Security attacks against the availability of LTE mobility networks: Overview and research directions.
Roger Piqueras JoverPublished in: WPMC (2013)
Keyphrases
- security threats
- security problems
- security mechanisms
- security protocols
- security measures
- computer security
- java card
- security vulnerabilities
- security risks
- computer networks
- countermeasures
- cyber attacks
- security issues
- information security
- fault injection
- security breaches
- cellular networks
- network connectivity
- denial of service attacks
- ns simulator
- stream cipher
- cryptographic protocols
- chosen plaintext
- security requirements
- malicious attacks
- security flaws
- mobile networks
- access control
- intrusion detection
- key management
- social networks
- malicious users
- identity theft
- information leakage
- intrusion detection and prevention
- quality of service
- network structure
- ad hoc networks
- heterogeneous networks
- mobile agents
- smart card
- biometric template
- buffer overflow
- web services
- secure routing
- network security
- security policies