Pour voir les autres types de publications sur ce sujet consultez le lien suivant : LTE Security.

Articles de revues sur le sujet « LTE Security »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « LTE Security ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

IANCU, Laura. « An Overview of LTE Security ». International Journal of Information Security and Cybercrime 1, no 2 (21 décembre 2012) : 48–57. http://dx.doi.org/10.19107/ijisc.2012.02.06.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

He, Limei, Zheng Yan et Mohammed Atiquzzaman. « LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement : A Survey ». IEEE Access 6 (2018) : 4220–42. http://dx.doi.org/10.1109/access.2018.2792534.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Kim, Daegeon, Do Hyung Gu et Huy Kang Kim. « Beyond PS-LTE : Security Model Design Framework for PPDR Operational Environment ». Security and Communication Networks 2020 (7 décembre 2020) : 1–13. http://dx.doi.org/10.1155/2020/8869418.

Texte intégral
Résumé :
National disasters can threaten national security and require several organizations to integrate the functionalities to correspond to the event. Many countries are constructing a nationwide mobile communication network infrastructure to share information and promptly communicate with corresponding organizations. Public Safety Long-Term Evolution (PS-LTE) is a communication mechanism adopted in many countries to achieve such a purpose. Organizations can increase the efficiency of public protection and disaster relief (PPDR) operations by securely connecting the services run on their legacy networks to the PS-LTE infrastructure. This environment allows the organizations to continue facilitating the information and system functionalities provided by the legacy network. The vulnerabilities in the environment, which differ from commercial LTE, need to be resolved to connect the network securely. In this study, we propose a security model design framework to derive the system architecture and the security requirements targeting the restricted environment applied by certain technologies for a particular purpose. After analyzing the PPDR operation environment’s characteristics under the PS-LTE infrastructure, we applied the framework to derive the security model for organizations using PPDR services operated in their legacy networks through this infrastructure. Although the proposed security model design framework is applied to the specific circumstance in this research, it can be generally adopted for the application environment.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Huang, Lian Fen, et Hang Liu. « Research and Implementation of IPSEC Based on TD-LTE System ». Applied Mechanics and Materials 427-429 (septembre 2013) : 2783–86. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2783.

Texte intégral
Résumé :
With the rapid development of Internet technology, network and information security has become increasingly important. After studying the principle of IPSEC(IP Security) and VPN (Virtual Private Network) technology, this paper designs a network architecture which is called S1 in the TD-LTE communication system. The specific packet is securely encrypted by using IPSEC technology between the base station and security gateway. After a lot of tests, the technical solution to achieve IPSEC is proved to be realized and to have a highly efficient and stable characteristic.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Wang, Jin, Zhongqi Zhang, Yongjun Ren, Bin Li et Jeong-Uk Kim. « Issues toward Networks Architecture Security for LTE and LTE-A Networks ». International Journal of Security and Its Applications 8, no 4 (31 juillet 2014) : 17–24. http://dx.doi.org/10.14257/ijsia.2014.8.4.02.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Cao, Jin, Maode Ma, Hui Li, Yueyu Zhang et Zhenxing Luo. « A Survey on Security Aspects for LTE and LTE-A Networks ». IEEE Communications Surveys & ; Tutorials 16, no 1 (2014) : 283–302. http://dx.doi.org/10.1109/surv.2013.041513.00174.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Panda, Prabhat Kumar, et Sudipta Chattopadhyay. « An improved authentication and security scheme for LTE/LTE-A networks ». Journal of Ambient Intelligence and Humanized Computing 11, no 5 (23 février 2019) : 2163–85. http://dx.doi.org/10.1007/s12652-019-01248-8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Fu, Yulong, Hanlu Chen, Qinghua Zheng, Zheng Yan, Raimo Kantola, Xuyang Jing, Jin Cao et Hui Li. « An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks ». Journal of Network and Computer Applications 155 (avril 2020) : 102549. http://dx.doi.org/10.1016/j.jnca.2020.102549.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Fan, Xin Xin, Teng Wu et Guang Gong. « An Efficient Stream Cipher WG-16 and its Application for Securing 4G-LTE Networks ». Applied Mechanics and Materials 490-491 (janvier 2014) : 1436–50. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1436.

Texte intégral
Résumé :
The fourth generation of mobile telecommunications system (marketed as 4G-LTE) is being commercially and widely deployed. Security mechanisms are crucial to protect communications of mobile users from potential malicious attacks as well as to ensure revenue for 4G-LTE network operators. The randomness properties of the keystream generated by the current cipher suites in 4G-LTE standard are difficult to analyze and some vulnerabilities with regard to the integrity algorithms have been recently discovered. To address those issues, we present a detailed specification and security analysis of a bit-oriented stream cipher WG-16 as well as the corresponding confidentiality and integrity algorithms in this paper. Our experimental results on smartphones and comparisons with the cipher suites in 4G-LTE standard demonstrate that WG-16 is a competitive candidate for securing the emerging 4G-LTE networks.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Ernsberger, Dominik, K. Jijo George et Sivabalan Arumugam. « Security Study and Monitoring of LTE Networks ». Journal of ICT Standardization 7, no 1 (2019) : 43–60. http://dx.doi.org/10.13052/jicts2245-800x.713.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
11

Li, Xiao Wen, et Fang Liu. « The Design and Realization of Packet Data Security in LTE-A ». Applied Mechanics and Materials 380-384 (août 2013) : 2165–68. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2165.

Texte intégral
Résumé :
In the wireless access technology system, reliable and more efficient security algorithm is important to guarantee high-speed data transmission of LTE. In the development process of LTE-A Radio Frequency Conformance Test System, we designed a detailed security process in PDCP ( Packet Data Convergence Protocol ) and realized it through encryption algorithm and Integrity algorithm. This paper adopts SDL and TTCN to test the security process of PDCP.And we applied it to LTE-A system successfully.
Styles APA, Harvard, Vancouver, ISO, etc.
12

SEREȚEANU, Adriana. « Security in Most Recent Generation of Mobile Telecommunication Networks – LTE ». International Journal of Information Security and Cybercrime 2, no 1 (28 juin 2013) : 17–24. http://dx.doi.org/10.19107/ijisc.2013.01.02.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
13

Jang, Uijin, Hyungmin Lim et Hyungjoo Kim. « Privacy-Enhancing Security Protocol in LTE Initial Attack ». Symmetry 6, no 4 (12 décembre 2014) : 1011–25. http://dx.doi.org/10.3390/sym6041011.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
14

Bikos, Anastasios N., et Nicolas Sklavos. « LTE/SAE Security Issues on 4G Wireless Networks ». IEEE Security & ; Privacy 11, no 2 (mars 2013) : 55–62. http://dx.doi.org/10.1109/msp.2012.136.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
15

Abdrabou, Mohammed, Dr Essam Abd El-Wanis et Assoc Prof Dr Ashraf Diaa Eldien Elbayoumy. « Security Enhancement for LTE Authentication Protocol (EPS-AKA) ». International Conference on Aerospace Sciences and Aviation Technology 16, AEROSPACE SCIENCES (1 mai 2015) : 1–10. http://dx.doi.org/10.21608/asat.2015.23028.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
16

Li, Mei Mei, et Jing Li. « Research on Security in EMM Sublayer in TD-LTE ». Applied Mechanics and Materials 401-403 (septembre 2013) : 1986–89. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.1986.

Texte intégral
Résumé :
Security in EMM sublayer is an important part of LTE security system. This paper is developed into three part: researches on Security Mode Command and Authentication process, introduction to key hierarchy and analysis on Integrity Protection and implementation of encryption / decryption.
Styles APA, Harvard, Vancouver, ISO, etc.
17

Li, Xiao Wen, et Fang Liu. « Study and Realization of SNOW 3G in LTE System ». Advanced Materials Research 756-759 (septembre 2013) : 841–45. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.841.

Texte intégral
Résumé :
In the wireless access technology system, reliable and efficient security algorithm is an important guarantee which realizes the high-speed data transmission of LTE (Long Time evolution). The SNOW 3G was used in LTE for its own advantages for security algorithms. This paper describes the procedure of security. Focus on the principle of confidentiality and integrity algorithms of SNOW 3G , then analyses the performance and gets the test result of this algorithms at last.
Styles APA, Harvard, Vancouver, ISO, etc.
18

M. Zaki, Rana, et Hala Bahjat Abdul wahab. « 4G Network Security Algorithms : Overview ». International Journal of Interactive Mobile Technologies (iJIM) 15, no 16 (23 août 2021) : 127. http://dx.doi.org/10.3991/ijim.v15i16.24175.

Texte intégral
Résumé :
<p class="0abstractCxSpFirst">Long Term Evolution (LTE) of (Universal Mobile Telecommunication System) is one of the modern steps in series of mobile telecommunications systems. That appears to be a strong technology that meets the requirements of fourth-generation (4G) mobile networks and supports authentication and encryption mechanisms between User Equipment (UE) and Message Management Entity (MME). This paper provides an overview of the three most important algorithms that are considered the heart of LTE cryptographic algorithms (SNOW3G, AES, and ZUC) and a comparison between cipher key length and initial vector length to generate keystream depending on the structure used for each algorithm as each algorithm has a time of complexity and space of complexity that differs from the other security algorithm.</p><p class="0abstractCxSpLast"><strong> </strong></p>
Styles APA, Harvard, Vancouver, ISO, etc.
19

Lawange, Saurabh, et Manish Narnaware. « Review on LTE Cryptography Algorithm ZUC and its Attacks ». International Journal of Emerging Research in Management and Technology 6, no 7 (29 juin 2018) : 100. http://dx.doi.org/10.23956/ijermt.v6i7.192.

Texte intégral
Résumé :
Security is the important when it comes to wireless communication, and as the expectations of people increased, the data service now arrived at LTE. The faster data access and communication with high priority security. ZUC is the algorithm adopted to provide security under third set of LTE i.e. EEA3 and EIA3. The algorithms are used for confidentiality and integrity protection over the air. To analyze the security level of the algorithm different attacks were published in literature. The aim of this paper is to discuss the working of ZUC algorithm in detail. Also different attacks are listed in the last section.
Styles APA, Harvard, Vancouver, ISO, etc.
20

Edward, E. Prince. « A Context Transfer Model for Secure Handover in WiMAX/LTE Integrated Networks ». International Journal of Mobile Computing and Multimedia Communications 6, no 3 (juillet 2014) : 56–74. http://dx.doi.org/10.4018/ijmcmc.2014070103.

Texte intégral
Résumé :
One of the recent research issues in IP Multimedia Subsystem (IMS) based heterogeneous internetworking environment is to provide secure handover when a mobile node (MN) moves between different access networks. Various security schemes are available in literature but most of the schemes provide security but degrades the Quality of Service (QoS). The objective of this work is to provide secure and efficient handover in an IMS based Worldwide Interoperability for Microwave access (WiMAX)/ Long Term Evolution (LTE) integrated networks by using the proposed Secure Context Transfer Model (SCTM). New Session Initiation Protocol (SIP) messages are introduced in the proposed SCTM for transferring the context securely from old Proxy-Call session control function (P-CSCF) server to new P-CSCF server during handover. SCTM is verified using NS-2 simulator and analyzed based on Queuing theory. The results show that when compared with previous approaches, SCTM shows an improvement of 23% in terms of handover delay and packet loss providing security and guaranteed QoS to mobile users.
Styles APA, Harvard, Vancouver, ISO, etc.
21

Choi, Dae-Sung, et Hyoung-Kee Choi. « An Group-based Security Protocol for Machine Type Communications in LTE-Advanced ». Journal of the Korea Institute of Information Security and Cryptology 23, no 5 (31 octobre 2013) : 885–96. http://dx.doi.org/10.13089/jkiisc.2013.23.5.885.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
22

Tantawy, Mohsen M., Adly S. Tag ELdien et Esraa Mosleh Eid. « Performance and Rekeying Analysis of Multicast Security in LTE ». International journal of Computer Networks & ; Communications 5, no 4 (juin 2013) : 103–16. http://dx.doi.org/10.5121/ijcnc.2013.5409.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
23

Sun, Gengxin, Sheng Bin et Yixin Zhou. « A High Security Architecture for LTE Core Network Server ». International Journal of Future Generation Communication and Networking 9, no 11 (30 novembre 2016) : 337–44. http://dx.doi.org/10.14257/ijfgcn.2016.9.11.31.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
24

Xu, Cheng, Xiaohong Huang, Maode Ma et Hong Bao. « An Anonymous Handover Authentication Scheme Based on LTE-A for Vehicular Networks ». Wireless Communications and Mobile Computing 2018 (3 juillet 2018) : 1–15. http://dx.doi.org/10.1155/2018/6251219.

Texte intégral
Résumé :
Vehicular networks play an important role in the intelligent transportation systems which have gained technical supports from car industry. Due to the mobility and the broadcast nature of wireless communication, security of the vehicular networks is a critical issue for the academia and industry. Many solutions have been proposed to target the security provisioning. However, most of them have various shortcomings. Based on the elliptic curve public key cryptography algorithm, in this paper, we propose a new anonymous roaming authentication protocol for the Long Term Evolution-Advanced (LTE-A) supported vehicular networks. For a vehicular LTE-A network, an authentication protocol should be able to fulfill a variety of security requirements, which can be met by our proposal and proved by using Burrows–Abadi–Needham (BAN) logic. Compared with some existing solutions, our scheme has lower communication costs with stronger security functionality. The analyses on the security functions and the performance of the proposed solution show that our scheme is secure and efficient with ability against various types of malicious attacks.
Styles APA, Harvard, Vancouver, ISO, etc.
25

Parne, Balu L., Shubham Gupta et Narendra S. Chaudhari. « PSE-AKA : Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks ». Peer-to-Peer Networking and Applications 12, no 5 (13 juillet 2019) : 1156–77. http://dx.doi.org/10.1007/s12083-019-00785-5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
26

Hahn, Changhee, Hyunsoo Kwon et Junbeom Hur. « Security Enhanced Authentication Protocol in LTE With Preserving User Location Privacy ». Journal of KIISE 41, no 9 (15 septembre 2014) : 715–27. http://dx.doi.org/10.5626/jok.2014.41.9.715.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
27

Saini, Akanksha, Enrique D. Festijo et Younchan Jung. « Packet key-based security system for the next generation LTE networks ». Procedia Computer Science 110 (2017) : 297–303. http://dx.doi.org/10.1016/j.procs.2017.06.098.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
28

Bou Abdo, Jacques. « Security V/S Qos for LTE Authentication and Key Agreement Protocol ». International Journal of Network Security & ; Its Applications 4, no 5 (30 septembre 2012) : 71–82. http://dx.doi.org/10.5121/ijnsa.2012.4506.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
29

Bellafkih, Mostafa, Amine Baina et Ouafae Kasmi. « Security evaluation management over LTE critical infrastructures networks : IMS case study ». International Journal of Critical Infrastructures 15, no 4 (2019) : 285. http://dx.doi.org/10.1504/ijcis.2019.10023734.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
30

Kasmi, Ouafae, Amine Baina et Mostafa Bellafkih. « Security evaluation management over LTE critical infrastructures networks : IMS case study ». International Journal of Critical Infrastructures 15, no 4 (2019) : 285. http://dx.doi.org/10.1504/ijcis.2019.103013.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
31

Han, Chan-Kyu, et Hyoung-Kee Choi. « Security Analysis of Handover Key Management in 4G LTE/SAE Networks ». IEEE Transactions on Mobile Computing 13, no 2 (février 2014) : 457–68. http://dx.doi.org/10.1109/tmc.2012.242.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
32

Parne, Balu L., Shubham Gupta et Narendra S. Chaudhari. « SEGB : Security Enhanced Group Based AKA Protocol for M2M Communication in an IoT Enabled LTE/LTE-A Network ». IEEE Access 6 (2018) : 3668–84. http://dx.doi.org/10.1109/access.2017.2788919.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
33

Dai, Jian Mei, Hua Fang Geng et Zuo Xue Liu. « The Application Research on the TD-LTE Technology in Military ». Applied Mechanics and Materials 631-632 (septembre 2014) : 843–46. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.843.

Texte intégral
Résumé :
TD-LTE technology can be introduced to improve the performance of military wireless communication system greatly for its better capability of broadband transmission while existing military wireless communication network cannot meet with the increase and further requirements of military task types. The technical characteristics and advantages of TD-LTE are analyzed, the problem of security, anti-jamming and mobility which are to be solved if TD-LTE technology applied in military are mainly studied, and the technical solutions are given.
Styles APA, Harvard, Vancouver, ISO, etc.
34

Woo Jwa, Jeong, et Joong Hie Won. « Network Quality Measurements of LTE Drones ». International Journal of Engineering & ; Technology 7, no 3.33 (29 août 2018) : 54. http://dx.doi.org/10.14419/ijet.v7i3.33.18523.

Texte intégral
Résumé :
Cellular-connected drones can provide beyond line-of sight control (BVLOS), low latency, real time communication, robust security, and wide range coverage. Cellular-connected drones have several key potential applications in enhanced LTE and 5G networks. The objective of the study is to evaluate field measurement data collected during drone flights in the KT Long-Term Evolution (LTE) networks in Seoul and Jeju, Korea. The multicopter drones are developed with LTE modem and LTE test smart phone for field measurements. The radio network quality between drones and LTE base transceiver stations (BTS) is evaluated by measuring downlink metrics such as the serving cell RSRP, RSRQ, SINR, modulation types of downlink, the downlink and uplink throughputs, and LTE PUSCH Tx Power on reference signal. In the existing LTE networks, field measurements show that there is no problem in C&C of BVLOS operations in the flight height up to 150m but the data rate requirements for video transmission does not meet at high flight altitudes.
Styles APA, Harvard, Vancouver, ISO, etc.
35

Bhat, Showkat Ahmad, et Amandeep Singh. « A Novel Image Encryption Algorithm Using Multiple Encryption Techniques for Mobile Devices ». International Journal of Sensors, Wireless Communications and Control 10, no 2 (15 septembre 2020) : 123–42. http://dx.doi.org/10.2174/2210327909666190408094102.

Texte intégral
Résumé :
Background & Objective: Digital multimedia exchange between different mobile communication devices has increased rapidly with the invention of the high-speed data services like LTE-A, LTE, and WiMAX. However, there are always certain security risks associated with the use of wireless communication technologies. Methods: To protect the digital images against cryptographic attacks different image encryption algorithms are being employed in the wireless communication networks. These algorithms use comparatively less key spaces and accordingly offer inadequate security. The proposed algorithm described in this paper based on Rubik’s cube principle because of its high confusion and diffusion properties, Arnold function having effective scrambling power, blocking cipher with block encryption and permutation powers. The main strength of the proposed algorithm lies in the large key spaces and the combination of different high power encryption techniques at each stage of algorithm. The different operations employed on the image are with four security keys of different key spaces at multiple stages of the algorithm. Results & Conclusion: Finally, the effectiveness and the security analysis results shows that the proposed image encryption algorithm attains high encryption and security capabilities along with high resistance against cryptanalytic attacks, differential attacks and statistical attacks.
Styles APA, Harvard, Vancouver, ISO, etc.
36

VOICU, Mirel. « LTE Data Security : UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN ». International Journal of Information Security and Cybercrime 1, no 1 (21 juin 2012) : 19–25. http://dx.doi.org/10.19107/ijisc.2012.01.02.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
37

., Nidhi. « AN OVERVIEW OF THE ATTACKS ON LTE IN 4G : EXPLOITING THE SECURITY ». International Journal of Advanced Research in Computer Science 8, no 9 (30 septembre 2017) : 679–81. http://dx.doi.org/10.26483/ijarcs.v8i9.5150.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
38

Choi, Daesung, Hyoung-Kee Choi et Se-Young Lee. « A group-based security protocol for machine-type communications in LTE-advanced ». Wireless Networks 21, no 2 (23 août 2014) : 405–19. http://dx.doi.org/10.1007/s11276-014-0788-9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
39

V. Suma et Wang Haoxiang. « Optimal Key Handover Management for Enhancing Security in Mobile Network ». December 2020 2, no 4 (5 janvier 2021) : 181–87. http://dx.doi.org/10.36548/jtcsst.2020.4.002.

Texte intégral
Résumé :
The 3GPP long term Evolution or System Architecture Evolution (LTE/SAE) was designed for the dispositioning of the mobile networks towards 4G. The significant hurdle of 4G is about cementing the privacy and security gap. Due to the disclosures in the connectivity of public networks, a single malicious device could jeopardize the operation of a whole network of devices. The key deliverance handling within the 3GPP LTE/SAE is developed to unauthorize the keys that are being attacked and, in result, to alienate the miscreant keys off the chain of network. The proposed article recognizes the attacks that jeopardize the safe connectivity among the stops in the network chain and details the vulnerability of the key deliverance administration to desynchronization attacks. Even though the periodic upgrade of the root could prove to be a fundamental part of the system, the work proposed brings an emphasis on reducing the impact of desynchronization attacks which currently are unable to be prevented efficiently. The main focus of the design is to shed light on the ways the network operators work to confirm the optimal intervals for the periodic updates to reduce the signal weightage while providing secure user mobility. The analysis and model simulations intend to disclose the influence of the period of root key upgrade on integral operational levels such as constellation and user experience.
Styles APA, Harvard, Vancouver, ISO, etc.
40

AHMAD, Fawad, Marnel PERADILLA, Akanksha SAINI et Younchan JUNG. « Improving Security Level of LTE Access Procedure by Using Short-Life Shared Key ». IEICE Transactions on Communications E100.B, no 5 (2017) : 738–48. http://dx.doi.org/10.1587/transcom.2016ebp3267.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
41

Çabuk, Umut Can, Georgios Kanakis et Feriştah Dalkılıç. « LTE Direct as a Device-to-Device Network Technology : Use Cases and Security ». IJARCCE 5, no 7 (30 juillet 2016) : 401–6. http://dx.doi.org/10.17148/ijarcce.2016.5779.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
42

Carlà, Lorenzo, Romano Fantacci, Francesco Gei, Dania Marabissi et Luigia Micciullo. « LTE enhancements for public safety and security communications to support group multimedia communications ». IEEE Network 30, no 1 (janvier 2016) : 80–85. http://dx.doi.org/10.1109/mnet.2016.7389835.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
43

Degefa, Fikadu B., Donghoon Lee, Jiye Kim, Younsung Choi et Dongho Won. « Performance and security enhanced authentication and key agreement protocol for SAE/LTE network ». Computer Networks 94 (janvier 2016) : 145–63. http://dx.doi.org/10.1016/j.comnet.2015.11.014.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
44

Lee, Sanguk, Incheol Jeong et Woo-Geun Ahn. « Study on Search and Rescue System for Military and Civil use by using COSPAS SARSAT and Terrestrial Communication Network ». E3S Web of Conferences 94 (2019) : 01018. http://dx.doi.org/10.1051/e3sconf/20199401018.

Texte intégral
Résumé :
We propose search and rescue system for the both military and civil uses with minimizing burden to COSPAS SARSAT by using terrestrial communication network like LTE as an example in the paper. The terrestrial network may not be limited to LTE but extended to 5G, SigFox, LoRa, etc, later on. For security, special encryption mechanism is applied to the both COSPAS SARSAT and Terrestrial links. Also, operation concept for critical and normal situation. Implementation result and enhancing positioning accuracy by using rescue signal itself from ground signal processing is presented too.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Zhu, Bo Tao, Xiao Xiao Liu, Jun Steed Huang Huang et Zu Jue Chen. « Implicit Encryption of Timing Packet with Statistical Side Channel Coding ». Applied Mechanics and Materials 513-517 (février 2014) : 1221–26. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1221.

Texte intégral
Résumé :
This paper proposes a statistical coding methodology using covert side channel information to solve timing packet security issue, the main purpose here is to enhance the security of the timing protocol with backward compatible capability. In wireless communications, either ad-hoc military/ industrial network, or LTE/ LTE-A networks, GPS is used to provide time and location; however, the hackers often trying to spoof the signal. The alternative way of providing such signal is using protocols like IEEE1588 Precision Time Protocol (PTP); unfortunately, current timing packet is not encrypted, it can be altered by the hackers. To maintain the simplicity of such protocols, most vendors are reluctant to add encryption on top of it; nevertheless, the end customer wishes to see it. To solve this dilemma, we propose a backward compatible solution here. The basic idea is demonstrated using Matlab FFT calculation tool. The future extension using Fractional FFT is also suggested at.
Styles APA, Harvard, Vancouver, ISO, etc.
46

Jung, Younchan, Marnel Peradilla et Ronnel Agulto. « Packet Key-Based End-to-End Security Management on a Blockchain Control Plane ». Sensors 19, no 10 (19 mai 2019) : 2310. http://dx.doi.org/10.3390/s19102310.

Texte intégral
Résumé :
The existing LTE mobile system uses the vertical model to handle the session-based security management. However, the goal of this paper is to propose a packet key-based security management scheme on the blockchain control plane to enhance the existing session key-based security scheme and overcome the limitation that the existing vertical model, as well as the Software-Defined Networking (SDN) based horizontal model, confronts within solving end-to-end security management. The proposed blockchain-based security management (BSM) scheme enables each peer to easily obtain the necessary parameters required to manage the packet key-based security system. The important features of the BSM scheme include the renewal process, which enables the different packet data streams to use completely different security parameters for the security management. In addition, because even blind values cannot be exposed to the possible attackers, our BSM scheme guarantees very secure end-to-end data transfer against active attacks such as falsification of data and transactions. Finally, this paper compares the BSM scheme with the existing vertical model to prove the advantageous effects on latency.
Styles APA, Harvard, Vancouver, ISO, etc.
47

Saini, Akanksha, Enrique Festijo et Younchan Jung. « Proposing packet-key based end-to-end security architecture for the post-LTE networks ». ICT Express 5, no 2 (juin 2019) : 124–30. http://dx.doi.org/10.1016/j.icte.2018.08.002.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
48

Arul, Rajakumar, Gunasekaran Raja, Alaa Omran Almagrabi, Mohammed Saeed Alkatheiri, Sajjad Hussain Chauhdary et Ali Kashif Bashir. « A Quantum-Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario ». IEEE Transactions on Industrial Informatics 16, no 1 (janvier 2020) : 681–90. http://dx.doi.org/10.1109/tii.2019.2949354.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
49

Rovira, Pablo, Walter Ayala, José Terra, Fernando García-Préchac, Paul Harris, Michael R. F. Lee et M. Jordana Rivero. « The ‘Palo a Pique’ Long-Term Research Platform : First 25 Years of a Crop–Livestock Experiment in Uruguay ». Agronomy 10, no 3 (23 mars 2020) : 441. http://dx.doi.org/10.3390/agronomy10030441.

Texte intégral
Résumé :
Mixed crop–livestock long-term experiments (LTE) are critical to increase the understanding of sustainability in complex agroecosystems. One example is the ‘Palo a Pique’ LTE which has been running for 25 years in Uruguay (from 1995 to present), evaluating four pasture–crop rotations under livestock grazing with no-till technology in soils with severe limitations. The results demonstrate that cropping systems reduced soil organic carbon (SOC) compared with permanent pastures, and that perennial pastures rotating with crops were critical to mitigate SOC losses. Data from the ‘Palo a Pique’ LTE has contributed to the establishment of new national policies to secure the sustainability of agricultural-based systems. Although the original purpose of the LTE was oriented to crops and soils, a demand for sustainable livestock intensification has gathered momentum over recent years. As a result, the current approach of the ‘Palo a Pique’ LTE matches each pasture–crop rotation with the most suitable livestock strategy with the common goal of producing 400 kg liveweight/ha per year. General approaches to the pursuit of sustainable livestock intensification include shortening the cycle of production, diversifying animal categories, increasing liveweight gain and final animal liveweight, and strategic livestock supplementation. Prediction of trade-offs between environmental, economic, and production indicators can be addressed through monitoring and modeling, enabling the timely anticipation of adverse sustainability issues on commercial farms. The ‘Palo a Pique’ LTE serves as a framework to address contemporary and future questions dealing with the role of ruminants on climate change, competition for land, nutrient dynamics, and food security.
Styles APA, Harvard, Vancouver, ISO, etc.
50

Naveed, Muhammad, Sameer Qazi, Syed Muhammad Atif, Bilal A. Khawaja et Muhammad Mustaqim. « SCRAS Server-Based Crosslayer Rate-Adaptive Video Streaming over 4G-LTE for UAV-Based Surveillance Applications ». Electronics 8, no 8 (18 août 2019) : 910. http://dx.doi.org/10.3390/electronics8080910.

Texte intégral
Résumé :
This research focuses on intelligent unmanned aerial vehicle (UAV)-based, real-time video surveillance to ensure better monitoring and security of remote locations over 4G-LTE cellular networks by maximizing end-user quality of experience (QoE). We propose a novel server-based crosslayer rate-adaptive scheme (SCRAS) for real-time video surveillance over 4G-LTE networks using UAVs. Our key contributions are: (1) In SCRAS, mobile UAVs having preprogrammed flight co-ordinates act as servers, streaming real-time video towards a remote client; (2) server-side video rate adaptation occurs in 4G-LTE based on the physical characteristics of the received signal conditions due to variations in the wireless channel and handovers; (3) SCRAS is fully automated and independent of client assistance for rate adaptation, as it is intended for real-time, mission-critical surveillance applications; (4) SCRAS ensures that during rate adaptation, the current video frame should not be damaged by completing the current group of packet (GoP) before adaptation. Our simulations in NS3 provide credible evidence that SCRAS outperforms recently proposed schemes in providing better QoE for real-time, rate-adaptive, video surveillance over 4G-LTE under varying channel quality and frequent handovers that occur during flight by UAVs.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie