Security and privacy for 6G: A survey on prospective technologies and challenges

VL Nguyen, PC Lin, BC Cheng… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-
ground integrated network environment, novel technologies, and an accessible user …

On security research towards future mobile network generations

D Rupprecht, A Dabrowski, T Holz… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last decades, numerous security and privacy issues in all three active mobile
network generations have been revealed that threaten users as well as network providers. In …

Practical attacks against privacy and availability in 4G/LTE mobile communication systems

A Shaik, R Borgaonkar, N Asokan, V Niemi… - arXiv preprint arXiv …, 2015 - arxiv.org
Mobile communication systems now constitute an essential part of life throughout the world.
Fourth generation" Long Term Evolution"(LTE) mobile communication networks are being …

Breaking LTE on layer two

D Rupprecht, K Kohls, T Holz… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
Long Term Evolution (LTE) is the latest mobile communication standard and has a pivotal
role in our information society: LTE combines performance goals with modern security …

5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol

SR Hussain, M Echeverria, I Karim… - Proceedings of the …, 2019 - dl.acm.org
The paper proposes 5GReasoner, a framework for property-guided formal verification of
control-plane protocols spanning across multiple layers of the 5G protocol stack. The …

Touching the untouchables: Dynamic security analysis of the LTE control plane

H Kim, J Lee, E Lee, Y Kim - 2019 IEEE Symposium on Security …, 2019 - ieeexplore.ieee.org
This paper presents our extensive investigation of the security aspects of control plane
procedures based on dynamic testing of the control components in operational Long Term …

Survey on threats and attacks on mobile networks

S Mavoungou, G Kaddoum, M Taha, G Matar - IEEE Access, 2016 - ieeexplore.ieee.org
Since the 1G of mobile technology, mobile wireless communication systems have continued
to evolve, bringing into the network architecture new interfaces and protocols, as well as …

Call me maybe: Eavesdropping encrypted {LTE} calls with {ReVoLTE}

D Rupprecht, K Kohls, T Holz, C Pöpper - 29th USENIX security …, 2020 - usenix.org
Voice over LTE (VoLTE) is a packet-based telephony service seamlessly integrated into the
Long Term Evolution (LTE) standard and deployed by most telecommunication providers in …

[PDF][PDF] FIRMWIRE: Transparent dynamic analysis for cellular baseband firmware

G Hernandez, M Muench, D Maier, A Milburn… - Network and …, 2022 - par.nsf.gov
Smartphones today leverage baseband processors to implement the multitude of cellular
protocols. Basebands execute firmware, which is responsible for decoding hundreds of …

LTE security disabled: misconfiguration in commercial networks

M Chlosta, D Rupprecht, T Holz, C Pöpper - Proceedings of the 12th …, 2019 - dl.acm.org
Long Term Evolution (LTE) is the de-facto standard for mobile communication. It provides
effective security features but leaves room for misunderstandings in its configuration and …