Journal articles on the topic 'LTE Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'LTE Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
IANCU, Laura. "An Overview of LTE Security." International Journal of Information Security and Cybercrime 1, no. 2 (2012): 48–57. http://dx.doi.org/10.19107/ijisc.2012.02.06.
Full textHe, Limei, Zheng Yan, and Mohammed Atiquzzaman. "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey." IEEE Access 6 (2018): 4220–42. http://dx.doi.org/10.1109/access.2018.2792534.
Full textKim, Daegeon, Do Hyung Gu, and Huy Kang Kim. "Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment." Security and Communication Networks 2020 (December 7, 2020): 1–13. http://dx.doi.org/10.1155/2020/8869418.
Full textKhan, Shaikhul Arefin, Md Mokarram Hossain Chowdhury, and Uthso Nandy. "LTE/LTE-A Based Advanced Wireless Networks." Journal of Engineering Research and Reports 25, no. 10 (2023): 195–99. http://dx.doi.org/10.9734/jerr/2023/v25i101012.
Full textFan, Xin Xin, Teng Wu, and Guang Gong. "An Efficient Stream Cipher WG-16 and its Application for Securing 4G-LTE Networks." Applied Mechanics and Materials 490-491 (January 2014): 1436–50. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1436.
Full textPremchander, Dr Tudi. "Survey on Vulnerability of 4G/LTE Network Security and Improvements." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 1736–41. http://dx.doi.org/10.22214/ijraset.2022.42666.
Full textWang, Jin, Zhongqi Zhang, Yongjun Ren, Bin Li, and Jeong-Uk Kim. "Issues toward Networks Architecture Security for LTE and LTE-A Networks." International Journal of Security and Its Applications 8, no. 4 (2014): 17–24. http://dx.doi.org/10.14257/ijsia.2014.8.4.02.
Full textCao, Jin, Maode Ma, Hui Li, Yueyu Zhang, and Zhenxing Luo. "A Survey on Security Aspects for LTE and LTE-A Networks." IEEE Communications Surveys & Tutorials 16, no. 1 (2014): 283–302. http://dx.doi.org/10.1109/surv.2013.041513.00174.
Full textPanda, Prabhat Kumar, and Sudipta Chattopadhyay. "An improved authentication and security scheme for LTE/LTE-A networks." Journal of Ambient Intelligence and Humanized Computing 11, no. 5 (2019): 2163–85. http://dx.doi.org/10.1007/s12652-019-01248-8.
Full textHuang, Lian Fen, and Hang Liu. "Research and Implementation of IPSEC Based on TD-LTE System." Applied Mechanics and Materials 427-429 (September 2013): 2783–86. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2783.
Full textFu, Yulong, Hanlu Chen, Qinghua Zheng, et al. "An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks." Journal of Network and Computer Applications 155 (April 2020): 102549. http://dx.doi.org/10.1016/j.jnca.2020.102549.
Full textLi, Xiao Wen, and Fang Liu. "The Design and Realization of Packet Data Security in LTE-A." Applied Mechanics and Materials 380-384 (August 2013): 2165–68. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2165.
Full textErnsberger, Dominik, K. Jijo George, and Sivabalan Arumugam. "Security Study and Monitoring of LTE Networks." Journal of ICT Standardization 7, no. 1 (2019): 43–60. http://dx.doi.org/10.13052/jicts2245-800x.713.
Full textLi, Xiao Wen, and Fang Liu. "Study and Realization of SNOW 3G in LTE System." Advanced Materials Research 756-759 (September 2013): 841–45. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.841.
Full textLawange, Saurabh, and Manish Narnaware. "Review on LTE Cryptography Algorithm ZUC and its Attacks." International Journal of Emerging Research in Management and Technology 6, no. 7 (2018): 100. http://dx.doi.org/10.23956/ijermt.v6i7.192.
Full textM. Zaki, Rana, and Hala Bahjat Abdul wahab. "4G Network Security Algorithms: Overview." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 16 (2021): 127. http://dx.doi.org/10.3991/ijim.v15i16.24175.
Full textSEREȚEANU, Adriana. "Security in Most Recent Generation of Mobile Telecommunication Networks – LTE." International Journal of Information Security and Cybercrime 2, no. 1 (2013): 17–24. http://dx.doi.org/10.19107/ijisc.2013.01.02.
Full textJang, Uijin, Hyungmin Lim, and Hyungjoo Kim. "Privacy-Enhancing Security Protocol in LTE Initial Attack." Symmetry 6, no. 4 (2014): 1011–25. http://dx.doi.org/10.3390/sym6041011.
Full textBikos, Anastasios N., and Nicolas Sklavos. "LTE/SAE Security Issues on 4G Wireless Networks." IEEE Security & Privacy 11, no. 2 (2013): 55–62. http://dx.doi.org/10.1109/msp.2012.136.
Full textAbdrabou, Mohammed, Dr Essam Abd El-Wanis, and Assoc Prof Dr Ashraf Diaa Eldien Elbayoumy. "Security Enhancement for LTE Authentication Protocol (EPS-AKA)." International Conference on Aerospace Sciences and Aviation Technology 16, AEROSPACE SCIENCES (2015): 1–10. http://dx.doi.org/10.21608/asat.2015.23028.
Full textLi, Mei Mei, and Jing Li. "Research on Security in EMM Sublayer in TD-LTE." Applied Mechanics and Materials 401-403 (September 2013): 1986–89. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.1986.
Full textThực, Hoàng Văn. "CƠ CHẾ BẢO MẬT GÓI TIN BẰNG IPSEC TRONG MẠNG THÔNG TIN DI ĐỘNG 4G/LTE". TNU Journal of Science and Technology 227, № 16 (2022): 174–79. http://dx.doi.org/10.34238/tnu-jst.6748.
Full textLee, Jae-Jeong, Pyung-Koo Park, Byung-Chang Chung, Sang-Wan Kim, Ki-Dong Nam, and Woo-Seop Rhee. "Call Model and Test-Verification Methods for PS-LTE Core Equipment." Electronics 10, no. 20 (2021): 2513. http://dx.doi.org/10.3390/electronics10202513.
Full textEdward, E. Prince. "A Context Transfer Model for Secure Handover in WiMAX/LTE Integrated Networks." International Journal of Mobile Computing and Multimedia Communications 6, no. 3 (2014): 56–74. http://dx.doi.org/10.4018/ijmcmc.2014070103.
Full textRakhimova, Sevarakhon Sanatjon kizi. "ALGORITHMS FOR EVALUATING THE EFFECTIVENESS OF INFORMATION SECURITY SYSTEMS IN LTE NETWORKS." JOURNAL OF INNOVATIONS IN SCIENTIFIC AND EDUCATIONAL RESEARCH 6, no. 4 (2023): 344–48. https://doi.org/10.5281/zenodo.7881725.
Full textHashim Qasim, Nameer, Fakher Rahim, and Nataliia Bodnar. "A comprehensive investigation of an LTE-enabled smart door system using the Arduino UNO." Edelweiss Applied Science and Technology 8, no. 4 (2024): 697–708. http://dx.doi.org/10.55214/25768484.v8i4.1446.
Full textTantawy, Mohsen M., Adly S. Tag ELdien, and Esraa Mosleh Eid. "Performance and Rekeying Analysis of Multicast Security in LTE." International journal of Computer Networks & Communications 5, no. 4 (2013): 103–16. http://dx.doi.org/10.5121/ijcnc.2013.5409.
Full textLydiah Moraa Machora. "Cyber-security and performance Issues in 4G LTE network." World Journal of Advanced Engineering Technology and Sciences 12, no. 2 (2024): 622–62. http://dx.doi.org/10.30574/wjaets.2024.12.2.0328.
Full textSun, Gengxin, Sheng Bin, and Yixin Zhou. "A High Security Architecture for LTE Core Network Server." International Journal of Future Generation Communication and Networking 9, no. 11 (2016): 337–44. http://dx.doi.org/10.14257/ijfgcn.2016.9.11.31.
Full textShi, Jingwen, Sihan Wang, Min-Yue Chen, et al. "IMS is Not That Secure on Your 5G/4G Phones." GetMobile: Mobile Computing and Communications 29, no. 1 (2025): 20–24. https://doi.org/10.1145/3733892.3733899.
Full textChoi, Dae-Sung, and Hyoung-Kee Choi. "An Group-based Security Protocol for Machine Type Communications in LTE-Advanced." Journal of the Korea Institute of Information Security and Cryptology 23, no. 5 (2013): 885–96. http://dx.doi.org/10.13089/jkiisc.2013.23.5.885.
Full textZhang, Run, WenAn Zhou, and Huamiao Hu. "Towards 5G Security Analysis against Null Security Algorithms Used in Normal Communication." Security and Communication Networks 2021 (October 20, 2021): 1–15. http://dx.doi.org/10.1155/2021/4498324.
Full textMariya, Ouaissa, and Rhattoy A. "A New Scheme of Group-based AKA for Machine Type Communication over LTE Networks." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 2 (2018): 1169–81. https://doi.org/10.11591/ijece.v8i2.pp1169-1181.
Full textXu, Cheng, Xiaohong Huang, Maode Ma, and Hong Bao. "An Anonymous Handover Authentication Scheme Based on LTE-A for Vehicular Networks." Wireless Communications and Mobile Computing 2018 (July 3, 2018): 1–15. http://dx.doi.org/10.1155/2018/6251219.
Full textDai, Jian Mei, Hua Fang Geng, and Zuo Xue Liu. "The Application Research on the TD-LTE Technology in Military." Applied Mechanics and Materials 631-632 (September 2014): 843–46. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.843.
Full textWoo Jwa, Jeong, and Joong Hie Won. "Network Quality Measurements of LTE Drones." International Journal of Engineering & Technology 7, no. 3.33 (2018): 54. http://dx.doi.org/10.14419/ijet.v7i3.33.18523.
Full textJie, Huang. "A Survey of Network and Information Security." International Journal of Informatics and Computation 1, no. 2 (2019): 15. http://dx.doi.org/10.35842/ijicom.v1i2.6.
Full textParne, Balu L., Shubham Gupta, and Narendra S. Chaudhari. "PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks." Peer-to-Peer Networking and Applications 12, no. 5 (2019): 1156–77. http://dx.doi.org/10.1007/s12083-019-00785-5.
Full textOh, Insu, Mahdi Sahlabadi, Kangbin Yim, and Sunyoung Lee. "Threat Classification and Vulnerability Analysis on 5G Firmware Over-the-Air Updates for Mobile and Automotive Platforms." Electronics 14, no. 10 (2025): 2034. https://doi.org/10.3390/electronics14102034.
Full textBhat, Showkat Ahmad, and Amandeep Singh. "A Novel Image Encryption Algorithm Using Multiple Encryption Techniques for Mobile Devices." International Journal of Sensors, Wireless Communications and Control 10, no. 2 (2020): 123–42. http://dx.doi.org/10.2174/2210327909666190408094102.
Full textParne, Balu L., Shubham Gupta, and Narendra S. Chaudhari. "SEGB: Security Enhanced Group Based AKA Protocol for M2M Communication in an IoT Enabled LTE/LTE-A Network." IEEE Access 6 (2018): 3668–84. http://dx.doi.org/10.1109/access.2017.2788919.
Full textBou Abdo, Jacques. "Security V/S Qos for LTE Authentication and Key Agreement Protocol." International Journal of Network Security & Its Applications 4, no. 5 (2012): 71–82. http://dx.doi.org/10.5121/ijnsa.2012.4506.
Full textHahn, Changhee, Hyunsoo Kwon, and Junbeom Hur. "Security Enhanced Authentication Protocol in LTE With Preserving User Location Privacy." Journal of KIISE 41, no. 9 (2014): 715–27. http://dx.doi.org/10.5626/jok.2014.41.9.715.
Full textBellafkih, Mostafa, Amine Baina, and Ouafae Kasmi. "Security evaluation management over LTE critical infrastructures networks: IMS case study." International Journal of Critical Infrastructures 15, no. 4 (2019): 285. http://dx.doi.org/10.1504/ijcis.2019.10023734.
Full textKasmi, Ouafae, Amine Baina, and Mostafa Bellafkih. "Security evaluation management over LTE critical infrastructures networks: IMS case study." International Journal of Critical Infrastructures 15, no. 4 (2019): 285. http://dx.doi.org/10.1504/ijcis.2019.103013.
Full textSaini, Akanksha, Enrique D. Festijo, and Younchan Jung. "Packet key-based security system for the next generation LTE networks." Procedia Computer Science 110 (2017): 297–303. http://dx.doi.org/10.1016/j.procs.2017.06.098.
Full textHan, Chan-Kyu, and Hyoung-Kee Choi. "Security Analysis of Handover Key Management in 4G LTE/SAE Networks." IEEE Transactions on Mobile Computing 13, no. 2 (2014): 457–68. http://dx.doi.org/10.1109/tmc.2012.242.
Full textPohasii, Serhii, Stanislav Milevskyi, Bogdan Tomashevsky, and Natalya Voropay. "DEVELOPMENT OF THE DOUBLE-CONTOUR PROTECTION CONCEPT IN SOCIO-CYBERPHYSICAL SYSTEMS." Advanced Information Systems 6, no. 2 (2022): 57–66. http://dx.doi.org/10.20998/2522-9052.2022.2.10.
Full text., Nidhi. "AN OVERVIEW OF THE ATTACKS ON LTE IN 4G: EXPLOITING THE SECURITY." International Journal of Advanced Research in Computer Science 8, no. 9 (2017): 679–81. http://dx.doi.org/10.26483/ijarcs.v8i9.5150.
Full textChoi, Daesung, Hyoung-Kee Choi, and Se-Young Lee. "A group-based security protocol for machine-type communications in LTE-advanced." Wireless Networks 21, no. 2 (2014): 405–19. http://dx.doi.org/10.1007/s11276-014-0788-9.
Full text