Exposing the Security Weaknesses of Fifth Generation Handover Communication.
Aditya SharmaAaditya JainIla SharmaPublished in: ICCCNT (2019)
Keyphrases
- mobile communication
- communication protocols
- information processing systems
- information security
- network security
- network management
- communication systems
- statistical databases
- access control
- single point of failure
- resource constrained
- cyber security
- communication protocol
- communication networks
- security level
- security issues
- key management
- security policies
- wireless sensor
- base station
- network communication
- mobile phone