RANs) will result in vendor-neutral hardware
deployment that will require additional diligence towards managing security risks. This new …

Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers

C Yu, S Chen, F Wang, Z Wei - Computer Networks, 2021 - Elsevier
Abstract The 4G/Long Term Evolution (LTE) has become the dominant mobile access
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …

Bookworm game: Automatic discovery of lte vulnerabilities through documentation analysis

Y Chen, Y Yao, XF Wang, D Xu, C Yue… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
In the past decade, the security of cellular networks has been increasingly under scrutiny,
leading to the discovery of numerous vulnerabilities that expose the network and its users to …

On the criticality of integrity protection in 5G fronthaul networks

J **ng, S Yoo, X Foukas, D Kim, MK Reiter - 33rd USENIX Security …, 2024 - usenix.org
The modern 5G fronthaul, which connects the base stations to radio units in cellular
networks, is designed to deliver microsecond-level performance guarantees using Ethernet …

From 5g sniffing to harvesting leakages of privacy-preserving messengers

N Ludant, P Robyns, G Noubir - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
We present the first open-source tool capable of efficiently sniffing 5G control channels,
5GSniffer and demonstrate its potential to conduct attacks on users privacy. 5GSniffer builds …

[PDF][PDF] FIRMWIRE: Transparent dynamic analysis for cellular baseband firmware

G Hernandez, M Muench, D Maier, A Milburn… - Network and …, 2022 - par.nsf.gov
Smartphones today leverage baseband processors to implement the multitude of cellular
protocols. Basebands execute firmware, which is responsible for decoding hundreds of …

{BASECOMP}: A Comparative Analysis for Integrity Protection in Cellular Baseband Software

E Kim, MW Baek, CJ Park, D Kim, Y Kim… - 32nd USENIX Security …, 2023 - usenix.org
Baseband software is an important component in cellular communication. Unfortunately, it is
almost impossible to implement baseband software correctly due to the complexity and the …