[HTML][HTML] A technical review of wireless security for the internet of things: Software defined radio perspective

JJR Uribe, EP Guillen, LS Cardoso - … of King Saud University-Computer and …, 2022 - Elsevier
The increase of cyberattacks by using the Internet of Things devices has exposed multiple
vulnerabilities not only on devices but also on IoT infrastructures. Now, small devices can …

A practical radio frequency fingerprinting scheme for mobile phones identification

Y Yang, A Hu, J Yu - Physical Communication, 2022 - Elsevier
Radio frequency fingerprint (RFF) has attracted a remarkable surge of attention to wireless
transmitter identification due to the inimitable hardware imperfection. However, most RFF …

Security threats to voice services in 5G standalone networks

Z Cui, B Cui, J Fu, R Dong - Security and Communication …, 2022 - Wiley Online Library
With the rapid development of 5G SA (standalone) networks, increasing subscribers are
motivated to make calls through 5G. To support voice services critical to mobile users, 5G SA …

Imsi catcher detection method for cellular networks

H Alrashede, RA Shaikh - 2019 2nd International Conference …, 2019 - ieeexplore.ieee.org
Mobile communications are not trustful as many people think about it. The IMSI catcher
device is one of the most effective threats that can compromise the security of mobile …

Unblocking stolen mobile devices using SS7-MAP vulnerabilities: Exploiting the relationship between IMEI and IMSI for EIR access

SP Rao, S Holtmanns, I Oliver… - 2015 IEEE Trustcom …, 2015 - ieeexplore.ieee.org
The increase in usage of mobile phones and the relative increase in the number of mobile
phone thefts have imposed an overhead on securely retrieving the stolen or missing …

Demonstration of vulnerabilities in GSM security with USRP B200 and open-source penetration tools

A Dubey, D Vohra, K Vachhani… - 2016 22nd Asia-Pacific …, 2016 - ieeexplore.ieee.org
This paper showcases the vulnerabilities in the GSM security architecture through
implementation of an active attack at the Um interface. The attack was carried out by taking …

ThinSIM-based attacks on mobile money systems

R Phipps, S Mare, P Ney, J Webster… - Proceedings of the 1st …, 2018 - dl.acm.org
Phone-based mobile money is becoming the dominant paradigm for financial services in the
developing world. For example, mPesa has a cash flow of over thirty billion USD, equivalent …

Supporting maritime search and rescue missions through UAS-based wireless localization

J Tiemann, O Feldmeier… - 2018 IEEE Globecom …, 2018 - ieeexplore.ieee.org
The use of unmanned aircraft systems to support maritime search and rescue missions
holds great potential. Applications range from the fast and efficient search of vessels and …

Designing RFID based object tracking system by applying multilevel security

AC Bapat, SU Nimbhorkar - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
The conventional object tracking system based on different wireless protocol standards is
vulnerable to various security threats. Information about tracked object which is supposed to …

Investigating gsm control channels with rtl-sdr and gnu radio

D Vohra, A Dubey, K Vachhhani - … International Conference on …, 2016 - ieeexplore.ieee.org
This paper focuses on the compliance of publicly available specifications of Global System
for Mobile communication (GSM) with the extremely closed GSM industry with the help of …