Academic literature on the topic 'LTE Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'LTE Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "LTE Security"

1

IANCU, Laura. "An Overview of LTE Security." International Journal of Information Security and Cybercrime 1, no. 2 (December 21, 2012): 48–57. http://dx.doi.org/10.19107/ijisc.2012.02.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

He, Limei, Zheng Yan, and Mohammed Atiquzzaman. "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey." IEEE Access 6 (2018): 4220–42. http://dx.doi.org/10.1109/access.2018.2792534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kim, Daegeon, Do Hyung Gu, and Huy Kang Kim. "Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment." Security and Communication Networks 2020 (December 7, 2020): 1–13. http://dx.doi.org/10.1155/2020/8869418.

Full text
Abstract:
National disasters can threaten national security and require several organizations to integrate the functionalities to correspond to the event. Many countries are constructing a nationwide mobile communication network infrastructure to share information and promptly communicate with corresponding organizations. Public Safety Long-Term Evolution (PS-LTE) is a communication mechanism adopted in many countries to achieve such a purpose. Organizations can increase the efficiency of public protection and disaster relief (PPDR) operations by securely connecting the services run on their legacy networks to the PS-LTE infrastructure. This environment allows the organizations to continue facilitating the information and system functionalities provided by the legacy network. The vulnerabilities in the environment, which differ from commercial LTE, need to be resolved to connect the network securely. In this study, we propose a security model design framework to derive the system architecture and the security requirements targeting the restricted environment applied by certain technologies for a particular purpose. After analyzing the PPDR operation environment’s characteristics under the PS-LTE infrastructure, we applied the framework to derive the security model for organizations using PPDR services operated in their legacy networks through this infrastructure. Although the proposed security model design framework is applied to the specific circumstance in this research, it can be generally adopted for the application environment.
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, Lian Fen, and Hang Liu. "Research and Implementation of IPSEC Based on TD-LTE System." Applied Mechanics and Materials 427-429 (September 2013): 2783–86. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2783.

Full text
Abstract:
With the rapid development of Internet technology, network and information security has become increasingly important. After studying the principle of IPSEC(IP Security) and VPN (Virtual Private Network) technology, this paper designs a network architecture which is called S1 in the TD-LTE communication system. The specific packet is securely encrypted by using IPSEC technology between the base station and security gateway. After a lot of tests, the technical solution to achieve IPSEC is proved to be realized and to have a highly efficient and stable characteristic.
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Jin, Zhongqi Zhang, Yongjun Ren, Bin Li, and Jeong-Uk Kim. "Issues toward Networks Architecture Security for LTE and LTE-A Networks." International Journal of Security and Its Applications 8, no. 4 (July 31, 2014): 17–24. http://dx.doi.org/10.14257/ijsia.2014.8.4.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cao, Jin, Maode Ma, Hui Li, Yueyu Zhang, and Zhenxing Luo. "A Survey on Security Aspects for LTE and LTE-A Networks." IEEE Communications Surveys & Tutorials 16, no. 1 (2014): 283–302. http://dx.doi.org/10.1109/surv.2013.041513.00174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Panda, Prabhat Kumar, and Sudipta Chattopadhyay. "An improved authentication and security scheme for LTE/LTE-A networks." Journal of Ambient Intelligence and Humanized Computing 11, no. 5 (February 23, 2019): 2163–85. http://dx.doi.org/10.1007/s12652-019-01248-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fu, Yulong, Hanlu Chen, Qinghua Zheng, Zheng Yan, Raimo Kantola, Xuyang Jing, Jin Cao, and Hui Li. "An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks." Journal of Network and Computer Applications 155 (April 2020): 102549. http://dx.doi.org/10.1016/j.jnca.2020.102549.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fan, Xin Xin, Teng Wu, and Guang Gong. "An Efficient Stream Cipher WG-16 and its Application for Securing 4G-LTE Networks." Applied Mechanics and Materials 490-491 (January 2014): 1436–50. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1436.

Full text
Abstract:
The fourth generation of mobile telecommunications system (marketed as 4G-LTE) is being commercially and widely deployed. Security mechanisms are crucial to protect communications of mobile users from potential malicious attacks as well as to ensure revenue for 4G-LTE network operators. The randomness properties of the keystream generated by the current cipher suites in 4G-LTE standard are difficult to analyze and some vulnerabilities with regard to the integrity algorithms have been recently discovered. To address those issues, we present a detailed specification and security analysis of a bit-oriented stream cipher WG-16 as well as the corresponding confidentiality and integrity algorithms in this paper. Our experimental results on smartphones and comparisons with the cipher suites in 4G-LTE standard demonstrate that WG-16 is a competitive candidate for securing the emerging 4G-LTE networks.
APA, Harvard, Vancouver, ISO, and other styles
10

Ernsberger, Dominik, K. Jijo George, and Sivabalan Arumugam. "Security Study and Monitoring of LTE Networks." Journal of ICT Standardization 7, no. 1 (2019): 43–60. http://dx.doi.org/10.13052/jicts2245-800x.713.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "LTE Security"

1

Hussein, Soran. "Lightweight Security Solutions for LTE/LTE-A Networks." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112366/document.

Full text
Abstract:
Récemment, le 3GPP (3rd Generation Partnership Project) a standardisé les systèmes LTE/LTE-A (Long Term Evolution/LTE-Advanced) qui ont été approuvés par l'UIT (Union Internationale des Télécommunications) comme des réseaux de télécommunications mobiles de 4éme génération. La sécurité est l'une des questions essentielles qui doivent être traitées avec soin pour protéger les informations de l'opérateur et des utilisateurs. Aussi, le 3GPP a normalisé plusieurs algorithmes et protocoles afin de sécuriser les communications entre les différentes entités du réseau. Cependant, l'augmentation du niveau de sécurité dans ces systèmes ne devrait pas leur imposer des contraintes lourdes telles qu’une grande complexité de calcul ou encore une forte consommation d'énergie. En effet, l'efficacité énergétique est devenue récemment un besoin critique pour les opérateurs afin de réduire l’empreinte écologique et les coûts opérationnels de ces systèmes. Les services de sécurité dans les réseaux mobiles tels que l'authentification, la confidentialité et l'intégrité des données sont le plus souvent effectués en utilisant des techniques cryptographiques. Toutefois, la plupart des solutions standardisées déjà adoptées par le 3GPP dépendent des algorithmes de chiffrement qui possèdent une grande complexité, induisant une consommation énergétique plus élevée dans les différentes entités communicantes du réseau. La confidentialité des données, qui se réfère principalement au fait de s'assurer que l'information n'est accessible qu'à ceux dont l'accès est autorisé, est réalisée au niveau de la sous-couche PDCP (Packet Data Convergence Protocol) de la pile protocolaire de LTE/LTE-A par l'un des trois algorithmes normalisés (EEA1, EEA2 et EEA3). Or, chacun des trois algorithmes exige une forte complexité de calcul car ils reposent sur la théorie de chiffrement de Shannon qui utilise les fonctions de confusion et de diffusion sur plusieurs itérations. Dans cette thèse, nous proposons un nouvel algorithme de confidentialité en utilisant le concept de substitution et de diffusion dans lequel le niveau de sécurité requis est atteint en un seul tour. Par conséquent, la complexité de calcul est considérablement réduite ce qui entraîne une réduction de la consommation d'énergie par les fonctions de chiffrement et de déchiffrement. De plus, la même approche est utilisée pour réduire la complexité des algorithmes 3GPP d'intégrité des données (EIA1, EIA2 et EIA3) dont le concept de chiffrement repose sur les mêmes fonctions complexes. Enfin, nous étudions dans cette thèse le problème d'authentification dans le contexte du paradigme D2D (Device to Device communications) introduit dans les systèmes 4G. Le concept D2D se réfère à la communication directe entre deux terminaux mobiles sans passer par le cœur du réseau. Il constitue un moyen prometteur pour améliorer les performances et réduire la consommation d'énergie dans les réseaux LTE/LTE-A. Toutefois, l'authentification et la dérivation de clé entre deux terminaux mobiles dans le contexte D2D n’ont pas fait l’objet d’études. Aussi, nous proposons un nouveau protocole léger d’authentification et de dérivation de clé permettant d’authentifier les terminaux D2D et de dériver les clés nécessaires à la fois pour le cryptage et pour la protection de l'intégrité des données
Recently, the 3rd Group Project Partnership (3GPP) has developed Long Term Evolution/ Long Term Evolution-Advanced (LTE/LTE-A) systems which have been approved by the International Telecommunication Union (ITU) as 4th Generation (4G) mobile telecommunication networks. Security is one of critical issues which should be handled carefully to protect user's and mobile operator's information. Thus, the 3GPP has standardized algorithms and protocols in order to secure the communications between different entities of the mobile network. However, increasing the security level in such networks should not compel heavy constrains on these networks such as complexity and energy. Indeed, energy efficiency has become recently a critical need for mobile network operators for reduced carbon emissions and operational costs. The security services in mobile networks such as authentication, data confidentiality and data integrity are mostly performed using cryptographic techniques.However, most of the standardized solutions already adopted by the3GPP depend on encryption algorithms which possess high computational complexity which in turn contributes in consuming further energy at the different network communication parties.Data confidentiality which mainly refers to the protection of the user’s information privacy is achieved at the Packet Data Convergence Protocol (PDCP) sub-layer in the LTE/LTE-A protocol stack by one of the three standardized algorithms (EEA1, EEA2 and EEA3). However, each of the three algorithms requires high computational complexity since they rely on Shannon’s theory of encryption algorithms by applying confusion and diffusion for several rounds. In our thesis we propose a novel confidentiality algorithm using the concept of substitution and diffusion in which the required security level is attained in only one round. Consequently the computational complexity is considerably reduced which in return results in reducing the energy consumption during both encryption and decryption procedures. Similarly, the same approach is used to reduce the complexity of 3GPP data integrity algorithms (EIA1, EIA2 and EIA3) which the core cipher rely on the same complex functions. Finally, we investigate in this thesis the authentication issue in Device to Device paradigms proposal in 4G systems. Device to Device communications refer to direct communications between two mobile devices without passing through the core network. They constitute a promising mean to increase the performance and reduce energy consumptions in LTE/LTE-A networks. In such context, the authentication and key derivation between two mobile devices have not been well investigated. Thus, a novel lightweight authentication and key derivation protocol is proposed to authenticate two communicating devices during session establishments as well as deriving necessary keys for both data encryption and integrity protection
APA, Harvard, Vancouver, ISO, and other styles
2

DeMarinis, Nicholas AF. "On LTE Security: Closing the Gap Between Standards and Implementation." Digital WPI, 2015. https://digitalcommons.wpi.edu/etd-theses/791.

Full text
Abstract:
Modern cellular networks including LTE (Long Term Evolution) and the evolving LTE- Advanced provide high-speed and high-capacity data services for mobile users. As we become more reliant on wireless connectivity, the security of voice and data transmissions on the network becomes increasingly important. While the LTE network standards provide strict security guidelines, these requirements may not be completely followed when LTE networks are deployed in practice. This project provides a method for improving the security of LTE networks by 1) characterizing a gap between security requirements defined in the standards and practical implementations, 2) designing a language to express the encoding formats of one of LTE’s network-layer protocols, 3) developing a compiler to translate a protocol description in our language into an implementation, and 4) providing recommendations on lessons learned during development of the language and compiler to support development of future protocols that employ formal representations. In this way, our work demonstrates how a formal language can be utilized to represent a cellular network protocol and serves as an example for further research on how adding formalism to network standards can help ensure that the security goals defined in the standards can be upheld in an implementation.
APA, Harvard, Vancouver, ISO, and other styles
3

Pfeffer, Katharina. "Formal Verification of a LTE Security Protocol for Dual-Connectivity : An Evaluation of Automatic Model Checking Tools." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-148047.

Full text
Abstract:
Security protocols are ubiquitously used in various applications with the intention to ensure secure and private communication. To achieve this goal, a mechanism offering reliable and systematic protocol verification is needed. Accordingly, a major interest in academic research on formal methods for protocol analysis has been apparent for the last two decades. Such methods formalize the operational semantics of a protocol, laying the base for protocol verification with automatic model checking tools. So far, little work in this field has focused on protocol standardization. Within this thesis a security analysis of a novel Authenticated Key-Exchange (AKE) protocol for secure association handover between two Long-Term Evolution (LTE) base stations (which support dual-connectivity) is carried out by applying two state-of-the-art tools for automated model checking (Scyther and Tamarin Prover). In the course of this a formal protocol model and tool input models are developed. Finally, the suitability of the used tools for LTE protocol analysis is evaluated. The major outcome is that none of the two applied tools is capable to accurately model and verify the dual-connectivity protocol in such detail that it would make them particularly useful in the considered setting. The reason for this are restrictions in the syntax of Scyther and a degraded performance of Tamarin when using complex protocol input models. However, the use of formal methods in protocol standardization can be highly beneficial, since it implies a careful consideration of a protocol’s fundamentals. Hence, formal methods are helpful to improve and structure a protocol’s design process when applied in conjunction to current practices.
Säkerhetsprotokoll används i många typer av applikationer för att säkerställa säkerhet och integritet för kommunikation. För att uppnå detta mål behövs en behövs mekanismer som tillhandahåller pålitlig och systematisk verifiering av protokollen. Därför har det visats stort akademiskt intresse för forskning inom formell verifiering av säkerhetsprotokoll de senaste två decennierna. Sådana metoder formaliserar protokollsemantiken, vilket lägger grunden till automatiserad verifiering med modellverifieringsverktyg. Än så la¨nge har det inte varit stort focus på praktiska tilla¨mpningar, som t.ex. hur väl metoderna fungerar för de problem som dyker upp under en standardiseringsprocess. I detta examensarbete konstrueras en formell modell för ett säkerhetsprotokoll som etablerar en säkerhetsassociation mellan en terminal och två Long-Term Evolution (LTE) basstationer i ett delsystem kallat Dual Connectivity. Detta delsystem standardiseras för närvarande i 3GPP. Den formella modellen verifieras sedan med bästa tillgängliga verktyg för automatiserad modellverifiering (Scyther och Tamarin Prover). För att åstadkomma detta har den formella modellen implementerats i inmatningsspråken för de två verktygen.  Slutligen ha de två verktygen evaluerats. Huvudslutsatsen är att inget av de två verktygen tillräckligt väl kan modellera de koncept där maskinstödd verifiering som mest behövs. Skälen till detta är Scythers begränsade syntax, och Tamarins begränsade prestanda och möjlighet att terminera för komplexa protokollmodeller. Trots detta är formella metoder andvändbara i standardiseringsprocessen eftersom de tvingar fram väldigt noggrann granskning av protokollens fundamentala delar. Därför kan formella metoder bidra till att förbättra strukturen på protokollkonstruktionsprocessen om det kombineras med nuvarande metoder.
APA, Harvard, Vancouver, ISO, and other styles
4

Alzaabi, Mohamed Abdulla Hasan Saif. "New cryptanalysis and modelling for wireless networking." Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/17115.

Full text
Abstract:
High data rates and interoperability of vender devices have made WiMAX a prime desire for use worldwide. WiMAX is based on the IEEE 802.16 standard. IEEE 802.16a, b, c & d versions were updated within three years of the first launch of WiMAX. However, during those early years reports were published that highlighted the security weaknesses of the standard. These weaknesses prompted the IEEE to issue a new version, 802.16e to tackle the security issues. Despite this security enhancement, WiMAX remains vulnerable. This research project looks at the vulnerability of WiMAX 802.16e Subscriber Station/Mobile Station authentication at the initial entry and proposes approaches to the prevention of Denial of Service (DoS) attacks at this point in order to secure the Media Access Control (MAC) layer from such threats. A new protocol has been designed and developed to provide confidentiality, authentication and integrity to WiMAX users. This new protocol is integrated with Z algorithm (an algorithm described later in this paper) to provide: • Confidentiality of management messages • Message Authentication code • ID to provide for message integrity and user authentication. A simulation package was also required, to prove that a linear load of DoS attack would disable or exhaust the capacity of the base station of a WiMAX network, as well as providing other simulation functions. The freely available simulation tool NIST (NIST IPSec (Internet Protocol Security) and IKE (Internet Key Exchange) Simulation) is oriented towards fixed network communications (NIIST, 2003). There are no other relevant simulation tools; hence the purpose of this research project is to develop a new tool to simulate WiMAX security vulnerabilities and test the new protocol.
APA, Harvard, Vancouver, ISO, and other styles
5

Shahriar, Chowdhury M. R. "Resilient Waveform Design for OFDM-MIMO Communication Systems." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/56973.

Full text
Abstract:
This dissertation addresses physical layer security concerns, resiliency of the Orthogonal Frequency Division Multiplexing (OFDM) and the Multiple Input Multiple Output (MIMO) systems; the `de-facto' air-interface of most wireless broadband standards including LTE and WiMAX. The major contributions of this dissertation are: 1) developing jamming taxonomy, 2) proposing OFDM and MIMO equalization jamming attacks and countermeasures, 3) developing antijam (AJ) MIMO systems, and 4) designing null space projected overlapped-MIMO radar waveform for spectrum sharing between radar and communications system. First, we consider OFDM systems under various jamming attacks. Previous research is focused on jamming OFDM data transmissions. We focus on energy efficient attacks that can disrupt communication severely by exploiting the knowledge of target waveform. Specifically, these attacks seek to manipulate information used by the equalization algorithm to cause errors to a significant number of symbols, i.e., pilot tones jamming and nulling. Potential countermeasures are presented in an attempt to make OFDM waveform robust and resilient. The threats were mitigated by randomizing the location and value of pilot tones, causing the optimal attack to devolve into barrage jamming. We also address the security aspects of MIMO systems in this dissertation. All MIMO systems need a method to estimate and equalize channel, whether through channel reciprocity or sounding. Most OFDM-based MIMO systems use sounding via pilot tones. Like OFDM attacks, this research introduces MIMO channel sounding attack, which attempts to manipulate pilot tones to skew the channel state information (CSI) at the receiver. We describe methods of designing AJ MIMO system. The key insight is that many of the theoretical concepts learned from transmit beamforming and interference alignment (IA) in MIMO systems can be applied to the field of AJ and robust communications in the presence of jammers. We consider a realistic jamming scenario and provide a `receiver-only' and a transmitter `precoding' technique that allow a pair of two-antenna transceivers to communicate while being jammed by a malicious non-cooperative single-antenna adversary. Finally, we consider designing a collocated MIMO radar waveform, which employs a new MIMO architecture where antenna arrays are allowed to overlap. This overlapped-MIMO radar poses many advantages including superior beampattern and improvement in SNR gain. We combine this radar architecture with a projection-based algorithm that allows the radar waveform to project onto the null space of the interference channel of MIMO communications system, thus enabling the coexistence of radar and communications system.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
6

Pestrea, Anna. "Fuzz testing on eNodeB over the air interface : Using fuzz testing as a means of testing security." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176074.

Full text
Abstract:
In modern society, security has become an increasingly important subject, as technologyhas become an integrated part of everyday life. The security of a system can be tested withthe help of fuzzing, where incoming messages to the system are altered. In this thesis, afuzzer was developed targeting an E-UTRAN Node B (eNB) in the Long-Term Evolution(LTE) landscape. The eNB is current prototype and is from the company Ericsson. Thefuzzer is particularly designed for testing the Medium Access Control (MAC) layer of theeNB. The fuzzer uses a genetic method where all of the fuzzer’s flags (the R, F2, E, LCID, Fand L flags) are triggered during the fuzzing period. Depending on the output of the firstgeneration of fuzzed values, new values are generated either by choosing a value close tothe original value, or by choosing a value that belong to the same subgroup as the originalvalue. Four test cases are made, where first test case is the base line of the program and theother three test cases fuzzes the eNB, using different parts of the fuzzer. The results show that depending on which parts of the fuzzer are used, the connectionbecomes different. For test two and three, the connection became increasingly unstable andmore data was present in the connection. Test case four did not however deviate so muchfrom the baseline, if compared to test two and three.
APA, Harvard, Vancouver, ISO, and other styles
7

Parvez, Imtiaz. "Spectrum Sharing, Latency, and Security in 5G Networks with Application to IoT and Smart Grid." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3879.

Full text
Abstract:
The surge of mobile devices, such as smartphones, and tables, demands additional capacity. On the other hand, Internet-of-Things (IoT) and smart grid, which connects numerous sensors, devices, and machines require ubiquitous connectivity and data security. Additionally, some use cases, such as automated manufacturing process, automated transportation, and smart grid, require latency as low as 1 ms, and reliability as high as 99.99\%. To enhance throughput and support massive connectivity, sharing of the unlicensed spectrum (3.5 GHz, 5GHz, and mmWave) is a potential solution. On the other hand, to address the latency, drastic changes in the network architecture is required. The fifth generation (5G) cellular networks will embrace the spectrum sharing and network architecture modifications to address the throughput enhancement, massive connectivity, and low latency. To utilize the unlicensed spectrum, we propose a fixed duty cycle based coexistence of LTE and WiFi, in which the duty cycle of LTE transmission can be adjusted based on the amount of data. In the second approach, a multi-arm bandit learning based coexistence of LTE and WiFi has been developed. The duty cycle of transmission and downlink power are adapted through the exploration and exploitation. This approach improves the aggregated capacity by 33\%, along with cell edge and energy efficiency enhancement. We also investigate the performance of LTE and ZigBee coexistence using smart grid as a scenario. In case of low latency, we summarize the existing works into three domains in the context of 5G networks: core, radio and caching networks. Along with this, fundamental constraints for achieving low latency are identified followed by a general overview of exemplary 5G networks. Besides that, a loop-free, low latency and local-decision based routing protocol is derived in the context of smart grid. This approach ensures low latency and reliable data communication for stationary devices. To address data security in wireless communication, we introduce a geo-location based data encryption, along with node authentication by k-nearest neighbor algorithm. In the second approach, node authentication by the support vector machine, along with public-private key management, is proposed. Both approaches ensure data security without increasing the packet overhead compared to the existing approaches.
APA, Harvard, Vancouver, ISO, and other styles
8

Legonkov, Pavel, and Vasily Prokopov. "Small Cell Wireless Backhaul in Mobile Heterogeneous Networks." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99010.

Full text
Abstract:
Small cells are deployed in a crowded areas with a high demand for both coverage and capacity. It is hard to address both of these requirements simultaneous with a conventional mobile network architecture based on macro cells. In many case a wire is not available to connect the small cell to the core of the mobile network. Under these circumstances a wireless link could be a convenient solution for the backhaul. In this master’s thesis IEEE 802.11n technology was evaluated to assess its suitability for backhaul from a small wireless cell. The performance of wireless equipment manufactured by several vendors has been measured. The results of these measurements were analyzed and compared to a set of requirements established for small cell backhaul. The analysis has affirmed that IEEE 802.11n is capable of providing sufficient performance to be used for small cell backhaul in various deployment scenarios. Note that in this thesis we include femtocells, picocells, wireless LAN access points, and other technologies in the category of "small cells". Another research questions of this master’s thesis is security of small cell backhaul. In addition to protecting the backhaul link itself, the security research investigated the safety of the whole mobile network architecture remodeled with the introduction of small cells. A mechanism to integrate secure small cells into a mobile network was developed. The results obtained during the project will be used as an input for product development activities in the company hosting the project. The resulting product could become the target of future wireless system performance measurements.
Små celler sätts ut i områden med höga krav på täckning och kapacitet. Det är svårt att adressera båda dessa krav samtidigt med en konventionell mobil nätverksarkitektur baserad på makro-celler. I många fall finns ingen kabel tillgänglig att koppla den lilla cellen till kärnan i det mobila nätverket. Under dessa omständigheter kan en trådlös länk vara en lämplig lösning för backhaul. I denna avhandling utvärderas IEEE 802.11n-teknikens lämplighet för backhaul av små celler. Prestandan hos trådlös utrustning tillverkad av flera olika tillverkare har mätts. Resultaten av dessa mätningar analyserades och jämfördes med en mängd krav uppsatta för backhaul av små celler. Analysen har förankrat att IEEE 802.11n är kapabel till att tillhandahålla tillräcklig prestanda för backhaul av små celler i diverse miljöer. Notera att i denna avhandling så inkluderas femto-celler, pico-celler, Wireless LAN-åtkomstpunkter, och andra teknologier i kategorin små celler". Andra forskningsfrågor berörda i avhandlingen är säkerhet vid backhaul av små celler. Utöver att skydda backhaul-länken själv så undersökte säkerhetsforskningen säkerheten av hela mobilnätsarkitekturen när små celler används i arkitekturen. En mekanism för att integrera säkra små celler i ett mobilnät utvecklades. De resultat som införskaffades under projektets genomförande kommer att användas som input till produktutvecklingsaktiviteter hos företaget som sponsrade projektet. Den resulterande produkten skulle kunna bli mål för framtida prestandamätningar av trådlösa system.
APA, Harvard, Vancouver, ISO, and other styles
9

Potnuru, Srinath. "Fuzzing Radio Resource Control messages in 5G and LTE systems : To test telecommunication systems with ASN.1 grammar rules based adaptive fuzzer." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-294140.

Full text
Abstract:
5G telecommunication systems must be ultra-reliable to meet the needs of the next evolution in communication. The systems deployed must be thoroughly tested and must conform to their standards. Software and network protocols are commonly tested with techniques like fuzzing, penetration testing, code review, conformance testing. With fuzzing, testers can send crafted inputs to monitor the System Under Test (SUT) for a response. 3GPP, the standardization body for the telecom system, produces new versions of specifications as part of continuously evolving features and enhancements. This leads to many versions of specifications for a network protocol like Radio Resource Control (RRC), and testers need to constantly update the testing tools and the testing environment. In this work, it is shown that by using the generic nature of RRC specifications, which are given in Abstract Syntax Notation One (ASN.1) description language, one can design a testing tool to adapt to all versions of 3GPP specifications. This thesis work introduces an ASN.1 based adaptive fuzzer that can be used for testing RRC and other network protocols based on ASN.1 description language. The fuzzer extracts knowledge about ongoing RRC messages using protocol description files of RRC, i.e., RRC ASN.1 schema from 3GPP, and uses the knowledge to fuzz RRC messages. The adaptive fuzzer identifies individual fields, sub-messages, and custom data types according to specifications when mutating the content of existing messages. Furthermore, the adaptive fuzzer has identified a previously unidentified vulnerability in Evolved Packet Core (EPC) of srsLTE and openLTE, two open-source LTE implementations, confirming the applicability to robustness testing of RRC and other network protocols.
5G-telekommunikationssystem måste vara extremt tillförlitliga för att möta behoven för den kommande utvecklingen inom kommunikation. Systemen som används måste testas noggrant och måste överensstämma med deras standarder. Programvara och nätverksprotokoll testas ofta med tekniker som fuzzing, penetrationstest, kodgranskning, testning av överensstämmelse. Med fuzzing kan testare skicka utformade input för att övervaka System Under Test (SUT) för ett svar. 3GPP, standardiseringsorganet för telekomsystemet, producerar ofta nya versioner av specifikationer för att möta kraven och bristerna från tidigare utgåvor. Detta leder till många versioner av specifikationer för ett nätverksprotokoll som Radio Resource Control (RRC) och testare behöver ständigt uppdatera testverktygen och testmiljön. I detta arbete visar vi att genom att använda den generiska karaktären av RRC-specifikationer, som ges i beskrivningsspråket Abstract Syntax Notation One (ASN.1), kan man designa ett testverktyg för att anpassa sig till alla versioner av 3GPP-specifikationer. Detta uppsatsarbete introducerar en ASN.1-baserad adaptiv fuzzer som kan användas för att testa RRC och andra nätverksprotokoll baserat på ASN.1- beskrivningsspråk. Fuzzer extraherar kunskap om pågående RRC meddelanden med användning av protokollbeskrivningsfiler för RRC, dvs RRC ASN.1 schema från 3GPP, och använder kunskapen för att fuzz RRC meddelanden. Den adaptiva fuzzer identifierar enskilda fält, delmeddelanden och anpassade datatyper enligt specifikationer när innehållet i befintliga meddelanden muteras. Dessutom har den adaptiva fuzzer identifierat en tidigare oidentifierad sårbarhet i Evolved Packet Core (EPC) för srsLTE och openLTE, två opensource LTE-implementeringar, vilket bekräftar tillämpligheten för robusthetsprovning av RRC och andra nätverksprotokoll.
APA, Harvard, Vancouver, ISO, and other styles
10

Hutchinson, Simon James. "Investigation of late time response analysis for security applications." Thesis, Manchester Metropolitan University, 2015. http://e-space.mmu.ac.uk/608771/.

Full text
Abstract:
The risk of armed attack by individual’s intent on causing mass casualties against soft targets, such as transport hubs continues. This has led to an increased need for a robust, reliable and accurate detection system for concealed threat items. This new system will need to improve upon existing detection systems including portal based scanners, x-ray scanners and hand held metal detectors as these all suffer from drawbacks of limited detection range and relatively long scanning times. A literature appraisal has been completed to assess the work being undertaken in the relevant field of Concealed Threat Detection (CTD). From this Ultra-Wide Band (UWB) radar has been selected as the most promising technology available for CTD at the present. UWB radar is provided by using Frequency Modulated Continuous Waves (FMCW) from laboratory test equipment over a multi gigahertz bandwidth. This gives the UWB radar the ability to detect both metallic and dielectric objects. Current published results have shown that it is possible to use the LTR technique to detect and discriminate both single objects isolated in air and multiple objects present within the same environment. A Vector Network Analyser (VNA) has been used to provide the Ultra-Wide Band (UWB) Frequency Modulated Continuous Wave (FMCW) radar signal required for the LTR technique. This thesis presents the application of the Generalized Pencil-of-Function (GPOF), Dual Tree Wavelet Transform (DTWT) and the Continuous Wavelet Transform (CWT), both real and complex valued, in Late Time Response (LTR) security analysis to produce a viable detection algorithm. Supervised and unsupervised Artificial Neural Networks (ANN) have been applied to develop a successful classification scheme for Concealed Threat Detection (CTD) in on body security screening. Signal deconvolution and other techniques have been applied in post processing to allow for extraction of the LTR signal from the scattered return. Data vectorization has been applied to the extracted LTR signal using an unsupervised learning based ANN to prepare data for classification. Classification results for both binary threat/non-threat classifiers and a group classifier are presented. The GPOF method presented true positive classification results approaching 72% with wavelet based methods offering between 98% and 100%.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "LTE Security"

1

LTE security. Hoboken, N.J: Wiley, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Forsberg, Dan, Günther Horn, Wolf-Dietrich Moeller, and Valtteri Niemi. LTE Security. Chichester, UK: John Wiley & Sons, Ltd, 2012. http://dx.doi.org/10.1002/9781118380642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Forsberg, Dan, Günther Horn, Wolf-Dietrich Moeller, and Valtteri Niemi. LTE Security. Chichester, UK: John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470973271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pustovoĭ, Valeriĭ. Zvezdochki prozhitykh let. Cheli︠a︡binsk: Izd-vo Tatʹi︠a︡ny Lurʹe, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Michael, Eisenstadt, and Bacevich A. J, eds. Knives, tanks, and missiles: Israel's security revolution. Washington, DC: Washington Institute for Near East Policy, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

White, Jonathan Randall. Terrorism and homeland security. 6th ed. Belmont, CA: Wadsworth Cengage Learning, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Terrorism and homeland security. 5th ed. Australia: Thomson Wadsworth, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cerexhe, Peter. It's never too late: To achieve financial security - start today. Crows Nest, N.S.W: Allen & Unwin, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Peterson, Richard Lewis. The real social security problem: What everyone must know before it is too late. Lubbock, Tex: Financial Economics Publications, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Skinner, Kiron K. Executive and Congressional use of security linkage during the late 1970s. Santa Monica, CA (1700 Main St., P.O. Box 2138, Santa Monica 90407-2138): RAND, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "LTE Security"

1

Penttinen, Jyrki T. J. "LTE/SAE Security." In The LTE/SAE Deployment Handbook, 221–42. Chichester, UK: John Wiley & Sons, Ltd, 2011. http://dx.doi.org/10.1002/9781119954187.ch11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Remy, Jean-Gabriel, and Charlotte Letamendia. "LTE Security. SIM/USIM Subsystem." In LTE Standards, 207–38. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119043508.ch4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jang, Uijin, Hyungmin Lim, and Hyungjoo Kim. "Security Scheme for LTE Initial Attach." In Ubiquitous Computing Application and Wireless Sensor, 53–66. Dordrecht: Springer Netherlands, 2015. http://dx.doi.org/10.1007/978-94-017-9618-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alt, Stephanie, Pierre-Alain Fouque, Gilles Macario-rat, Cristina Onete, and Benjamin Richard. "A Cryptographic Analysis of UMTS/LTE AKA." In Applied Cryptography and Network Security, 18–35. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39555-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Isha, Silke Holtmanns, and Raimo Kantola. "Roaming Interface Signaling Security for LTE Networks." In Innovative Security Solutions for Information Technology and Communications, 204–17. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12942-2_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vachhani, Khyati. "Security Threats Against LTE Networks: A Survey." In Communications in Computer and Information Science, 242–56. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-5826-5_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Moustafa, Nour, and Jiankun Hu. "Security and Privacy in 4G/LTE Network." In Encyclopedia of Wireless Networks, 1265–71. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Moustafa, Nour, and Jiankun Hu. "Security and Privacy in 4G/LTE Network." In Encyclopedia of Wireless Networks, 1–7. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-32903-1_119-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lu, Shujie, Jia Yu, and Ji Zhu. "Properties Emulation on TD-LTE Electric Power Wireless Private." In Cloud Computing and Security, 563–73. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00018-9_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fang, Kaiming, and Guanhua Yan. "Emulation-Instrumented Fuzz Testing of 4G/LTE Android Mobile Devices Guided by Reinforcement Learning." In Computer Security, 20–40. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "LTE Security"

1

Chlosta, Merlin, David Rupprecht, Thorsten Holz, and Christina Pöpper. "LTE security disabled." In WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3317549.3324927.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhu, Li, Hang Qin, Huaqing Mao, and Zhiwen Hu. "Research on 3GPP LTE Security Architecture." In 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2012. http://dx.doi.org/10.1109/wicom.2012.6478647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Samy, Islam, Loukas Lazos, Yong Xiao, Ming Li, and Marwan Krunz. "LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard." In WiSec '18: 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3212480.3212485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liyanage, Madhusanka, Ijaz Ahmad, Mika Ylianttila, Andrei Gurtov, Ahmed Bux Abro, and Edgardo Montes de Oca. "Leveraging LTE security with SDN and NFV." In 2015 IEEE 10th International Conference on Industrial and Information Systems (ICIIS). IEEE, 2015. http://dx.doi.org/10.1109/iciinfs.2015.7399014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Siwach, Gautam, and Amir Esmailpour. "LTE Security potential vulnerability and algorithm enhancements." In 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 2014. http://dx.doi.org/10.1109/ccece.2014.6900948.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liu Hui and Bai Shuo. "Research and implementation of LTE NAS security." In 2010 International Conference on Educational and Information Technology (ICEIT). IEEE, 2010. http://dx.doi.org/10.1109/iceit.2010.5607551.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhiyuan Shi, Zhiliang Ji, Zhibin Gao, and Lianfen Huang. "Layered security approach in LTE and simulation." In 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication (2009 ASID). IEEE, 2009. http://dx.doi.org/10.1109/icasid.2009.5276930.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

KIM, HWANGUK, and SEKWON KIM. "Security Vulnerabilities and Threats of LTE Networks." In International Conference on Advances in Computing, Control and Networking - ACCN 2015. Institute of Research Engineers and Doctors, 2015. http://dx.doi.org/10.15224/978-1-63248-038-5-78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rupprecht, David, Katharina Kohls, Thorsten Holz, and Christina Popper. "Breaking LTE on Layer Two." In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 2019. http://dx.doi.org/10.1109/sp.2019.00006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Oulaourf, Sanaa, Abdelfatteh Haidine, and Hassan Ouahmane. "Review on using game theory in resource allocation for LTE/LTE-Advanced." In 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS). IEEE, 2016. http://dx.doi.org/10.1109/acosis.2016.7843946.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "LTE Security"

1

Cichonski, Jeffrey, Joshua M. Franklin, and Michael Bartock. Guide to LTE security. Gaithersburg, MD: National Institute of Standards and Technology, December 2017. http://dx.doi.org/10.6028/nist.sp.800-187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Quantifying Late Detection in MC&A. Office of Scientific and Technical Information (OSTI), March 2014. http://dx.doi.org/10.2172/1126563.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Singh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Quantifying Late Detection in MC&A for Item Inventories. Office of Scientific and Technical Information (OSTI), March 2014. http://dx.doi.org/10.2172/1126564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Quantifying Late Detection in MC&A for Bulk Processes. Office of Scientific and Technical Information (OSTI), March 2014. http://dx.doi.org/10.2172/1126565.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Assaye, Abebaw, and Dawit Alemu. Impact of COVID-19 on Food Systems and Rural Livelihoods in Fogera Plain, Ethiopia - Round 2 Report . Institute of Development Studies (IDS), December 2020. http://dx.doi.org/10.19088/apra.2020.021.

Full text
Abstract:
This report presents an assessment of the changes in effects of COVID-19 on agricultural commercialisation, food and nutrition security, labour and employment, and poverty and well-being in rural Ethiopia by comparing the results of a baseline household survey (R1) in late June 2020 with a follow-up survey (R2) in late October 2020. Data was collected from a stratified random sample of 106 smallholder rice farmer households (24 female and 82 male-headed) in five kebeles (villages) in the Fogera Plain area of Amhara Region. Data was also collected through 25 key informant interviews conducted in the kebeles.
APA, Harvard, Vancouver, ISO, and other styles
6

Belporo, Lydie. Building Peace through DDR Programs: Lessons from Reintegrating Boko Haram Ex-Recruits in Cameroon. RESOLVE Network, August 2021. http://dx.doi.org/10.37805/pn2021.19.lpbi.

Full text
Abstract:
In the countries of the Lake Chad Basin, Boko Haram’s emergence has created major new security challenges for the region’s governments. Cameroon’s Far North region, the most populous in the country, is at the heart of these security issues. Since late 2020, Boko Haram has intensified attacks in Far North localities with assassinations targeting civilians, kidnappings, and looting in small towns along the Nigerian border. In response, the Cameroonian government has pursued a hardline strategy and militarized the affected localities. In addition to arbitrary arrests, prolonged pre-trial detention, prison overcrowding, and the death penalty are all sources of concern. This policy note outlines core findings from a case study of the Boko Haram ex-associates reintegration process in Cameroon. The note examines how existing community norms or mechanisms might be as useful as more standard approaches to disarmament, demobilization, and reintegration (DDR) in addressing challenges presented by Boko Haram ex-associates in Cameroon.
APA, Harvard, Vancouver, ISO, and other styles
7

Alemu, Dawit, and Abebaw Assaye. Impact of COVID-19 on Food Systems and Rural Livelihoods in Fogera Plain, Ethiopia – Round 1 Report. Institute of Development Studies (IDS), October 2020. http://dx.doi.org/10.19088/apra.2020.002.

Full text
Abstract:
This report presents an early assessment of the impacts of the COVID-19 pandemic on agricultural commercialisation, food and nutrition security, labour and employment, and poverty and well-being in rural Ethiopia. Data was collected from a stratified random sample of 107 households (23 female- and 84 male-headed). Respondents were drawn from a subset of households interviewed in a 2018 APRA survey of smallholder rice farmers in five kebeles (villages) in the Fogera Plain area of Amhara Region. The COVID-19 household survey data is complemented by data from 23 key informant interviews conducted in the kebeles. The data collection for this COVID-19 study will be carried out over three rounds. This report presents insights obtained from the first round conducted during late June/early July 2020.
APA, Harvard, Vancouver, ISO, and other styles
8

Research Institute (IFPRI), International Food Policy. Indice de la faim dans le monde Relever le defi de la faim: Assurer une securite alimentaire durables dans un monde sous contraintes en eau, en energie et en terres. Washington, DC: International Food Policy Research Institute, 2012. http://dx.doi.org/10.2499/9780896299450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography