Software-defined mobile networks security

M Chen, Y Qian, S Mao, W Tang, X Yang - Mobile Networks and …, 2016 - Springer
The future 5G wireless is triggered by the higher demand on wireless capacity. With
Software Defined Network (SDN), the data layer can be separated from the control layer …

Prevention of desynchronization attack in 4G LTE networks using double authentication scheme

S Mathi, L Dharuman - Procedia Computer Science, 2016 - Elsevier
The core objective of 3GPP Long Term Evolution (LTE) is to provide a secured
communication and high data rate for 4G users. Even though 4G network provides security …

Performance Analysis of IDS_MDL Algorithm to Predict Intrusion Detection for IoT Applications

WA Mahmoud, M Fathi, H El-Badawy… - 2023 40th National …, 2023 - ieeexplore.ieee.org
In the last year, many modern attacks have targeted Internet of Things (IoT) devices. IoT
botnet attacks are the most common. Despite the plethora of detection and prevention …

[PDF][PDF] Synchronous authentication key management scheme for Inter-eNB handover over LTE networks

S Nashwan - … Journal of Advanced Computer Science and …, 2017 - pdfs.semanticscholar.org
Handover process execution without active session termination is considered one of the
most important attribute in the Long Term Evolution (LTE) networks. Unfortunately, this …

[图书][B] Protecting mobile networks and devices: Challenges and solutions

W Meng, X Luo, S Furnell, J Zhou - 2016 - books.google.com
This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks.
Its broad scope covers attacks and solutions related to mobile networks, mobile phone …

A secure and effective scheme providing comprehensive forward security to LTE/SAE X2 handover key management

B Sun, J Chu, L Hu, H Li, G Shi - KSII Transactions on Internet and …, 2017 - koreascience.kr
The commercialization of LTE/SAE technologies has begun a new era in which data can be
transmitted at remarkably high rates. The security of the LTE/SAE network, however, remains …

[PDF][PDF] Guti-based multi-factor authentication protocol for de-synchronization attack prevention in LTE handovers

VO Nyangaresi, SO Abeka… - Int. J. Cyber-Secur. Digit …, 2020 - researchgate.net
The motivations behind the long term evolution (LTE) networks are low latency, high
bandwidths and high data rates. The low latency requirement is tricky and cumbersome to …

IoT-Network Automation System Design and Implementation Simulation for Smart Home Applications

AA Khalifa, RA Sadek - Journal of Communication Sciences …, 2023 - jcsit.journals.ekb.eg
The Internet of Things has made smart homes a reality (IoT). A smart home is a place where
people live that is equipped with various internet-enabled gadgets that enable online …

Cyberattack surface of the next-generation mobile networks

F Sharevski - … Mobile Networks and Devices: Challenges and …, 2016 - taylorfrancis.com
Contents Abstract.......................................................................................... 292 12.1
Introduction............................................................................. 292 12.2 Mobile Network …

Interference mitigation by intelligent channel selection for device-to-device communications

AM Abdelhafez, HM Elattar… - 2019 IEEE 10th Annual …, 2019 - ieeexplore.ieee.org
Device-to-Device (D2D) communication is an efficient and interesting feature of wireless
networks of the next generation. It provides extremely low latency by allowing immediate …