Lte is vulnerable: Implementing identity spoofing and denial-of-service attacks in lte networks

T Fei, W Wang - 2019 IEEE Global Communications …, 2019 - ieeexplore.ieee.org
Recent years have witnessed the rapid growth of mobile users, which further accelerates the
deployment of mobile communication networks, especially LTE networks, due to its high …

User-targeted denial-of-service attacks in LTE mobile networks

R Ghannam, F Sharevski… - 2018 14th International …, 2018 - ieeexplore.ieee.org
Mobile networks are prevalent in today's world, being used in a variety of applications
ranging from personal use to the work environment and other. Ensuring security for users in …

On effects of mobility management signalling based dos attacks against lte terminals

C Yu, S Chen - 2019 IEEE 38th International Performance …, 2019 - ieeexplore.ieee.org
Long Term Evolution (LTE) has become the most mature and stable mobile communication
network technology worldwide so far. Billions of mobile subscribers are using LTE networks …

Practical attacks against privacy and availability in 4G/LTE mobile communication systems

A Shaik, R Borgaonkar, N Asokan, V Niemi… - arXiv preprint arXiv …, 2015 - arxiv.org
Mobile communication systems now constitute an essential part of life throughout the world.
Fourth generation" Long Term Evolution"(LTE) mobile communication networks are being …

Touching the untouchables: Dynamic security analysis of the LTE control plane

H Kim, J Lee, E Lee, Y Kim - 2019 IEEE Symposium on Security …, 2019 - ieeexplore.ieee.org
This paper presents our extensive investigation of the security aspects of control plane
procedures based on dynamic testing of the control components in operational Long Term …

Breaking LTE on layer two

D Rupprecht, K Kohls, T Holz… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
Long Term Evolution (LTE) is the latest mobile communication standard and has a pivotal
role in our information society: LTE combines performance goals with modern security …

Security threats against LTE networks: A survey

K Vachhani - Security in Computing and Communications: 6th …, 2019 - Springer
Mobile Networks are rapidly moving from architectures based on GSM and 3 G to LTE.
Security measures added to LTE includes stronger cryptographic primitives for …

Exposing LTE security weaknesses at protocol inter-layer, and inter-radio interactions

MT Raza, FM Anwar, S Lu - … and Privacy in Communication Networks: 13th …, 2018 - Springer
Despite security shields to protect user communication with both the radio access network
and the core infrastructure, 4G LTE is still susceptible to a number of security threats. The …

[PDF][PDF] IMP4GT: IMPersonation Attacks in 4G NeTworks.

D Rupprecht, K Kohls, T Holz, C Pöpper - NDSS, 2020 - ndss-symposium.org
Long Term Evolution (LTE/4G) establishes mutual authentication with a provably secure
Authentication and Key Agreement (AKA) protocol on layer three of the network stack …

How voice service threatens cellular-connected IoT devices in the operational 4G LTE networks

T Xie, CY Li, J Tang, GH Tu - 2018 Ieee International …, 2018 - ieeexplore.ieee.org
LTE networks are rolling out cellular Internet-of-Things (IoT) services. Cellular-connected IoT
devices are becoming increasingly popular and the number is forecasted to grow almost …