AN OVERVIEW OF THE ATTACKS ON LTE IN 4G: EXPLOITING THE SECURITY
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
. Priya Gatum, Sanveet kaur, Ramdeep kaur, swmeet kaur “Review paper on 4G wireless technology†(IJASAT, March 2014.) vol.2, issue (March 2014)
,]. Yongsuk Park, Member, IEEE, and Tajoon Park, Member “A survey of security threats on 4Gâ€.2007, IEEE conference,
. Yulong Zou Senior Member IEEE, JiAZHU, Xiabin Wang, Senior member IEEE, And, L Ajos Hanzo, IEEE “A survey on wireless security: Technical challenges, Recent Advances, and future trends†vol.104. no.9, sept 2016
. Mahdi Aiash, Glenford Mapp and Aboubaker Lasebase and Raphael Phan “Providing security in 4G Systems: Unveiling the challenges†IEEE, (AICT),2010,6th advance internal conference
. N. Seddigh, B Nandy, R Makkar, J.F. Beaumont “Security Advances and Challenges in 4G Wireless Networks, 2010 Eighth Annual International Conference on Privacy, Security and Trust.
. Sumant ku Mohapatra, Biswa Ranjan Swain and Pravanjan Das “Comprehensive survey of possible security issues on 4G networks†International Journal of Network Security and its applications (IJNSA) vol.7, No.2, March 2015
. Javed Ahmad Saheen “4G wireless networks Architecture an overview and Security Issues on 4G†International journal of future communication and Networking, Vol.10, No. 1 (2017), pp.15-24
. Igor Bilogrevic, Murtuza Jadliwala and Jean- Pierre Hubaux “Security Issues in Next Generation Mobile Networks: LTE and Femtocellsâ€2010,2nd international femtocell workshop.
. Yi-Sheng Shiu and Shih Yu Chang, Hsiano-C, “Physical layer Security in Wireless Networks: A Tutorialâ€, IEEE, wireless communication, april, 2011
. Jin Cao, Maode Ma, senior Member, IEEE Hui Li, Member, IEEE, Yueyu Zhang, and Zhenxing Luo “A Survey on Security Aspects for LTE and LTE-A Networks, IEEE communications surveys and tutorials, vol.16, No.,1, FIRST QUARTER 2014
. Roger Piqueras Jover, “Security Attacks Against the Availability of LTE Mobility Network: Overview and Research Directionds†international journal of network security, vol.5, no.2, pp.145-153, sept2007,
. Afrand Agah and Sajalk. Das “Preventing DoS attacks in Wireless Sensor Networks: A Repeated Game Theory Approach†International Journal of Network Security, Vol.5, No.2, PP.145-153, Sept.
. Ramzi Bassil, Imad H. Eihajj, Ali Chenhab, Ayman Kayssi, “Effects of Signaling Attacks on LTE Networks, 2013, 27th international conference on Advanced Information Networking and Application Workshops.