A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions

R Khan, P Kumar, DNK Jayakody… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …

Towards formal verification of IoT protocols: A Review

K Hofer-Schmitz, B Stojanović - Computer Networks, 2020 - Elsevier
Formal Verification is one of the crucial methods to detect possible weaknesses and
vulnerabilities at an early stage. This paper reviews formal methods for an extensive variety …

SecCDV: A security reference architecture for cybertwin-driven 6G V2X

G Li, C Lai, R Lu, D Zheng - IEEE Transactions on Vehicular …, 2021 - ieeexplore.ieee.org
Recently, the proposed Cybertwin-driven 6G network architecture has attracted attentions
from academia, which can support the communication anchor, security agent and other …

[PDF][PDF] IMP4GT: IMPersonation Attacks in 4G NeTworks.

D Rupprecht, K Kohls, T Holz, C Pöpper - NDSS, 2020 - kkohls.org
Long Term Evolution (LTE/4G) establishes mutual authentication with a provably secure
Authentication and Key Agreement (AKA) protocol on layer three of the network stack …

Formal analysis of 5G EAP-TLS authentication protocol using proverif

J Zhang, L Yang, W Cao, Q Wang - IEEE access, 2020 - ieeexplore.ieee.org
As a critical component of the security architecture of 5G network, the authentication protocol
plays a role of the first safeguard in ensuring the communication security, such as the …

Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers

C Yu, S Chen, F Wang, Z Wei - Computer Networks, 2021 - Elsevier
Abstract The 4G/Long Term Evolution (LTE) has become the dominant mobile access
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …

Bookworm game: Automatic discovery of lte vulnerabilities through documentation analysis

Y Chen, Y Yao, XF Wang, D Xu, C Yue… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
In the past decade, the security of cellular networks has been increasingly under scrutiny,
leading to the discovery of numerous vulnerabilities that expose the network and its users to …

{Privacy-Preserving} and {Standard-Compatible}{AKA} Protocol for 5G

Y Wang, Z Zhang, Y Xie - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
The 3GPP consortium has published the Authentication and Key Agreement protocol for the
5th generation (5G) mobile communication system (ie, 5G-AKA) by Technical Specification …

A comprehensive formal analysis of 5G handover

A Peltonen, R Sasse, D Basin - … of the 14th ACM Conference on Security …, 2021 - dl.acm.org
5G has been under standardization for over a decade and will drive the world's mobile
technologies in the decades to come. One of the cornerstones of the 5G standard is its …

Instructions unclear: Undefined behaviour in cellular network specifications

D Klischies, M Schloegel, T Scharnowski… - 32nd USENIX Security …, 2023 - usenix.org
Cellular networks are a cornerstone of modern communication and indispensable to our
daily lives. Their specifications span thousands of pages, written primarily in natural …