Sherlock on Specs: Building {LTE} Conformance Tests through Automated Reasoning

Y Chen, D Tang, Y Yao, M Zha, XF Wang… - 32nd USENIX Security …, 2023 - usenix.org
Conformance tests are critical for finding security weaknesses in carrier network systems.
However, building a conformance test procedure from specifications is challenging, as …

Multi-factor based session secret key agreement for the Industrial Internet of Things

J Cui, F Cheng, H Zhong, Q Zhang, C Gu, L Liu - Ad Hoc Networks, 2023 - Elsevier
Abstract Industrial Internet of Things (IIoT) is the main field of application of the Internet of
Things (IoT). The high degree of autonomy and resource constraints of the IIoT network …

The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks

T Fei, W Wang - Computer Networks, 2023 - Elsevier
Abstract The Long-Term Evolution (LTE)/5G network connects much of the world's
population to provide subscriber's voice calls and mobile data delivery, with security …

FVF-AKA: A Formal Verification Framework of AKA Protocols for Multi-server IoT

Y Fei, H Zhu, J Yin - Formal Aspects of Computing, 2023 - dl.acm.org
As IoT in a multi-server environment increases resources' utilization, more and more
problems of IoT authentication and key agreement are being revealed. The Authentication …

Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network

SK Palit, M Chakraborty, S Chakraborty - The Journal of Supercomputing, 2023 - Springer
In this paper, we have proposed a lightweight mutual authentication and key agreement
scheme for 5G (5GMAKA) using the symmetric-key cryptographic framework. The proposed …

Toward a Truly Secure Telecom Network:Analyzing and Exploiting Vulnerable Security Configurations/Implementations in Commercial LTE/IMS Networks

C Yu, S Chen, Z Wei, F Wang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Authentication and data protection (both integrity and confidentiality) between the network
and cellular devices are two fundamental security features in LTE and IMS networks. The …

P3LI5: Practical and confidEntial Lawful Interception on the 5G core

F Intoci, J Sturm, D Fraunholz… - … IEEE Conference on …, 2023 - ieeexplore.ieee.org
Lawful Interception (LI) is a legal obligation of Communication Service Providers (CSPs) to
provide interception capabilities to Law Enforcement Agencies (LEAs) in order to gain …

[PDF][PDF] Hermes: Unlocking security analysis of cellular network protocols by synthesizing finite state machines from natural language specifications

A Al Ishtiaq, SSS Das, SMM Rashid, A Ranjbar… - arXiv preprint arXiv …, 2023 - usenix.org
In this paper, we present Hermes, an end-to-end framework to automatically generate formal
representations from natural language cellular specifications. We first develop a neural …

A Business Process-Based Security Enhancement Scheme for the Network Function Service Access Procedure in the 5G Core Network

Y Zhu, C Liu, W You, Y Zhang, W Zhang - Electronics, 2023 - mdpi.com
As the signaling processing center of 5G, the security and stability of the 5G Core Network
(5GC) are of great importance for 5G. The current 5GC consists of multiple mutually …

An Efficient and Secure Mechanism for Ubiquitous Sustainable Computing System

G Naga Nithin - IFIP International Internet of Things Conference, 2023 - Springer
Abstract Internet of Things (IoT) devices are frequently utilized to collect information around
humans' daily routine, producing a need for them to regularly pair with each other. With the …