On security research towards future mobile network generations

D Rupprecht, A Dabrowski, T Holz… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last decades, numerous security and privacy issues in all three active mobile
network generations have been revealed that threaten users as well as network providers. In …

Breaking LTE on layer two

D Rupprecht, K Kohls, T Holz… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
Long Term Evolution (LTE) is the latest mobile communication standard and has a pivotal
role in our information society: LTE combines performance goals with modern security …

Bookworm game: Automatic discovery of lte vulnerabilities through documentation analysis

Y Chen, Y Yao, XF Wang, D Xu, C Yue… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
In the past decade, the security of cellular networks has been increasingly under scrutiny,
leading to the discovery of numerous vulnerabilities that expose the network and its users to …

Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers

C Yu, S Chen, F Wang, Z Wei - Computer Networks, 2021 - Elsevier
Abstract The 4G/Long Term Evolution (LTE) has become the dominant mobile access
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …

LTE/LTE-A network security data collection and analysis for security measurement: A survey

L He, Z Yan, M Atiquzzaman - IEEE Access, 2018 - ieeexplore.ieee.org
The long-term evolution (LTE)/LTE-advanced (LTE-A) network provides advanced services
for billions of users with its higher bandwidths, better spectrum efficiency, and lower latency …

Breaking and fixing volte: Exploiting hidden data channels and mis-implementations

H Kim, D Kim, M Kwon, H Han, Y Jang, D Han… - Proceedings of the …, 2015 - dl.acm.org
Long Term Evolution (LTE) is becoming the dominant cellular networking technology,
shifting the cellular network away from its circuit-switched legacy towards a packet-switched …

[HTML][HTML] Threat modeling framework for mobile communication systems

SP Rao, HY Chen, T Aura - Computers & Security, 2023 - Elsevier
This paper presents a domain-specific threat-modeling framework for the cellular mobile
networks. We survey known attacks against mobile communication and organize them into …

Transparent AAA security design for low-latency MEC-integrated cellular networks

CY Li, YD Lin, YC Lai, HT Chien… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Multi-access edge computing (MEC) is a key enabler for low-latency services in the cellular
network. It enables service requests to be served at the edge without reaching the Internet …

PROV5GC: Hardening 5G core network security with attack detection and attribution based on provenance graphs

HS Pacherkar, G Yan - Proceedings of the 17th ACM Conference on …, 2024 - dl.acm.org
As 5G networks become part of the critical infrastructures whose dysfunctions can cause
severe damages to society, their security has been increasingly scrutinized. Recent works …

How can IoT services pose new security threats in operational cellular networks?

T **e, GH Tu, CY Li, C Peng - IEEE Transactions on Mobile …, 2020 - ieeexplore.ieee.org
Carriers are rolling out Internet of Things (IoT) services including various IoT devices and
use scenarios. Compared with conventional non-IoT devices such as smartphones and …