Leveraging Overshadowing for Time-Delay Attacks in 4G/5G Cellular Networks: An Empirical Assessment
V Hamici-Aubert, J Saint-Martin, RE Navas… - Proceedings of the 19th …, 2024 - dl.acm.org
Ensuring both reliable and low-latency communications over 4G or 5G Radio Access
Network (RAN) is a key feature for services such as smart power grids and the metaverse …
Network (RAN) is a key feature for services such as smart power grids and the metaverse …
6G-XSec: Explainable Edge Security for Emerging OpenRAN Architectures
The evolution from 5G to 6G cellular networks signifies a crucial advancement towards
enhanced robustness and automation driven by the promise of ubiquitous Artificial …
enhanced robustness and automation driven by the promise of ubiquitous Artificial …
FBSDetector: Fake Base Station and Multi Step Attack Detection in Cellular Networks using Machine Learning
Fake base stations (FBSes) pose a significant security threat by impersonating legitimate
base stations. Though efforts have been made to defeat this threat, up to this day, the …
base stations. Though efforts have been made to defeat this threat, up to this day, the …
Unprotected 4G/5G Control Procedures at Low Layers Considered Dangerous
Over the years, several security vulnerabilities in the 3GPP cellular systems have been
demonstrated in the literature. Most studies focus on higher layers of the cellular radio stack …
demonstrated in the literature. Most studies focus on higher layers of the cellular radio stack …
Securing Wireless Communications From the PHY Up: A Low-Layer Protocol Approach for Privacy, Security, and Resilience
N Ludant - 2024 - search.proquest.com
Wireless technologies, such as 5G, Bluetooth, and Wi-Fi, are of key importance for personal
communications, business operation, or even health purposes. Considerable efforts have …
communications, business operation, or even health purposes. Considerable efforts have …
Enhancing Security and Privacy in Future Wireless Systems: Addressing External, Internal, and Spectrum-Level Threats
M Vomvas - 2024 - search.proquest.com
The exponential growth of wireless communications has led to unprecedented connectivity
but also introduced significant security and privacy challenges across various layers of …
but also introduced significant security and privacy challenges across various layers of …
[图书][B] Enhancing System Resiliency for 5G and 5G IoT: A Plug-and-Play, SIM/eSIM-based Approach
J Zhao - 2023 - search.proquest.com
Abstract 5G and 5G IoT technologies have been widely deployed in both consumer and
industrial usage scenarios for their ubiquitous coverage, mobility support, and carrier-grade …
industrial usage scenarios for their ubiquitous coverage, mobility support, and carrier-grade …