Edge computing security: State of the art and challenges
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …
years have been dramatically incentivizing the advancement of edge computing. On the one …
Understanding operational 5G: A first measurement study on its coverage, performance and energy consumption
5G, as a monumental shift in cellular communication technology, holds tremendous potential
for spurring innovations across many vertical industries, with its promised multi-Gbps speed …
for spurring innovations across many vertical industries, with its promised multi-Gbps speed …
LTEInspector: A systematic approach for adversarial testing of 4G LTE
In this paper, we investigate the security and privacy of the three critical procedures of the
4G LTE protocol (ie, attach, detach, and paging), and in the process, uncover potential …
4G LTE protocol (ie, attach, detach, and paging), and in the process, uncover potential …
5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol
The paper proposes 5GReasoner, a framework for property-guided formal verification of
control-plane protocols spanning across multiple layers of the 5G protocol stack. The …
control-plane protocols spanning across multiple layers of the 5G protocol stack. The …
Touching the untouchables: Dynamic security analysis of the LTE control plane
This paper presents our extensive investigation of the security aspects of control plane
procedures based on dynamic testing of the control components in operational Long Term …
procedures based on dynamic testing of the control components in operational Long Term …
A survey on handover management in mobility architectures
This work presents a comprehensive and structured taxonomy of available techniques for
managing the handover process in mobility architectures. Representative works from the …
managing the handover process in mobility architectures. Representative works from the …
Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers
C Yu, S Chen, F Wang, Z Wei - Computer Networks, 2021 - Elsevier
Abstract The 4G/Long Term Evolution (LTE) has become the dominant mobile access
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …
Bookworm game: Automatic discovery of lte vulnerabilities through documentation analysis
In the past decade, the security of cellular networks has been increasingly under scrutiny,
leading to the discovery of numerous vulnerabilities that expose the network and its users to …
leading to the discovery of numerous vulnerabilities that expose the network and its users to …
[PDF][PDF] GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier.
To keep subscribers' identity confidential, a cellular network operator must use a temporary
identifier instead of a permanent one according to the 3GPP standard. Temporary identifiers …
identifier instead of a permanent one according to the 3GPP standard. Temporary identifiers …
{DoLTEst}: In-depth downlink negative testing framework for {LTE} devices
An implementation flaw in LTE control plane protocols at end-user devices directly leads to
severe security threats. In order to uncover these flaws, conducting negative testing is a …
severe security threats. In order to uncover these flaws, conducting negative testing is a …