Security issues in wireless networks: An overview

S Baraković, E Kurtović, O Božanović… - 2016 XI International …, 2016 - ieeexplore.ieee.org
Wireless mobile communication have grown dramatically in last decades. Due to increased
usage of wireless mobile networks and communications in our everyday life, the society has …

Authentication protocol for an IoT-enabled LTE network

N Saxena, S Grijalva, NS Chaudhari - ACM Transactions on Internet …, 2016 - dl.acm.org
The Evolved Packet System-based Authentication and Key Agreement (EPS-AKA) protocol
of the long-term evolution (LTE) network does not support Internet of Things (IoT) objects …

5G: Evolution of a secure mobile technology

S Vij, A Jain - 2016 3rd international conference on computing …, 2016 - ieeexplore.ieee.org
The mobile technology is an ever evolving concept. The world has seen various generations
of mobile technology be it 1G, 2G, 3G or 4G. The fifth generation of mobile technology ie 5G …

Privacy in LTE networks

SP Rao, BT Kotte, S Holtmanns - Proceedings of the 9th EAI International …, 2016 - dl.acm.org
Ever since the public revelation of global surveillance and the exploits targeting the mobile
communication backend, the general awareness of user privacy in telecommunication …

Next Generation Encryption Using Security Enhancement Algorithms for End to End Data Transmission in 3G/4G Networks

V Kaul, B Nemade, V Bharadi - Procedia Computer Science, 2016 - Elsevier
This paper presents design, implementation, evaluation and comparison of security
enhancements in data transmission for next generation encryption highlighting the possible …

[图书][B] Network and Data Security for Non-Engineers

FM Groom, K Groom, SS Jones - 2016 - taylorfrancis.com
Learn network and data security by analyzing the Anthem breach and step-by-step how
hackers gain entry, place hidden software, download information, and hide the evidence of …

Analysis and Experimental Verification of Diameter Attacks in Long Term Evolution Networks

BT Kotte - 2016 - diva-portal.org
This thesis analyses and identifies attacks that exploit the roaming interconnection and
Diameter signaling used in LTE networks. The attacks are analyzed in accordance with the …

Distributed security architecture for authentication in 4G networks

D Niranjani, MG Durga - 2016 IEEE International Conference …, 2016 - ieeexplore.ieee.org
4G network is the highly advanced wireless network which aids broadband as well as
multimedia applications. 4G uses the TCP/IP architecture as the network backbone with …

[PDF][PDF] Developing an efficient utility theory based VHO algorithm to boost user satisfaction in HETNETs

LK Johal, AS Sandhu - Indian J. Sci. Technol, 2016 - researchgate.net
Developing an Efficient Utility Theory based VHO Algorithm to Boost User Satisfaction in
HETNETs Page 1 *Author for correspondence Indian Journals of Science and Technology, Vol …

[PDF][PDF] View metadata, citation and similar papers at core. ac. uk

The Internet of Things (IoT), a network connecting different objects including physical objects
(things) has recently evolved by integrating the concept of Internet with various wired and …