Cellular, wide-area, and non-terrestrial IoT: A survey on 5G advances and the road toward 6G

M Vaezi, A Azari, SR Khosravirad… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
The next wave of wireless technologies is proliferating in connecting things among
themselves as well as to humans. In the era of the Internet of Things (IoT), billions of …

Security and protocol exploit analysis of the 5G specifications

RP Jover, V Marojevic - IEEE Access, 2019 - ieeexplore.ieee.org
The third generation partnership project released its first 5G security specifications in March
2018. This paper reviews the proposed security architecture and its main requirements and …

Open, programmable, and virtualized 5G networks: State-of-the-art and the road ahead

L Bonati, M Polese, S D'Oro, S Basagni, T Melodia - Computer Networks, 2020 - Elsevier
Fifth generation (5G) cellular networks will serve a wide variety of heterogeneous use cases,
including mobile broadband users, ultra-low latency services and massively dense …

5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol

SR Hussain, M Echeverria, I Karim… - Proceedings of the …, 2019 - dl.acm.org
The paper proposes 5GReasoner, a framework for property-guided formal verification of
control-plane protocols spanning across multiple layers of the 5G protocol stack. The …

Touching the untouchables: Dynamic security analysis of the LTE control plane

H Kim, J Lee, E Lee, Y Kim - 2019 IEEE Symposium on Security …, 2019 - ieeexplore.ieee.org
This paper presents our extensive investigation of the security aspects of control plane
procedures based on dynamic testing of the control components in operational Long Term …

New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities

A Shaik, R Borgaonkar, S Park, JP Seifert - Proceedings of the 12th …, 2019 - dl.acm.org
Cellular devices support various technical features and services for 2G, 3G, 4G and
upcoming 5G networks. For example, these technical features contain physical layer …

[PDF][PDF] Privacy attacks to the 4G and 5G cellular paging protocols using side channel information

SR Hussain, M Echeverria, O Chowdhury, N Li… - Network and distributed …, 2019 - par.nsf.gov
The cellular paging (broadcast) protocol strives to balance between a cellular device's
energy consumption and quality-of-service by allowing the device to only periodically poll for …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

[PDF][PDF] IMP4GT: IMPersonation Attacks in 4G NeTworks.

D Rupprecht, K Kohls, T Holz, C Pöpper - NDSS, 2020 - ndss-symposium.org
Long Term Evolution (LTE/4G) establishes mutual authentication with a provably secure
Authentication and Key Agreement (AKA) protocol on layer three of the network stack …

5G SUCI-Catchers: Still catching them all?

M Chlosta, D Rupprecht, C Pöpper, T Holz - Proceedings of the 14th …, 2021 - dl.acm.org
In mobile networks, IMSI-Catchers identify and track users simply by requesting all users'
permanent identities (IMSI) in range. The 5G standard attempts to fix this issue by encrypting …