Dissecting Operational Cellular IoT Service Security: Attacks and Defenses.
Sihan WangTian XieMin-Yue ChenGuan-Hua TuChi-Yu LiXinyu LeiPo-Yi ChouFu-Cheng HsiehYiwen HuLi XiaoChunyi PengPublished in: IEEE/ACM Trans. Netw. (2024)
Keyphrases
- security problems
- denial of service attacks
- network security
- denial of service
- dos attacks
- security threats
- security mechanisms
- security protocols
- security services
- security breaches
- security issues
- management system
- security requirements
- cyber attacks
- key management
- computer networks
- computer security
- countermeasures
- information security
- service providers
- java card
- security flaws
- access control
- web services
- security vulnerabilities
- security measures
- chosen plaintext
- ddos attacks
- cloud computing
- data security
- intrusion detection system
- stream cipher
- buffer overflow
- network services
- fault injection
- cyber security
- security policies
- security risks
- malicious attacks
- cryptographic protocols
- smart card
- rfid systems
- watermarking scheme
- intrusion detection
- network layer
- malicious users
- biometric template
- attack scenarios
- spam filters
- security management
- service management
- lightweight
- secure routing
- wireless sensor networks