A survey of security threats on 4G networks

Y Park, T Park - 2007 IEEE Globecom workshops, 2007 - ieeexplore.ieee.org
Many communication societies such as ITU and IEEE are working on 4 th generation (4G)
communication. This paper provides an overview of standardization activities focusing on …

Detection of fraudulent usage in wireless networks

B Sun, Y Xiao, R Wang - IEEE Transactions on Vehicular …, 2007 - ieeexplore.ieee.org
The complexity of cellular mobile systems renders prevention-based techniques not
adequate to guard against all potential attacks. An intrusion detection system has become …

Efficient 3GPP authentication and key agreement with robust user privacy protection

WS Juang, JL Wu - 2007 IEEE Wireless Communications and …, 2007 - ieeexplore.ieee.org
Zhang et al.(2005) proposed an authentication key agreement protocol for 3GPP-AKA
protocol. They claim that their protocol can withstand the redirection attack, the attack in …

One-pass authentication and key agreement procedure in IP multimedia subsystem for UMTS

CM Huang, JW Li - 21st International Conference on Advanced …, 2007 - ieeexplore.ieee.org
In IP Multimedia Subsystem (IMS) of UMTS, both packet-switch domain and IMS
authentications are necessary for the IMS subscriber, so-called the two-pass authentication …

Analytical model for authentication transmission overhead between entities in mobile networks

S Yousef - Computer communications, 2007 - Elsevier
This paper analyses the authentication and key agreement (AKA) protocol for UMTS mobile
networks. In this research the current authentication protocol has been enhanced by …

Efficient and provably secure IP multimedia subsystem authentication for UMTS

CM Huang, JW Li - The Computer Journal, 2007 - academic.oup.com
Abstract In a Universal Mobile telecommunications system IP multimedia subsystem (IMS),
even when an IMS subscriber has passed the packet-switch domain authentication, the IMS …

Intrusion detection in cellular mobile networks

B Sun, Y Xiao, K Wu - Wireless Network Security, 2007 - Springer
Security concerns have attracted a great deal of attentions for both service providers and
end users in cellular mobile networks. As a second line of defense, Intrusion Detection …

A simple mobile communication billing system among charged parties

HH Ou, MS Hwang, JK Jan - Applied mathematics and computation, 2007 - Elsevier
Mobile communication is a milestone technology that has brought people a kind of universal
convenience otherwise unattainable. From GSM to UMTS, the mobile communication …

A privacy protecting UMTS AKA protocol providing perfect forward secrecy

D Kim, Y Cui, S Kim, H Oh - … Science and Its Applications–ICCSA 2007 …, 2007 - Springer
Abstract In UMTS (Universal Mobile Telecommunication System), a protocol called UMTS
AKA (Authentication and Key Agreement) is used to securely authenticate an MS (Mobile …

Secured fast link-layer handover protocols for 3G-WLAN interworking architecture

A Al Shidhani, VCM Leung - The Fourth International Conference on …, 2007 - dl.acm.org
Interworking 3rd generation (3G) mobile systems and IEEE 802.11 wireless local area
networks (WLANs) introduces new challenges including the design of secured fast handover …