Security analysis of LTE/SAE networks with the possibilities of tampering E-Utran on NS3
暂无分享,去创建一个
[1] Mohammed Aly Abdrabou,et al. LTE Authentication Protocol (EPS-AKA) weaknesses solution , 2015, 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS).
[2] Pavol Zavarsky,et al. Enhanced User Security and Privacy Protection in 4G LTE Network , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).
[3] Donghoon Lee,et al. Performance and security enhanced authentication and key agreement protocol for SAE/LTE network , 2016, Comput. Networks.
[4] Md. Mustafizur Rahman,et al. A self-healing approach for LTE Evolved Packet Core , 2012, 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).
[5] Imane Aly Saroit,et al. Secure and efficient uniform handover scheme for LTE-A networks , 2016, 2016 IEEE Wireless Communications and Networking Conference.
[6] Ayman I. Kayssi,et al. A privacy-enhanced computationally-efficient and comprehensive LTE-AKA , 2017, Comput. Commun..
[7] Xuemin Shen,et al. SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks , 2013, Comput. Networks.
[8] Rachid El Kouch,et al. Fast Authentication during Handover in 4G LTE/SAE Networks , 2014 .
[9] Taejoon Park,et al. A Survey of Security Threats on 4G Networks , 2007, 2007 IEEE Globecom Workshops.
[10] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[11] Jeffrey A. Cichonski,et al. LTE Architecture Overview and Security Analysis , 2016 .
[12] Ayman I. Kayssi,et al. Privacy Enhanced and Computationally Efficient HSK-AKA LTE Scheme , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
[13] Nicolas Sklavos,et al. LTE/SAE Security Issues on 4G Wireless Networks , 2013, IEEE Security & Privacy.
[14] Abdellatif Medouri,et al. Enhanced authentication and key agreement protocol for improving security in UMTS networks , 2014, 2014 International Conference on Multimedia Computing and Systems (ICMCS).
[15] Hyoung-Kee Choi,et al. A group-based security protocol for machine-type communications in LTE-advanced , 2013, Wireless Networks.
[16] Valtteri Niemi,et al. Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems , 2015, NDSS.
[17] Biswajit Nandy,et al. Security advances and challenges in 4G wireless networks , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[18] Yongjun Wang,et al. Security Enhanced Authentication and Key Agreement Protocol for LTE/SAE Network , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.
[19] Hyoung-Kee Choi,et al. Security Analysis of Handover Key Management in 4G LTE/SAE Networks , 2014, IEEE Transactions on Mobile Computing.
[20] Ali Babikher Bakheet,et al. Enhancing the Security of LTE Networks against Jamming Attacks , 2016 .
[21] Iliano Cervesato,et al. The Dolev-Yao Intruder is the most Powerful Attacker , 2010 .
[22] Tobias Martin,et al. Security Mechanisms in UMTS , 2001, Datenschutz und Datensicherheit.
[23] Mohammad Ali Khalighi,et al. Efficient signal detection for cognitive radio relay networks under imperfect channel estimation , 2016, Trans. Emerg. Telecommun. Technol..
[24] Muzammil Khan,et al. Vulnerabilities of UMTS Access Domain Security Architecture , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.