The Evolved Packet System-based Authentication and Key Agreement (EPS-AKA) protocol of the long-term evolution (LTE) network does not support Internet of Things (IoT) objects …
S Vij, A Jain - 2016 3rd international conference on computing …, 2016 - ieeexplore.ieee.org
The mobile technology is an ever evolving concept. The world has seen various generations of mobile technology be it 1G, 2G, 3G or 4G. The fifth generation of mobile technology ie 5G …
SP Rao, BT Kotte, S Holtmanns - Proceedings of the 9th EAI International …, 2016 - dl.acm.org
Ever since the public revelation of global surveillance and the exploits targeting the mobile communication backend, the general awareness of user privacy in telecommunication …
This paper presents design, implementation, evaluation and comparison of security enhancements in data transmission for next generation encryption highlighting the possible …
FM Groom, K Groom, SS Jones - 2016 - taylorfrancis.com
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of …
This thesis analyses and identifies attacks that exploit the roaming interconnection and Diameter signaling used in LTE networks. The attacks are analyzed in accordance with the …
D Niranjani, MG Durga - 2016 IEEE International Conference …, 2016 - ieeexplore.ieee.org
4G network is the highly advanced wireless network which aids broadband as well as multimedia applications. 4G uses the TCP/IP architecture as the network backbone with …
LK Johal, AS Sandhu - Indian J. Sci. Technol, 2016 - researchgate.net
Developing an Efficient Utility Theory based VHO Algorithm to Boost User Satisfaction in HETNETs Page 1 *Author for correspondence Indian Journals of Science and Technology, Vol …
The Internet of Things (IoT), a network connecting different objects including physical objects (things) has recently evolved by integrating the concept of Internet with various wired and …