To see the other types of publications on this topic, follow the link: LTE Security.

Journal articles on the topic 'LTE Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'LTE Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

IANCU, Laura. "An Overview of LTE Security." International Journal of Information Security and Cybercrime 1, no. 2 (2012): 48–57. http://dx.doi.org/10.19107/ijisc.2012.02.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

He, Limei, Zheng Yan, and Mohammed Atiquzzaman. "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey." IEEE Access 6 (2018): 4220–42. http://dx.doi.org/10.1109/access.2018.2792534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kim, Daegeon, Do Hyung Gu, and Huy Kang Kim. "Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment." Security and Communication Networks 2020 (December 7, 2020): 1–13. http://dx.doi.org/10.1155/2020/8869418.

Full text
Abstract:
National disasters can threaten national security and require several organizations to integrate the functionalities to correspond to the event. Many countries are constructing a nationwide mobile communication network infrastructure to share information and promptly communicate with corresponding organizations. Public Safety Long-Term Evolution (PS-LTE) is a communication mechanism adopted in many countries to achieve such a purpose. Organizations can increase the efficiency of public protection and disaster relief (PPDR) operations by securely connecting the services run on their legacy netw
APA, Harvard, Vancouver, ISO, and other styles
4

Khan, Shaikhul Arefin, Md Mokarram Hossain Chowdhury, and Uthso Nandy. "LTE/LTE-A Based Advanced Wireless Networks." Journal of Engineering Research and Reports 25, no. 10 (2023): 195–99. http://dx.doi.org/10.9734/jerr/2023/v25i101012.

Full text
Abstract:
LTE/LTE-A is a wireless broadband standard that provides quick and reliable connectivity for the Internet of Things (IoT) and other connected devices. It is the de facto standard for 4G wireless, offering high-speed communication, extensive network coverage, and low latency. LTE/LTE-A networks are crucial for real-time IoT applications, offering high-speed data transfer, extensive coverage, low latency, and scalability. However, challenges in evaluating LTE/LTE-A-based wireless networks for IoT include compatibility, cost, power consumption, network coverage, and security. Large-scale deployme
APA, Harvard, Vancouver, ISO, and other styles
5

Fan, Xin Xin, Teng Wu, and Guang Gong. "An Efficient Stream Cipher WG-16 and its Application for Securing 4G-LTE Networks." Applied Mechanics and Materials 490-491 (January 2014): 1436–50. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1436.

Full text
Abstract:
The fourth generation of mobile telecommunications system (marketed as 4G-LTE) is being commercially and widely deployed. Security mechanisms are crucial to protect communications of mobile users from potential malicious attacks as well as to ensure revenue for 4G-LTE network operators. The randomness properties of the keystream generated by the current cipher suites in 4G-LTE standard are difficult to analyze and some vulnerabilities with regard to the integrity algorithms have been recently discovered. To address those issues, we present a detailed specification and security analysis of a bi
APA, Harvard, Vancouver, ISO, and other styles
6

Premchander, Dr Tudi. "Survey on Vulnerability of 4G/LTE Network Security and Improvements." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 1736–41. http://dx.doi.org/10.22214/ijraset.2022.42666.

Full text
Abstract:
Abstract: Network security is viewed as a huge issue in our regular routine because of its going into many individuals' exercises like social movement, showcasing and business. Notwithstanding, the requirement for a safe and strong organization has expanded. The requirements for a secure organization have expanded because of the expanding dangers and programmers in our regular routine. In view of the ongoing insights, each second the quantity of supporters is expanding multiple times around the world which refers to the quick development of 4G/LTE organizations. It is seen that 80% of individu
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Jin, Zhongqi Zhang, Yongjun Ren, Bin Li, and Jeong-Uk Kim. "Issues toward Networks Architecture Security for LTE and LTE-A Networks." International Journal of Security and Its Applications 8, no. 4 (2014): 17–24. http://dx.doi.org/10.14257/ijsia.2014.8.4.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cao, Jin, Maode Ma, Hui Li, Yueyu Zhang, and Zhenxing Luo. "A Survey on Security Aspects for LTE and LTE-A Networks." IEEE Communications Surveys & Tutorials 16, no. 1 (2014): 283–302. http://dx.doi.org/10.1109/surv.2013.041513.00174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Panda, Prabhat Kumar, and Sudipta Chattopadhyay. "An improved authentication and security scheme for LTE/LTE-A networks." Journal of Ambient Intelligence and Humanized Computing 11, no. 5 (2019): 2163–85. http://dx.doi.org/10.1007/s12652-019-01248-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Huang, Lian Fen, and Hang Liu. "Research and Implementation of IPSEC Based on TD-LTE System." Applied Mechanics and Materials 427-429 (September 2013): 2783–86. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2783.

Full text
Abstract:
With the rapid development of Internet technology, network and information security has become increasingly important. After studying the principle of IPSEC(IP Security) and VPN (Virtual Private Network) technology, this paper designs a network architecture which is called S1 in the TD-LTE communication system. The specific packet is securely encrypted by using IPSEC technology between the base station and security gateway. After a lot of tests, the technical solution to achieve IPSEC is proved to be realized and to have a highly efficient and stable characteristic.
APA, Harvard, Vancouver, ISO, and other styles
11

Fu, Yulong, Hanlu Chen, Qinghua Zheng, et al. "An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks." Journal of Network and Computer Applications 155 (April 2020): 102549. http://dx.doi.org/10.1016/j.jnca.2020.102549.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Li, Xiao Wen, and Fang Liu. "The Design and Realization of Packet Data Security in LTE-A." Applied Mechanics and Materials 380-384 (August 2013): 2165–68. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2165.

Full text
Abstract:
In the wireless access technology system, reliable and more efficient security algorithm is important to guarantee high-speed data transmission of LTE. In the development process of LTE-A Radio Frequency Conformance Test System, we designed a detailed security process in PDCP ( Packet Data Convergence Protocol ) and realized it through encryption algorithm and Integrity algorithm. This paper adopts SDL and TTCN to test the security process of PDCP.And we applied it to LTE-A system successfully.
APA, Harvard, Vancouver, ISO, and other styles
13

Ernsberger, Dominik, K. Jijo George, and Sivabalan Arumugam. "Security Study and Monitoring of LTE Networks." Journal of ICT Standardization 7, no. 1 (2019): 43–60. http://dx.doi.org/10.13052/jicts2245-800x.713.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Li, Xiao Wen, and Fang Liu. "Study and Realization of SNOW 3G in LTE System." Advanced Materials Research 756-759 (September 2013): 841–45. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.841.

Full text
Abstract:
In the wireless access technology system, reliable and efficient security algorithm is an important guarantee which realizes the high-speed data transmission of LTE (Long Time evolution). The SNOW 3G was used in LTE for its own advantages for security algorithms. This paper describes the procedure of security. Focus on the principle of confidentiality and integrity algorithms of SNOW 3G , then analyses the performance and gets the test result of this algorithms at last.
APA, Harvard, Vancouver, ISO, and other styles
15

Lawange, Saurabh, and Manish Narnaware. "Review on LTE Cryptography Algorithm ZUC and its Attacks." International Journal of Emerging Research in Management and Technology 6, no. 7 (2018): 100. http://dx.doi.org/10.23956/ijermt.v6i7.192.

Full text
Abstract:
Security is the important when it comes to wireless communication, and as the expectations of people increased, the data service now arrived at LTE. The faster data access and communication with high priority security. ZUC is the algorithm adopted to provide security under third set of LTE i.e. EEA3 and EIA3. The algorithms are used for confidentiality and integrity protection over the air. To analyze the security level of the algorithm different attacks were published in literature. The aim of this paper is to discuss the working of ZUC algorithm in detail. Also different attacks are listed i
APA, Harvard, Vancouver, ISO, and other styles
16

M. Zaki, Rana, and Hala Bahjat Abdul wahab. "4G Network Security Algorithms: Overview." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 16 (2021): 127. http://dx.doi.org/10.3991/ijim.v15i16.24175.

Full text
Abstract:
<p class="0abstractCxSpFirst">Long Term Evolution (LTE) of (Universal Mobile Telecommunication System) is one of the modern steps in series of mobile telecommunications systems. That appears to be a strong technology that meets the requirements of fourth-generation (4G) mobile networks and supports authentication and encryption mechanisms between User Equipment (UE) and Message Management Entity (MME). This paper provides an overview of the three most important algorithms that are considered the heart of LTE cryptographic algorithms (SNOW3G, AES, and ZUC) and a comparison between cipher
APA, Harvard, Vancouver, ISO, and other styles
17

SEREȚEANU, Adriana. "Security in Most Recent Generation of Mobile Telecommunication Networks – LTE." International Journal of Information Security and Cybercrime 2, no. 1 (2013): 17–24. http://dx.doi.org/10.19107/ijisc.2013.01.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Jang, Uijin, Hyungmin Lim, and Hyungjoo Kim. "Privacy-Enhancing Security Protocol in LTE Initial Attack." Symmetry 6, no. 4 (2014): 1011–25. http://dx.doi.org/10.3390/sym6041011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Bikos, Anastasios N., and Nicolas Sklavos. "LTE/SAE Security Issues on 4G Wireless Networks." IEEE Security & Privacy 11, no. 2 (2013): 55–62. http://dx.doi.org/10.1109/msp.2012.136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Abdrabou, Mohammed, Dr Essam Abd El-Wanis, and Assoc Prof Dr Ashraf Diaa Eldien Elbayoumy. "Security Enhancement for LTE Authentication Protocol (EPS-AKA)." International Conference on Aerospace Sciences and Aviation Technology 16, AEROSPACE SCIENCES (2015): 1–10. http://dx.doi.org/10.21608/asat.2015.23028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Li, Mei Mei, and Jing Li. "Research on Security in EMM Sublayer in TD-LTE." Applied Mechanics and Materials 401-403 (September 2013): 1986–89. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.1986.

Full text
Abstract:
Security in EMM sublayer is an important part of LTE security system. This paper is developed into three part: researches on Security Mode Command and Authentication process, introduction to key hierarchy and analysis on Integrity Protection and implementation of encryption / decryption.
APA, Harvard, Vancouver, ISO, and other styles
22

Thực, Hoàng Văn. "CƠ CHẾ BẢO MẬT GÓI TIN BẰNG IPSEC TRONG MẠNG THÔNG TIN DI ĐỘNG 4G/LTE". TNU Journal of Science and Technology 227, № 16 (2022): 174–79. http://dx.doi.org/10.34238/tnu-jst.6748.

Full text
Abstract:
Ngày nay, vấn đề bảo mật trong các mạng thông tin di động trên thế giới và tại Việt Nam là một vấn đề rất quan trọng. Vì vậy các giải pháp khắc phục và bảo mật mạng là rất cần thiết. Trong các cách bảo vệ mạng, IP Security trở thành một giải pháp hiệu quả giúp bảo mật các gói tin được truyền trong hệ thống mạng thông tin di động. Bài báo sẽ trình bày các vấn đề và phương pháp liên quan đến giao thức bảo mật IP Security, đồng thời giới thiệu cơ chế bảo mật IP Security trong mạng thông tin di động 4G/LTE và đưa ra các phương pháp mô phỏng bảo mật gói tin bằngIP Security. Giao thức IP Security và
APA, Harvard, Vancouver, ISO, and other styles
23

Lee, Jae-Jeong, Pyung-Koo Park, Byung-Chang Chung, Sang-Wan Kim, Ki-Dong Nam, and Woo-Seop Rhee. "Call Model and Test-Verification Methods for PS-LTE Core Equipment." Electronics 10, no. 20 (2021): 2513. http://dx.doi.org/10.3390/electronics10202513.

Full text
Abstract:
Existing technologies in disaster and safety communication networks (DSCNs) face problems such as narrow bandwidth, low transmission rate, and difficulty in securing channels. Conversely, public safety long-term evolution (PS-LTE) technology provides high-speed, low-latency, quick-setup, and high-security data access for multimedia-based mission-critical services. To perform tests on each unit of core equipment with PS-LTE technology, a new call model such as push-to-talk, which is a service representing PS-LTE, is required. Moreover, objective and consistent metrics and methods are required f
APA, Harvard, Vancouver, ISO, and other styles
24

Edward, E. Prince. "A Context Transfer Model for Secure Handover in WiMAX/LTE Integrated Networks." International Journal of Mobile Computing and Multimedia Communications 6, no. 3 (2014): 56–74. http://dx.doi.org/10.4018/ijmcmc.2014070103.

Full text
Abstract:
One of the recent research issues in IP Multimedia Subsystem (IMS) based heterogeneous internetworking environment is to provide secure handover when a mobile node (MN) moves between different access networks. Various security schemes are available in literature but most of the schemes provide security but degrades the Quality of Service (QoS). The objective of this work is to provide secure and efficient handover in an IMS based Worldwide Interoperability for Microwave access (WiMAX)/ Long Term Evolution (LTE) integrated networks by using the proposed Secure Context Transfer Model (SCTM). New
APA, Harvard, Vancouver, ISO, and other styles
25

Rakhimova, Sevarakhon Sanatjon kizi. "ALGORITHMS FOR EVALUATING THE EFFECTIVENESS OF INFORMATION SECURITY SYSTEMS IN LTE NETWORKS." JOURNAL OF INNOVATIONS IN SCIENTIFIC AND EDUCATIONAL RESEARCH 6, no. 4 (2023): 344–48. https://doi.org/10.5281/zenodo.7881725.

Full text
Abstract:
<em>Fourth generation wireless broadband mobile technology is a mobile communication standard that has been continuously improved since 2010. Technological solutions have evolved that include bandwidth expansion, frequency aggregation, and advanced multipath capabilities with support for signal relaying. Every year, the number of fourth generation connections is increasing, which means that the risk of cyber attacks on user and operator equipment is increasing. The article examined the infrastructure of the fourth generation network, the components of the security architecture and their relati
APA, Harvard, Vancouver, ISO, and other styles
26

Hashim Qasim, Nameer, Fakher Rahim, and Nataliia Bodnar. "A comprehensive investigation of an LTE-enabled smart door system using the Arduino UNO." Edelweiss Applied Science and Technology 8, no. 4 (2024): 697–708. http://dx.doi.org/10.55214/25768484.v8i4.1446.

Full text
Abstract:
Traditional residential security systems frequently lack remote access and real-time reaction capabilities, necessitating home automation security technology developments. With the rise of the Internet of Things (IoT), solutions such as the Smart Door are prepared to transcend these constraints by leveraging modern communication technology. The article aims to develop, implement, and evaluate an LTE-enabled Smart Door system built on the Arduino Uno platform. The goal is to improve home security by offering keyless entry, real-time surveillance, and remote operation, increasing user convenienc
APA, Harvard, Vancouver, ISO, and other styles
27

Tantawy, Mohsen M., Adly S. Tag ELdien, and Esraa Mosleh Eid. "Performance and Rekeying Analysis of Multicast Security in LTE." International journal of Computer Networks & Communications 5, no. 4 (2013): 103–16. http://dx.doi.org/10.5121/ijcnc.2013.5409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Lydiah Moraa Machora. "Cyber-security and performance Issues in 4G LTE network." World Journal of Advanced Engineering Technology and Sciences 12, no. 2 (2024): 622–62. http://dx.doi.org/10.30574/wjaets.2024.12.2.0328.

Full text
Abstract:
The 4G LTE (Long Term Evolution) network represents a substantial challenge in wireless communication technology, providing slightly improved data transfer rates, decreased response time, and heightened connectedness from the 3G network. Nevertheless, there are significant worries surrounding the cybersecurity of these sophisticated network. The convergence of people, procedures, and technology to defend business, persons, or networks against digital attacks is known as cybersecurity. Cybersecurity is essential to protect organizational assets from risks such as but not limited to personal dat
APA, Harvard, Vancouver, ISO, and other styles
29

Sun, Gengxin, Sheng Bin, and Yixin Zhou. "A High Security Architecture for LTE Core Network Server." International Journal of Future Generation Communication and Networking 9, no. 11 (2016): 337–44. http://dx.doi.org/10.14257/ijfgcn.2016.9.11.31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Shi, Jingwen, Sihan Wang, Min-Yue Chen, et al. "IMS is Not That Secure on Your 5G/4G Phones." GetMobile: Mobile Computing and Communications 29, no. 1 (2025): 20–24. https://doi.org/10.1145/3733892.3733899.

Full text
Abstract:
The IP Multimedia Subsystem (IMS) delivers IP multimedia services, such as voice/video calling and texting, to mobile users over cellular networks. In the past two decades, IMS services have been augmented to support various access networks, incorporating VoLTE (Voice over LTE), VoNR (Voice over New Radio), and VoWi-Fi (Voice over Wi-Fi). IMS security has also been enhanced with a suite of well-examined mechanisms, including 5G/4G AKA (Authentication and Key Agreement), cellular-specific multilayer security, and IMS media security [1, 2, 3]. However, despite constant upgrades by 3GPP over the
APA, Harvard, Vancouver, ISO, and other styles
31

Choi, Dae-Sung, and Hyoung-Kee Choi. "An Group-based Security Protocol for Machine Type Communications in LTE-Advanced." Journal of the Korea Institute of Information Security and Cryptology 23, no. 5 (2013): 885–96. http://dx.doi.org/10.13089/jkiisc.2013.23.5.885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Zhang, Run, WenAn Zhou, and Huamiao Hu. "Towards 5G Security Analysis against Null Security Algorithms Used in Normal Communication." Security and Communication Networks 2021 (October 20, 2021): 1–15. http://dx.doi.org/10.1155/2021/4498324.

Full text
Abstract:
mailto: 5G network makes our lives delicate and more pleasant, and its security will impact the operation of the entire society. Compared with the LTE network, 5G brings up many new security features and possesses more sophisticated and robust security mechanisms, while there are still many potential security issues with the 5G network. Therefore, the security analysis of the 5G network is highly crucial. Null security algorithm (i.e., NEA0 and NIA0) is used in normal communication, a security vulnerability that exists and has not been fully addressed in the LTE network, but in the 5G network,
APA, Harvard, Vancouver, ISO, and other styles
33

Mariya, Ouaissa, and Rhattoy A. "A New Scheme of Group-based AKA for Machine Type Communication over LTE Networks." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 2 (2018): 1169–81. https://doi.org/10.11591/ijece.v8i2.pp1169-1181.

Full text
Abstract:
Machine Type Communication (MTC) is considered as one of the most important approaches to the future of mobile communication has attracted more and more attention. To reach the safety of MTC, applications in networks must meet the low power consumption requirements of devices and mass transmission device. When a large number of MTC devices get connected to the network, each MTC device must implement an independent access authentication process according to the 3GPP standard, which will cause serious traffic congestion in the Long Term Evolution (LTE) network. In this article, we propose a new
APA, Harvard, Vancouver, ISO, and other styles
34

Xu, Cheng, Xiaohong Huang, Maode Ma, and Hong Bao. "An Anonymous Handover Authentication Scheme Based on LTE-A for Vehicular Networks." Wireless Communications and Mobile Computing 2018 (July 3, 2018): 1–15. http://dx.doi.org/10.1155/2018/6251219.

Full text
Abstract:
Vehicular networks play an important role in the intelligent transportation systems which have gained technical supports from car industry. Due to the mobility and the broadcast nature of wireless communication, security of the vehicular networks is a critical issue for the academia and industry. Many solutions have been proposed to target the security provisioning. However, most of them have various shortcomings. Based on the elliptic curve public key cryptography algorithm, in this paper, we propose a new anonymous roaming authentication protocol for the Long Term Evolution-Advanced (LTE-A)
APA, Harvard, Vancouver, ISO, and other styles
35

Dai, Jian Mei, Hua Fang Geng, and Zuo Xue Liu. "The Application Research on the TD-LTE Technology in Military." Applied Mechanics and Materials 631-632 (September 2014): 843–46. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.843.

Full text
Abstract:
TD-LTE technology can be introduced to improve the performance of military wireless communication system greatly for its better capability of broadband transmission while existing military wireless communication network cannot meet with the increase and further requirements of military task types. The technical characteristics and advantages of TD-LTE are analyzed, the problem of security, anti-jamming and mobility which are to be solved if TD-LTE technology applied in military are mainly studied, and the technical solutions are given.
APA, Harvard, Vancouver, ISO, and other styles
36

Woo Jwa, Jeong, and Joong Hie Won. "Network Quality Measurements of LTE Drones." International Journal of Engineering & Technology 7, no. 3.33 (2018): 54. http://dx.doi.org/10.14419/ijet.v7i3.33.18523.

Full text
Abstract:
Cellular-connected drones can provide beyond line-of sight control (BVLOS), low latency, real time communication, robust security, and wide range coverage. Cellular-connected drones have several key potential applications in enhanced LTE and 5G networks. The objective of the study is to evaluate field measurement data collected during drone flights in the KT Long-Term Evolution (LTE) networks in Seoul and Jeju, Korea. The multicopter drones are developed with LTE modem and LTE test smart phone for field measurements. The radio network quality between drones and LTE base transceiver stations (B
APA, Harvard, Vancouver, ISO, and other styles
37

Jie, Huang. "A Survey of Network and Information Security." International Journal of Informatics and Computation 1, no. 2 (2019): 15. http://dx.doi.org/10.35842/ijicom.v1i2.6.

Full text
Abstract:
Security threats and shows abnormality about security, safety, privacy and trust as network security-related data, in short, security-related data. Apparently, the first step to detect network attacks and intrusions is to collect the security-related data. In this paper, we will present a lot of approaches to solving Networks and Information Security issues. We survey network security in LTE technologies, Vehicular Ad-Hoc Network, and security in Wireless Sensor Network. Internet of Things. In this paper, we describe many methods in Information Security. Is consist of Information Security in B
APA, Harvard, Vancouver, ISO, and other styles
38

Parne, Balu L., Shubham Gupta, and Narendra S. Chaudhari. "PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks." Peer-to-Peer Networking and Applications 12, no. 5 (2019): 1156–77. http://dx.doi.org/10.1007/s12083-019-00785-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Oh, Insu, Mahdi Sahlabadi, Kangbin Yim, and Sunyoung Lee. "Threat Classification and Vulnerability Analysis on 5G Firmware Over-the-Air Updates for Mobile and Automotive Platforms." Electronics 14, no. 10 (2025): 2034. https://doi.org/10.3390/electronics14102034.

Full text
Abstract:
The integration of 5G technology with existing LTE architectures has facilitated the widespread adoption of firmware over-the-air (FOTA) updates across Android-based devices, including mobile and automotive infotainment systems. While 5G enhances communication speed and convenience, vulnerabilities related to firmware tampering and Man-in-the-Middle (MitM) attacks still present considerable risks. This study analyzes the security of the FOTA update process for six Android-based mobile manufacturers and one vehicle model, all of which utilize LTE architectures within 5G networks. Through compre
APA, Harvard, Vancouver, ISO, and other styles
40

Bhat, Showkat Ahmad, and Amandeep Singh. "A Novel Image Encryption Algorithm Using Multiple Encryption Techniques for Mobile Devices." International Journal of Sensors, Wireless Communications and Control 10, no. 2 (2020): 123–42. http://dx.doi.org/10.2174/2210327909666190408094102.

Full text
Abstract:
Background &amp; Objective: Digital multimedia exchange between different mobile communication devices has increased rapidly with the invention of the high-speed data services like LTE-A, LTE, and WiMAX. However, there are always certain security risks associated with the use of wireless communication technologies. Methods: To protect the digital images against cryptographic attacks different image encryption algorithms are being employed in the wireless communication networks. These algorithms use comparatively less key spaces and accordingly offer inadequate security. The proposed algorithm
APA, Harvard, Vancouver, ISO, and other styles
41

Parne, Balu L., Shubham Gupta, and Narendra S. Chaudhari. "SEGB: Security Enhanced Group Based AKA Protocol for M2M Communication in an IoT Enabled LTE/LTE-A Network." IEEE Access 6 (2018): 3668–84. http://dx.doi.org/10.1109/access.2017.2788919.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Bou Abdo, Jacques. "Security V/S Qos for LTE Authentication and Key Agreement Protocol." International Journal of Network Security & Its Applications 4, no. 5 (2012): 71–82. http://dx.doi.org/10.5121/ijnsa.2012.4506.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Hahn, Changhee, Hyunsoo Kwon, and Junbeom Hur. "Security Enhanced Authentication Protocol in LTE With Preserving User Location Privacy." Journal of KIISE 41, no. 9 (2014): 715–27. http://dx.doi.org/10.5626/jok.2014.41.9.715.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Bellafkih, Mostafa, Amine Baina, and Ouafae Kasmi. "Security evaluation management over LTE critical infrastructures networks: IMS case study." International Journal of Critical Infrastructures 15, no. 4 (2019): 285. http://dx.doi.org/10.1504/ijcis.2019.10023734.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Kasmi, Ouafae, Amine Baina, and Mostafa Bellafkih. "Security evaluation management over LTE critical infrastructures networks: IMS case study." International Journal of Critical Infrastructures 15, no. 4 (2019): 285. http://dx.doi.org/10.1504/ijcis.2019.103013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Saini, Akanksha, Enrique D. Festijo, and Younchan Jung. "Packet key-based security system for the next generation LTE networks." Procedia Computer Science 110 (2017): 297–303. http://dx.doi.org/10.1016/j.procs.2017.06.098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Han, Chan-Kyu, and Hyoung-Kee Choi. "Security Analysis of Handover Key Management in 4G LTE/SAE Networks." IEEE Transactions on Mobile Computing 13, no. 2 (2014): 457–68. http://dx.doi.org/10.1109/tmc.2012.242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Pohasii, Serhii, Stanislav Milevskyi, Bogdan Tomashevsky, and Natalya Voropay. "DEVELOPMENT OF THE DOUBLE-CONTOUR PROTECTION CONCEPT IN SOCIO-CYBERPHYSICAL SYSTEMS." Advanced Information Systems 6, no. 2 (2022): 57–66. http://dx.doi.org/10.20998/2522-9052.2022.2.10.

Full text
Abstract:
The rapid development of mobile Internet technologies LTE (Long-Term Evolution) not only predetermined the further development of cyber-physical systems, which are based on the synthesis of technologies of classical computer systems and LTE technologies, as well as integration with Internet-of-Things technologies. As a result, the emergence of sociocyberphysical systems predetermines further development based on this integration. The creation of mesh- and sensor networks also allows the development of smart technologies and systems based on their conglomeration. The development and creation of
APA, Harvard, Vancouver, ISO, and other styles
49

., Nidhi. "AN OVERVIEW OF THE ATTACKS ON LTE IN 4G: EXPLOITING THE SECURITY." International Journal of Advanced Research in Computer Science 8, no. 9 (2017): 679–81. http://dx.doi.org/10.26483/ijarcs.v8i9.5150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Choi, Daesung, Hyoung-Kee Choi, and Se-Young Lee. "A group-based security protocol for machine-type communications in LTE-advanced." Wireless Networks 21, no. 2 (2014): 405–19. http://dx.doi.org/10.1007/s11276-014-0788-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!