A survey on 5G and LPWAN-IoT for improved smart cities and remote area applications: From the aspect of architecture and security
Addressing the recent trend of the massive demand for resources and ubiquitous use for all
citizens has led to the conceptualization of technologies such as the Internet of Things (IoT) …
citizens has led to the conceptualization of technologies such as the Internet of Things (IoT) …
On security research towards future mobile network generations
Over the last decades, numerous security and privacy issues in all three active mobile
network generations have been revealed that threaten users as well as network providers. In …
network generations have been revealed that threaten users as well as network providers. In …
Breaking LTE on layer two
Long Term Evolution (LTE) is the latest mobile communication standard and has a pivotal
role in our information society: LTE combines performance goals with modern security …
role in our information society: LTE combines performance goals with modern security …
Component-based formal analysis of 5G-AKA: Channel assumptions and session confusion
The 5G mobile telephony standards are nearing completion; upon adoption these will be
used by billions across the globe. Ensuring the security of 5G communication is of the utmost …
used by billions across the globe. Ensuring the security of 5G communication is of the utmost …
[PDF][PDF] IMP4GT: IMPersonation Attacks in 4G NeTworks.
Long Term Evolution (LTE/4G) establishes mutual authentication with a provably secure
Authentication and Key Agreement (AKA) protocol on layer three of the network stack …
Authentication and Key Agreement (AKA) protocol on layer three of the network stack …
[HTML][HTML] Threat modeling framework for mobile communication systems
This paper presents a domain-specific threat-modeling framework for the cellular mobile
networks. We survey known attacks against mobile communication and organize them into …
networks. We survey known attacks against mobile communication and organize them into …
A survey on authentication and access control for mobile networks: from 4G to 5G
The next generation of mobile networks, 5G, is expected to support a set of multiple
requirements and use cases that will create an improved user experience. 5G will also be …
requirements and use cases that will create an improved user experience. 5G will also be …
A formal treatment of accountable proxying over TLS
Much of Internet traffic nowadays passes through active proxies, whose role is to inspect,
filter, cache, or transform data exchanged between two endpoints. To perform their tasks …
filter, cache, or transform data exchanged between two endpoints. To perform their tasks …
Securing authentication for mobile networks, a survey on 4G issues and 5G answers
The upcoming fifth generation of mobile networks is expected to support a set of many
requirements and use cases. However, it should be able to provide a high level of security …
requirements and use cases. However, it should be able to provide a high level of security …
Security in low-power wide-area networks: State-of-the-art and development toward the 5G
The chapter delivers the detailed discussion of the potential security threats, features, and
mechanisms for the low-power wide-area (LPWA) networks in general, and the three …
mechanisms for the low-power wide-area (LPWA) networks in general, and the three …