Edge computing security: State of the art and challenges

Y **ao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

Understanding operational 5G: A first measurement study on its coverage, performance and energy consumption

D Xu, A Zhou, X Zhang, G Wang, X Liu, C An… - Proceedings of the …, 2020 - dl.acm.org
5G, as a monumental shift in cellular communication technology, holds tremendous potential
for spurring innovations across many vertical industries, with its promised multi-Gbps speed …

LTEInspector: A systematic approach for adversarial testing of 4G LTE

S Hussain, O Chowdhury, S Mehnaz… - Network and Distributed …, 2018 - par.nsf.gov
In this paper, we investigate the security and privacy of the three critical procedures of the
4G LTE protocol (ie, attach, detach, and paging), and in the process, uncover potential …

5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol

SR Hussain, M Echeverria, I Karim… - Proceedings of the …, 2019 - dl.acm.org
The paper proposes 5GReasoner, a framework for property-guided formal verification of
control-plane protocols spanning across multiple layers of the 5G protocol stack. The …

Touching the untouchables: Dynamic security analysis of the LTE control plane

H Kim, J Lee, E Lee, Y Kim - 2019 IEEE Symposium on Security …, 2019 - ieeexplore.ieee.org
This paper presents our extensive investigation of the security aspects of control plane
procedures based on dynamic testing of the control components in operational Long Term …

A survey on handover management in mobility architectures

S Ferretti, V Ghini, F Panzieri - Computer Networks, 2016 - Elsevier
This work presents a comprehensive and structured taxonomy of available techniques for
managing the handover process in mobility architectures. Representative works from the …

Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers

C Yu, S Chen, F Wang, Z Wei - Computer Networks, 2021 - Elsevier
Abstract The 4G/Long Term Evolution (LTE) has become the dominant mobile access
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …

Bookworm game: Automatic discovery of lte vulnerabilities through documentation analysis

Y Chen, Y Yao, XF Wang, D Xu, C Yue… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
In the past decade, the security of cellular networks has been increasingly under scrutiny,
leading to the discovery of numerous vulnerabilities that expose the network and its users to …

[PDF][PDF] GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier.

B Hong, S Bae, Y Kim - NDSS, 2018 - ndss-symposium.org
To keep subscribers' identity confidential, a cellular network operator must use a temporary
identifier instead of a permanent one according to the 3GPP standard. Temporary identifiers …

{DoLTEst}: In-depth downlink negative testing framework for {LTE} devices

CJ Park, S Bae, BS Oh, J Lee, E Lee, I Yun… - 31st USENIX Security …, 2022 - usenix.org
An implementation flaw in LTE control plane protocols at end-user devices directly leads to
severe security threats. In order to uncover these flaws, conducting negative testing is a …