Academic literature on the topic 'LTE Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'LTE Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "LTE Security"
IANCU, Laura. "An Overview of LTE Security." International Journal of Information Security and Cybercrime 1, no. 2 (December 21, 2012): 48–57. http://dx.doi.org/10.19107/ijisc.2012.02.06.
Full textHe, Limei, Zheng Yan, and Mohammed Atiquzzaman. "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey." IEEE Access 6 (2018): 4220–42. http://dx.doi.org/10.1109/access.2018.2792534.
Full textKim, Daegeon, Do Hyung Gu, and Huy Kang Kim. "Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment." Security and Communication Networks 2020 (December 7, 2020): 1–13. http://dx.doi.org/10.1155/2020/8869418.
Full textHuang, Lian Fen, and Hang Liu. "Research and Implementation of IPSEC Based on TD-LTE System." Applied Mechanics and Materials 427-429 (September 2013): 2783–86. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2783.
Full textWang, Jin, Zhongqi Zhang, Yongjun Ren, Bin Li, and Jeong-Uk Kim. "Issues toward Networks Architecture Security for LTE and LTE-A Networks." International Journal of Security and Its Applications 8, no. 4 (July 31, 2014): 17–24. http://dx.doi.org/10.14257/ijsia.2014.8.4.02.
Full textCao, Jin, Maode Ma, Hui Li, Yueyu Zhang, and Zhenxing Luo. "A Survey on Security Aspects for LTE and LTE-A Networks." IEEE Communications Surveys & Tutorials 16, no. 1 (2014): 283–302. http://dx.doi.org/10.1109/surv.2013.041513.00174.
Full textPanda, Prabhat Kumar, and Sudipta Chattopadhyay. "An improved authentication and security scheme for LTE/LTE-A networks." Journal of Ambient Intelligence and Humanized Computing 11, no. 5 (February 23, 2019): 2163–85. http://dx.doi.org/10.1007/s12652-019-01248-8.
Full textFu, Yulong, Hanlu Chen, Qinghua Zheng, Zheng Yan, Raimo Kantola, Xuyang Jing, Jin Cao, and Hui Li. "An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks." Journal of Network and Computer Applications 155 (April 2020): 102549. http://dx.doi.org/10.1016/j.jnca.2020.102549.
Full textFan, Xin Xin, Teng Wu, and Guang Gong. "An Efficient Stream Cipher WG-16 and its Application for Securing 4G-LTE Networks." Applied Mechanics and Materials 490-491 (January 2014): 1436–50. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1436.
Full textErnsberger, Dominik, K. Jijo George, and Sivabalan Arumugam. "Security Study and Monitoring of LTE Networks." Journal of ICT Standardization 7, no. 1 (2019): 43–60. http://dx.doi.org/10.13052/jicts2245-800x.713.
Full textDissertations / Theses on the topic "LTE Security"
Hussein, Soran. "Lightweight Security Solutions for LTE/LTE-A Networks." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112366/document.
Full textRecently, the 3rd Group Project Partnership (3GPP) has developed Long Term Evolution/ Long Term Evolution-Advanced (LTE/LTE-A) systems which have been approved by the International Telecommunication Union (ITU) as 4th Generation (4G) mobile telecommunication networks. Security is one of critical issues which should be handled carefully to protect user's and mobile operator's information. Thus, the 3GPP has standardized algorithms and protocols in order to secure the communications between different entities of the mobile network. However, increasing the security level in such networks should not compel heavy constrains on these networks such as complexity and energy. Indeed, energy efficiency has become recently a critical need for mobile network operators for reduced carbon emissions and operational costs. The security services in mobile networks such as authentication, data confidentiality and data integrity are mostly performed using cryptographic techniques.However, most of the standardized solutions already adopted by the3GPP depend on encryption algorithms which possess high computational complexity which in turn contributes in consuming further energy at the different network communication parties.Data confidentiality which mainly refers to the protection of the user’s information privacy is achieved at the Packet Data Convergence Protocol (PDCP) sub-layer in the LTE/LTE-A protocol stack by one of the three standardized algorithms (EEA1, EEA2 and EEA3). However, each of the three algorithms requires high computational complexity since they rely on Shannon’s theory of encryption algorithms by applying confusion and diffusion for several rounds. In our thesis we propose a novel confidentiality algorithm using the concept of substitution and diffusion in which the required security level is attained in only one round. Consequently the computational complexity is considerably reduced which in return results in reducing the energy consumption during both encryption and decryption procedures. Similarly, the same approach is used to reduce the complexity of 3GPP data integrity algorithms (EIA1, EIA2 and EIA3) which the core cipher rely on the same complex functions. Finally, we investigate in this thesis the authentication issue in Device to Device paradigms proposal in 4G systems. Device to Device communications refer to direct communications between two mobile devices without passing through the core network. They constitute a promising mean to increase the performance and reduce energy consumptions in LTE/LTE-A networks. In such context, the authentication and key derivation between two mobile devices have not been well investigated. Thus, a novel lightweight authentication and key derivation protocol is proposed to authenticate two communicating devices during session establishments as well as deriving necessary keys for both data encryption and integrity protection
DeMarinis, Nicholas AF. "On LTE Security: Closing the Gap Between Standards and Implementation." Digital WPI, 2015. https://digitalcommons.wpi.edu/etd-theses/791.
Full textPfeffer, Katharina. "Formal Verification of a LTE Security Protocol for Dual-Connectivity : An Evaluation of Automatic Model Checking Tools." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-148047.
Full textSäkerhetsprotokoll används i många typer av applikationer för att säkerställa säkerhet och integritet för kommunikation. För att uppnå detta mål behövs en behövs mekanismer som tillhandahåller pålitlig och systematisk verifiering av protokollen. Därför har det visats stort akademiskt intresse för forskning inom formell verifiering av säkerhetsprotokoll de senaste två decennierna. Sådana metoder formaliserar protokollsemantiken, vilket lägger grunden till automatiserad verifiering med modellverifieringsverktyg. Än så la¨nge har det inte varit stort focus på praktiska tilla¨mpningar, som t.ex. hur väl metoderna fungerar för de problem som dyker upp under en standardiseringsprocess. I detta examensarbete konstrueras en formell modell för ett säkerhetsprotokoll som etablerar en säkerhetsassociation mellan en terminal och två Long-Term Evolution (LTE) basstationer i ett delsystem kallat Dual Connectivity. Detta delsystem standardiseras för närvarande i 3GPP. Den formella modellen verifieras sedan med bästa tillgängliga verktyg för automatiserad modellverifiering (Scyther och Tamarin Prover). För att åstadkomma detta har den formella modellen implementerats i inmatningsspråken för de två verktygen. Slutligen ha de två verktygen evaluerats. Huvudslutsatsen är att inget av de två verktygen tillräckligt väl kan modellera de koncept där maskinstödd verifiering som mest behövs. Skälen till detta är Scythers begränsade syntax, och Tamarins begränsade prestanda och möjlighet att terminera för komplexa protokollmodeller. Trots detta är formella metoder andvändbara i standardiseringsprocessen eftersom de tvingar fram väldigt noggrann granskning av protokollens fundamentala delar. Därför kan formella metoder bidra till att förbättra strukturen på protokollkonstruktionsprocessen om det kombineras med nuvarande metoder.
Alzaabi, Mohamed Abdulla Hasan Saif. "New cryptanalysis and modelling for wireless networking." Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/17115.
Full textShahriar, Chowdhury M. R. "Resilient Waveform Design for OFDM-MIMO Communication Systems." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/56973.
Full textPh. D.
Pestrea, Anna. "Fuzz testing on eNodeB over the air interface : Using fuzz testing as a means of testing security." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176074.
Full textParvez, Imtiaz. "Spectrum Sharing, Latency, and Security in 5G Networks with Application to IoT and Smart Grid." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3879.
Full textLegonkov, Pavel, and Vasily Prokopov. "Small Cell Wireless Backhaul in Mobile Heterogeneous Networks." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99010.
Full textSmå celler sätts ut i områden med höga krav på täckning och kapacitet. Det är svårt att adressera båda dessa krav samtidigt med en konventionell mobil nätverksarkitektur baserad på makro-celler. I många fall finns ingen kabel tillgänglig att koppla den lilla cellen till kärnan i det mobila nätverket. Under dessa omständigheter kan en trådlös länk vara en lämplig lösning för backhaul. I denna avhandling utvärderas IEEE 802.11n-teknikens lämplighet för backhaul av små celler. Prestandan hos trådlös utrustning tillverkad av flera olika tillverkare har mätts. Resultaten av dessa mätningar analyserades och jämfördes med en mängd krav uppsatta för backhaul av små celler. Analysen har förankrat att IEEE 802.11n är kapabel till att tillhandahålla tillräcklig prestanda för backhaul av små celler i diverse miljöer. Notera att i denna avhandling så inkluderas femto-celler, pico-celler, Wireless LAN-åtkomstpunkter, och andra teknologier i kategorin små celler". Andra forskningsfrågor berörda i avhandlingen är säkerhet vid backhaul av små celler. Utöver att skydda backhaul-länken själv så undersökte säkerhetsforskningen säkerheten av hela mobilnätsarkitekturen när små celler används i arkitekturen. En mekanism för att integrera säkra små celler i ett mobilnät utvecklades. De resultat som införskaffades under projektets genomförande kommer att användas som input till produktutvecklingsaktiviteter hos företaget som sponsrade projektet. Den resulterande produkten skulle kunna bli mål för framtida prestandamätningar av trådlösa system.
Potnuru, Srinath. "Fuzzing Radio Resource Control messages in 5G and LTE systems : To test telecommunication systems with ASN.1 grammar rules based adaptive fuzzer." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-294140.
Full text5G-telekommunikationssystem måste vara extremt tillförlitliga för att möta behoven för den kommande utvecklingen inom kommunikation. Systemen som används måste testas noggrant och måste överensstämma med deras standarder. Programvara och nätverksprotokoll testas ofta med tekniker som fuzzing, penetrationstest, kodgranskning, testning av överensstämmelse. Med fuzzing kan testare skicka utformade input för att övervaka System Under Test (SUT) för ett svar. 3GPP, standardiseringsorganet för telekomsystemet, producerar ofta nya versioner av specifikationer för att möta kraven och bristerna från tidigare utgåvor. Detta leder till många versioner av specifikationer för ett nätverksprotokoll som Radio Resource Control (RRC) och testare behöver ständigt uppdatera testverktygen och testmiljön. I detta arbete visar vi att genom att använda den generiska karaktären av RRC-specifikationer, som ges i beskrivningsspråket Abstract Syntax Notation One (ASN.1), kan man designa ett testverktyg för att anpassa sig till alla versioner av 3GPP-specifikationer. Detta uppsatsarbete introducerar en ASN.1-baserad adaptiv fuzzer som kan användas för att testa RRC och andra nätverksprotokoll baserat på ASN.1- beskrivningsspråk. Fuzzer extraherar kunskap om pågående RRC meddelanden med användning av protokollbeskrivningsfiler för RRC, dvs RRC ASN.1 schema från 3GPP, och använder kunskapen för att fuzz RRC meddelanden. Den adaptiva fuzzer identifierar enskilda fält, delmeddelanden och anpassade datatyper enligt specifikationer när innehållet i befintliga meddelanden muteras. Dessutom har den adaptiva fuzzer identifierat en tidigare oidentifierad sårbarhet i Evolved Packet Core (EPC) för srsLTE och openLTE, två opensource LTE-implementeringar, vilket bekräftar tillämpligheten för robusthetsprovning av RRC och andra nätverksprotokoll.
Hutchinson, Simon James. "Investigation of late time response analysis for security applications." Thesis, Manchester Metropolitan University, 2015. http://e-space.mmu.ac.uk/608771/.
Full textBooks on the topic "LTE Security"
Forsberg, Dan, Günther Horn, Wolf-Dietrich Moeller, and Valtteri Niemi. LTE Security. Chichester, UK: John Wiley & Sons, Ltd, 2012. http://dx.doi.org/10.1002/9781118380642.
Full textForsberg, Dan, Günther Horn, Wolf-Dietrich Moeller, and Valtteri Niemi. LTE Security. Chichester, UK: John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470973271.
Full textPustovoĭ, Valeriĭ. Zvezdochki prozhitykh let. Cheli︠a︡binsk: Izd-vo Tatʹi︠a︡ny Lurʹe, 2004.
Find full textMichael, Eisenstadt, and Bacevich A. J, eds. Knives, tanks, and missiles: Israel's security revolution. Washington, DC: Washington Institute for Near East Policy, 1998.
Find full textWhite, Jonathan Randall. Terrorism and homeland security. 6th ed. Belmont, CA: Wadsworth Cengage Learning, 2009.
Find full textCerexhe, Peter. It's never too late: To achieve financial security - start today. Crows Nest, N.S.W: Allen & Unwin, 2006.
Find full textPeterson, Richard Lewis. The real social security problem: What everyone must know before it is too late. Lubbock, Tex: Financial Economics Publications, 1998.
Find full textSkinner, Kiron K. Executive and Congressional use of security linkage during the late 1970s. Santa Monica, CA (1700 Main St., P.O. Box 2138, Santa Monica 90407-2138): RAND, 1994.
Find full textBook chapters on the topic "LTE Security"
Penttinen, Jyrki T. J. "LTE/SAE Security." In The LTE/SAE Deployment Handbook, 221–42. Chichester, UK: John Wiley & Sons, Ltd, 2011. http://dx.doi.org/10.1002/9781119954187.ch11.
Full textRemy, Jean-Gabriel, and Charlotte Letamendia. "LTE Security. SIM/USIM Subsystem." In LTE Standards, 207–38. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119043508.ch4.
Full textJang, Uijin, Hyungmin Lim, and Hyungjoo Kim. "Security Scheme for LTE Initial Attach." In Ubiquitous Computing Application and Wireless Sensor, 53–66. Dordrecht: Springer Netherlands, 2015. http://dx.doi.org/10.1007/978-94-017-9618-7_6.
Full textAlt, Stephanie, Pierre-Alain Fouque, Gilles Macario-rat, Cristina Onete, and Benjamin Richard. "A Cryptographic Analysis of UMTS/LTE AKA." In Applied Cryptography and Network Security, 18–35. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39555-5_2.
Full textSingh, Isha, Silke Holtmanns, and Raimo Kantola. "Roaming Interface Signaling Security for LTE Networks." In Innovative Security Solutions for Information Technology and Communications, 204–17. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12942-2_16.
Full textVachhani, Khyati. "Security Threats Against LTE Networks: A Survey." In Communications in Computer and Information Science, 242–56. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-5826-5_18.
Full textMoustafa, Nour, and Jiankun Hu. "Security and Privacy in 4G/LTE Network." In Encyclopedia of Wireless Networks, 1265–71. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_119.
Full textMoustafa, Nour, and Jiankun Hu. "Security and Privacy in 4G/LTE Network." In Encyclopedia of Wireless Networks, 1–7. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-32903-1_119-1.
Full textLu, Shujie, Jia Yu, and Ji Zhu. "Properties Emulation on TD-LTE Electric Power Wireless Private." In Cloud Computing and Security, 563–73. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00018-9_49.
Full textFang, Kaiming, and Guanhua Yan. "Emulation-Instrumented Fuzz Testing of 4G/LTE Android Mobile Devices Guided by Reinforcement Learning." In Computer Security, 20–40. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1_2.
Full textConference papers on the topic "LTE Security"
Chlosta, Merlin, David Rupprecht, Thorsten Holz, and Christina Pöpper. "LTE security disabled." In WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3317549.3324927.
Full textZhu, Li, Hang Qin, Huaqing Mao, and Zhiwen Hu. "Research on 3GPP LTE Security Architecture." In 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2012. http://dx.doi.org/10.1109/wicom.2012.6478647.
Full textSamy, Islam, Loukas Lazos, Yong Xiao, Ming Li, and Marwan Krunz. "LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard." In WiSec '18: 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3212480.3212485.
Full textLiyanage, Madhusanka, Ijaz Ahmad, Mika Ylianttila, Andrei Gurtov, Ahmed Bux Abro, and Edgardo Montes de Oca. "Leveraging LTE security with SDN and NFV." In 2015 IEEE 10th International Conference on Industrial and Information Systems (ICIIS). IEEE, 2015. http://dx.doi.org/10.1109/iciinfs.2015.7399014.
Full textSiwach, Gautam, and Amir Esmailpour. "LTE Security potential vulnerability and algorithm enhancements." In 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 2014. http://dx.doi.org/10.1109/ccece.2014.6900948.
Full textLiu Hui and Bai Shuo. "Research and implementation of LTE NAS security." In 2010 International Conference on Educational and Information Technology (ICEIT). IEEE, 2010. http://dx.doi.org/10.1109/iceit.2010.5607551.
Full textZhiyuan Shi, Zhiliang Ji, Zhibin Gao, and Lianfen Huang. "Layered security approach in LTE and simulation." In 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication (2009 ASID). IEEE, 2009. http://dx.doi.org/10.1109/icasid.2009.5276930.
Full textKIM, HWANGUK, and SEKWON KIM. "Security Vulnerabilities and Threats of LTE Networks." In International Conference on Advances in Computing, Control and Networking - ACCN 2015. Institute of Research Engineers and Doctors, 2015. http://dx.doi.org/10.15224/978-1-63248-038-5-78.
Full textRupprecht, David, Katharina Kohls, Thorsten Holz, and Christina Popper. "Breaking LTE on Layer Two." In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 2019. http://dx.doi.org/10.1109/sp.2019.00006.
Full textOulaourf, Sanaa, Abdelfatteh Haidine, and Hassan Ouahmane. "Review on using game theory in resource allocation for LTE/LTE-Advanced." In 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS). IEEE, 2016. http://dx.doi.org/10.1109/acosis.2016.7843946.
Full textReports on the topic "LTE Security"
Cichonski, Jeffrey, Joshua M. Franklin, and Michael Bartock. Guide to LTE security. Gaithersburg, MD: National Institute of Standards and Technology, December 2017. http://dx.doi.org/10.6028/nist.sp.800-187.
Full textSingh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Quantifying Late Detection in MC&A. Office of Scientific and Technical Information (OSTI), March 2014. http://dx.doi.org/10.2172/1126563.
Full textSingh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Quantifying Late Detection in MC&A for Item Inventories. Office of Scientific and Technical Information (OSTI), March 2014. http://dx.doi.org/10.2172/1126564.
Full textSingh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Quantifying Late Detection in MC&A for Bulk Processes. Office of Scientific and Technical Information (OSTI), March 2014. http://dx.doi.org/10.2172/1126565.
Full textAssaye, Abebaw, and Dawit Alemu. Impact of COVID-19 on Food Systems and Rural Livelihoods in Fogera Plain, Ethiopia - Round 2 Report . Institute of Development Studies (IDS), December 2020. http://dx.doi.org/10.19088/apra.2020.021.
Full textBelporo, Lydie. Building Peace through DDR Programs: Lessons from Reintegrating Boko Haram Ex-Recruits in Cameroon. RESOLVE Network, August 2021. http://dx.doi.org/10.37805/pn2021.19.lpbi.
Full textAlemu, Dawit, and Abebaw Assaye. Impact of COVID-19 on Food Systems and Rural Livelihoods in Fogera Plain, Ethiopia – Round 1 Report. Institute of Development Studies (IDS), October 2020. http://dx.doi.org/10.19088/apra.2020.002.
Full textResearch Institute (IFPRI), International Food Policy. Indice de la faim dans le monde Relever le defi de la faim: Assurer une securite alimentaire durables dans un monde sous contraintes en eau, en energie et en terres. Washington, DC: International Food Policy Research Institute, 2012. http://dx.doi.org/10.2499/9780896299450.
Full text