Toward a Truly Secure Telecom Network: Analyzing and Exploiting Vulnerable Security Configurations/ Implementations in Commercial LTE/IMS Networks.
Chuan YuShuhui ChenZiling WeiFei WangPublished in: IEEE Trans. Dependable Secur. Comput. (2024)
Keyphrases
- security issues
- security measures
- enterprise network
- network structure
- complex networks
- network topologies
- cellular networks
- network size
- computer networks
- security requirements
- security threats
- key management
- security mechanisms
- security risks
- network resources
- security level
- application level
- multimedia services
- quality of service
- security architecture
- cryptographic protocols
- information security
- internet traffic
- network management
- security management
- community structure
- network security
- heterogeneous networks
- network nodes
- user authentication
- security properties
- ip multimedia subsystem
- wireless sensor networks
- social networks
- mobile networks
- sensitive data
- virtual private network
- security policies
- smart card
- next generation networks
- access network
- access control
- security analysis
- peer to peer
- key agreement protocol
- wireless networks
- authentication scheme
- security protocols
- intrusion detection
- stream cipher
- data encryption
- security services
- network traffic