Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers.
Chuan YuShuhui ChenFei WangZiling WeiPublished in: Comput. Networks (2021)
Keyphrases
- security threats
- security mechanisms
- security problems
- security protocols
- computer security
- security measures
- information security
- java card
- security breaches
- countermeasures
- cyber attacks
- security vulnerabilities
- malicious users
- denial of service attacks
- security risks
- network security
- security issues
- chosen plaintext
- dos attacks
- security flaws
- malicious attacks
- fault injection
- user interface
- intrusion detection
- security requirements
- stream cipher
- cryptographic protocols
- access control
- security policies
- intrusion detection and prevention
- biometric template
- key management
- quality of service
- user friendliness
- cryptographic algorithms
- smart card
- malicious nodes
- defense mechanisms
- intrusion detection system
- computer networks
- single layer
- watermarking scheme
- unauthorized access
- key agreement protocol
- identity theft
- video streaming
- cyber security