Security threats against LTE networks: A survey

K Vachhani - Security in Computing and Communications: 6th …, 2019 - Springer
… towards threats like passive radio jamming, botnet of mobile devices … leak its IMSI, spoofing
system informations at control … reselection priority list can be sniffed and apparently used to …

This is your president speaking: Spoofing alerts in 4G LTE networks

G Lee, J Lee, J Lee, Y Im, M Hollingsworth… - Proceedings of the 17th …, 2019 - dl.acm.org
… We present our threat analysis on the CMAS spoofing attack, and implement an effective …
LTE/LTE-A jamming, spoofing, and sniffing: threat assessment and mitigation. IEEE …

Lte is vulnerable: Implementing identity spoofing and denial-of-service attacks in lte networks

T Fei, W Wang - 2019 IEEE Global Communications …, 2019 - ieeexplore.ieee.org
… Specifically, we use modified UE application to sniff and decode SIB messages broadcasted
by … Lte/lte-a jamming, spoofing, and sniffing: threat assessment and mitigation. IEEE …

Jamming and jamming mitigation for selected 5G military scenarios

P Skokowski, JM Kelner, K Malon, K Maślanka… - Procedia Computer …, 2022 - Elsevier
… We also present a quality analysis of adequate solutions for 5G to mitigate the jamming
and … Reed, and RP Jover, “5G NR jamming, spoofing, and sniffing: Threat assessment and …

A brief review on security issues and counter measure techniques for future generation communication system (LTE/LTE-A)

D Sagar, M Saidi Reddy - Multimedia Tools and Applications, 2024 - Springer
… This leads to a reduction in spectrum due to the spectrum. Cognitive radio (CR) is becoming
… RF jamming, spoofing and sniffing and examines the various physical threats that threaten

Towards resilient 5G: Lessons learned from experimental evaluations of LTE uplink jamming

F Girke, F Kurtz, N Dorsch… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Evaluation results reveal the criticality of such attacks, severely destabilizing Critical
Infrastructures, while minimizing attacker exposure. Finally we derive possible mitigations … …

[PDF][PDF] A Countermeasure against Smart Jamming Attacks on LTE Synchronization Signals.

M Eygi, GK Kurt - J. Commun., 2020 - pdfs.semanticscholar.org
… the PSS or SSS spoofing could be efficient as well as jamming. … In our situation, the jammer
sniffs the LTE DL transmission to … In these cases, our mitigation method advantages much …

LTE security disabled: misconfiguration in commercial networks

M Chlosta, D Rupprecht, T Holz, C Pöpper - Proceedings of the 12th …, 2019 - dl.acm.org
… Users can be steered to rogue base stations by jamming attacks [13, 17]. While prior rogue
base stations focused on localization or downgrades, we used them for the impersonation …

Breaking LTE on layer two

D Rupprecht, K Kohls, T Holz… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
… requests and then perform a DNS spoofing attack. As a result, … ), LTE can be the target of
jamming attacks that aim to deny the … In conclusion, it is preferable to use the downlink sniffer on …

Anomaly Detection Algorithms for Location Security in 5G Scenarios

S Bartoletti, I Palamà, D Orlando, G Bianchi… - arXiv preprint arXiv …, 2021 - arxiv.org
… -jamming techniques in the context of cognitive radio networks are addressed in [30], where
several mitigation techniques are reviewed and a new anti-jamming … In [34], a pilot spoofing