Spoofed Networks: Exploitation of GNSS Security Vulnerability in 4G and 5G Mobile Networks.
Matthew LanoueJames Bret MichaelChad A. BollmannPublished in: SPECTS (2021)
Keyphrases
- mobile networks
- cellular networks
- call admission control
- mobile nodes
- mobile users
- security vulnerabilities
- wireless networks
- base station
- ad hoc networks
- mobile devices
- mobile ad hoc networks
- ip networks
- location management
- computer networks
- intrusion detection
- route optimization
- multimedia content
- heterogeneous networks
- shortest path
- evolutionary algorithm
- mobile ipv
- genetic algorithm
- buffer overflow