On security research towards future mobile network generations

D Rupprecht, A Dabrowski, T Holz… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last decades, numerous security and privacy issues in all three active mobile
network generations have been revealed that threaten users as well as network providers. In …

[HTML][HTML] Efficient and secured mechanisms for data link in IoT WSNs: A literature review

MZ Hasan, Z Mohd Hanapi - Electronics, 2023 - mdpi.com
The Internet of things (IoT) and wireless sensor networks (WSNs) have been rapidly and
tremendously developing recently as computing technologies have brought about a …

DDoS detection and prevention based on artificial intelligence techniques

B Zhang, T Zhang, Z Yu - 2017 3rd IEEE International …, 2017 - ieeexplore.ieee.org
DDoS attacks have been the major threats for the Internet and can bring great loss to
companies and governments. With the development of emerging technologies, such as …

You have been warned: Abusing 5G's Warning and Emergency Systems

E Bitsikas, C Pöpper - Proceedings of the 38th Annual Computer Security …, 2022 - dl.acm.org
The Public Warning System (PWS) is an essential part of cellular networks and a country's
civil protection. Warnings can notify users of hazardous events (eg, floods, earthquakes) and …

From E-911 to NG-911: Overview and challenges in Ecuador

D Corral-De-Witt, EV Carrera… - IEEE …, 2018 - ieeexplore.ieee.org
For years, emergency attendance institutions in Ecuador worked separately and not all of
them had a 24/7 service, resulting in duplicated efforts, a waste of the scarce resources, and …

Edge security for sip-enabled iot devices with p4

A Febro, H Xiao, J Spring, B Christianson - Computer networks, 2022 - Elsevier
The exponential growth of IoT devices poses security concerns, in part because they provide
a fertile breeding ground for botnets. For example, the Mirai botnet infected almost 65,000 …

On the impact of rogue base stations in 4g/lte self organizing networks

A Shaik, R Borgaonkar, S Park, JP Seifert - Proceedings of the 11th ACM …, 2018 - dl.acm.org
Mobile network operators choose Self Organizing Network (SON) concept as a cost-effective
method to deploy LTE/4G networks and meet user expectations for high quality of service …

Discovering emergency call pitfalls for cellular networks with formal methods

K Hou, Y Li, Y Yu, Y Chen, H Zhou - Proceedings of the 19th Annual …, 2021 - dl.acm.org
Availability and security problems in cellular emergency call systems can cost people their
lives, yet this topic has not been thoroughly researched. Based on our proposed Seed …

D-scap: Ddos attack traffic generation using scapy framework

G Manoj Kumar, AR Vasudevan - Advances in Big Data and Cloud …, 2019 - Springer
Bots are harmful processes controlled by a Command and Control (C&C) infrastructure. A
group of bots is known as botnet to launch different network attacks. One of the most …

Telephony Denial of Service defense at data plane (TDoSD@ DP)

A Febro, H Xiao, J Spring - NOMS 2018-2018 IEEE/IFIP …, 2018 - ieeexplore.ieee.org
The Session Initiation Protocol (SIP) is an application-layer control protocol used to establish
and terminate calls that are deployed globally. A flood of SIP INVITE packets sent by an …