On security research towards future mobile network generations
Over the last decades, numerous security and privacy issues in all three active mobile
network generations have been revealed that threaten users as well as network providers. In …
network generations have been revealed that threaten users as well as network providers. In …
[HTML][HTML] Efficient and secured mechanisms for data link in IoT WSNs: A literature review
MZ Hasan, Z Mohd Hanapi - Electronics, 2023 - mdpi.com
The Internet of things (IoT) and wireless sensor networks (WSNs) have been rapidly and
tremendously developing recently as computing technologies have brought about a …
tremendously developing recently as computing technologies have brought about a …
DDoS detection and prevention based on artificial intelligence techniques
DDoS attacks have been the major threats for the Internet and can bring great loss to
companies and governments. With the development of emerging technologies, such as …
companies and governments. With the development of emerging technologies, such as …
You have been warned: Abusing 5G's Warning and Emergency Systems
E Bitsikas, C Pöpper - Proceedings of the 38th Annual Computer Security …, 2022 - dl.acm.org
The Public Warning System (PWS) is an essential part of cellular networks and a country's
civil protection. Warnings can notify users of hazardous events (eg, floods, earthquakes) and …
civil protection. Warnings can notify users of hazardous events (eg, floods, earthquakes) and …
From E-911 to NG-911: Overview and challenges in Ecuador
D Corral-De-Witt, EV Carrera… - IEEE …, 2018 - ieeexplore.ieee.org
For years, emergency attendance institutions in Ecuador worked separately and not all of
them had a 24/7 service, resulting in duplicated efforts, a waste of the scarce resources, and …
them had a 24/7 service, resulting in duplicated efforts, a waste of the scarce resources, and …
Edge security for sip-enabled iot devices with p4
The exponential growth of IoT devices poses security concerns, in part because they provide
a fertile breeding ground for botnets. For example, the Mirai botnet infected almost 65,000 …
a fertile breeding ground for botnets. For example, the Mirai botnet infected almost 65,000 …
On the impact of rogue base stations in 4g/lte self organizing networks
Mobile network operators choose Self Organizing Network (SON) concept as a cost-effective
method to deploy LTE/4G networks and meet user expectations for high quality of service …
method to deploy LTE/4G networks and meet user expectations for high quality of service …
Discovering emergency call pitfalls for cellular networks with formal methods
Availability and security problems in cellular emergency call systems can cost people their
lives, yet this topic has not been thoroughly researched. Based on our proposed Seed …
lives, yet this topic has not been thoroughly researched. Based on our proposed Seed …
D-scap: Ddos attack traffic generation using scapy framework
G Manoj Kumar, AR Vasudevan - Advances in Big Data and Cloud …, 2019 - Springer
Bots are harmful processes controlled by a Command and Control (C&C) infrastructure. A
group of bots is known as botnet to launch different network attacks. One of the most …
group of bots is known as botnet to launch different network attacks. One of the most …
Telephony Denial of Service defense at data plane (TDoSD@ DP)
The Session Initiation Protocol (SIP) is an application-layer control protocol used to establish
and terminate calls that are deployed globally. A flood of SIP INVITE packets sent by an …
and terminate calls that are deployed globally. A flood of SIP INVITE packets sent by an …