Cellular, wide-area, and non-terrestrial IoT: A survey on 5G advances and the road toward 6G
The next wave of wireless technologies is proliferating in connecting things among
themselves as well as to humans. In the era of the Internet of Things (IoT), billions of …
themselves as well as to humans. In the era of the Internet of Things (IoT), billions of …
Security and protocol exploit analysis of the 5G specifications
The third generation partnership project released its first 5G security specifications in March
2018. This paper reviews the proposed security architecture and its main requirements and …
2018. This paper reviews the proposed security architecture and its main requirements and …
Open, programmable, and virtualized 5G networks: State-of-the-art and the road ahead
Fifth generation (5G) cellular networks will serve a wide variety of heterogeneous use cases,
including mobile broadband users, ultra-low latency services and massively dense …
including mobile broadband users, ultra-low latency services and massively dense …
5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol
The paper proposes 5GReasoner, a framework for property-guided formal verification of
control-plane protocols spanning across multiple layers of the 5G protocol stack. The …
control-plane protocols spanning across multiple layers of the 5G protocol stack. The …
Touching the untouchables: Dynamic security analysis of the LTE control plane
This paper presents our extensive investigation of the security aspects of control plane
procedures based on dynamic testing of the control components in operational Long Term …
procedures based on dynamic testing of the control components in operational Long Term …
New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities
Cellular devices support various technical features and services for 2G, 3G, 4G and
upcoming 5G networks. For example, these technical features contain physical layer …
upcoming 5G networks. For example, these technical features contain physical layer …
[PDF][PDF] Privacy attacks to the 4G and 5G cellular paging protocols using side channel information
The cellular paging (broadcast) protocol strives to balance between a cellular device's
energy consumption and quality-of-service by allowing the device to only periodically poll for …
energy consumption and quality-of-service by allowing the device to only periodically poll for …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
[PDF][PDF] IMP4GT: IMPersonation Attacks in 4G NeTworks.
Long Term Evolution (LTE/4G) establishes mutual authentication with a provably secure
Authentication and Key Agreement (AKA) protocol on layer three of the network stack …
Authentication and Key Agreement (AKA) protocol on layer three of the network stack …
5G SUCI-Catchers: Still catching them all?
In mobile networks, IMSI-Catchers identify and track users simply by requesting all users'
permanent identities (IMSI) in range. The 5G standard attempts to fix this issue by encrypting …
permanent identities (IMSI) in range. The 5G standard attempts to fix this issue by encrypting …