Open, programmable, and virtualized 5G networks: State-of-the-art and the road ahead
Fifth generation (5G) cellular networks will serve a wide variety of heterogeneous use cases,
including mobile broadband users, ultra-low latency services and massively dense …
including mobile broadband users, ultra-low latency services and massively dense …
Securing UAV flying base station for mobile networking: A review
A flying base station based on an unmanned aerial vehicle (UAV) uses its mobility to extend
its connectivity coverage and improve its communication channel quality to achieve a …
its connectivity coverage and improve its communication channel quality to achieve a …
Open RAN: A concise overview
MS Wani, M Kretschmer, B Schröder… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
Open RAN has emerged as a transformative approach in the evolution of cellular networks,
addressing challenges posed by modern applications and high network density. By …
addressing challenges posed by modern applications and high network density. By …
Trust in 5G open RANs through machine learning: RF fingerprinting on the POWDER PAWR platform
G Reus-Muns, D Jaisinghani, K Sankhe… - … 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
5G and open radio access networks (Open RANs) will result in vendor-neutral hardware
deployment that will require additional diligence towards managing security risks. This new …
deployment that will require additional diligence towards managing security risks. This new …
Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers
C Yu, S Chen, F Wang, Z Wei - Computer Networks, 2021 - Elsevier
Abstract The 4G/Long Term Evolution (LTE) has become the dominant mobile access
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …
Bookworm game: Automatic discovery of lte vulnerabilities through documentation analysis
In the past decade, the security of cellular networks has been increasingly under scrutiny,
leading to the discovery of numerous vulnerabilities that expose the network and its users to …
leading to the discovery of numerous vulnerabilities that expose the network and its users to …
On the criticality of integrity protection in 5G fronthaul networks
The modern 5G fronthaul, which connects the base stations to radio units in cellular
networks, is designed to deliver microsecond-level performance guarantees using Ethernet …
networks, is designed to deliver microsecond-level performance guarantees using Ethernet …
From 5g sniffing to harvesting leakages of privacy-preserving messengers
We present the first open-source tool capable of efficiently sniffing 5G control channels,
5GSniffer and demonstrate its potential to conduct attacks on users privacy. 5GSniffer builds …
5GSniffer and demonstrate its potential to conduct attacks on users privacy. 5GSniffer builds …
[PDF][PDF] FIRMWIRE: Transparent dynamic analysis for cellular baseband firmware
Smartphones today leverage baseband processors to implement the multitude of cellular
protocols. Basebands execute firmware, which is responsible for decoding hundreds of …
protocols. Basebands execute firmware, which is responsible for decoding hundreds of …
{BASECOMP}: A Comparative Analysis for Integrity Protection in Cellular Baseband Software
Baseband software is an important component in cellular communication. Unfortunately, it is
almost impossible to implement baseband software correctly due to the complexity and the …
almost impossible to implement baseband software correctly due to the complexity and the …