Security and privacy for 6G: A survey on prospective technologies and challenges

VL Nguyen, PC Lin, BC Cheng… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-
ground integrated network environment, novel technologies, and an accessible user …

Security requirements and challenges of 6G technologies and applications

SA Abdel Hakeem, HH Hussein, HW Kim - Sensors, 2022 - mdpi.com
After implementing 5G technology, academia and industry started researching 6th
generation wireless network technology (6G). 6G is expected to be implemented around the …

A formal analysis of 5G authentication

D Basin, J Dreier, L Hirschi, S Radomirovic… - Proceedings of the …, 2018 - dl.acm.org
Mobile communication networks connect much of the world's population. The security of
users' calls, SMSs, and mobile data depends on the guarantees provided by the …

LTEInspector: A systematic approach for adversarial testing of 4G LTE

S Hussain, O Chowdhury, S Mehnaz… - Network and Distributed …, 2018 - par.nsf.gov
In this paper, we investigate the security and privacy of the three critical procedures of the
4G LTE protocol (ie, attach, detach, and paging), and in the process, uncover potential …

New privacy threat on 3G, 4G, and upcoming 5G AKA protocols

R Borgaonkar, L Hirschi, S Park, A Shaik - Cryptology ePrint Archive, 2018 - eprint.iacr.org
Mobile communications are used by more than two-thirds of the world population who
expect security and privacy guarantees. The 3rd Generation Partnership Project (3GPP) …

The 5G-AKA authentication protocol privacy

A Koutsos - 2019 IEEE European symposium on security and …, 2019 - ieeexplore.ieee.org
We study the 5G-AKA authentication protocol described in the 5G mobile communication
standards. This version of AKA tries to achieve a better privacy than the 3G and 4G versions …

On security research towards future mobile network generations

D Rupprecht, A Dabrowski, T Holz… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last decades, numerous security and privacy issues in all three active mobile
network generations have been revealed that threaten users as well as network providers. In …

A comprehensive review on the users' identity privacy for 5G networks

MM Saeed, MK Hasan, AJ Obaid, RA Saeed… - IET …, 2022 - Wiley Online Library
Fifth Generation (5G) is the final generation in mobile communications, with minimum
latency, high data throughput, and extra coverage. The 5G network must guarantee very …

Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers

C Yu, S Chen, F Wang, Z Wei - Computer Networks, 2021 - Elsevier
Abstract The 4G/Long Term Evolution (LTE) has become the dominant mobile access
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …

[PDF][PDF] GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier.

B Hong, S Bae, Y Kim - NDSS, 2018 - ndss-symposium.org
To keep subscribers' identity confidential, a cellular network operator must use a temporary
identifier instead of a permanent one according to the 3GPP standard. Temporary identifiers …