Journal ArticleDOI
A Survey on Security Aspects for LTE and LTE-A Networks
TLDR
An overview of the security functionality of the LTE and LTE-A networks and the security vulnerabilities existing in the architecture and the design are explored and the potential research issues for the future research works are shown.Abstract:
High demands for broadband mobile wireless communications and the emergence of new wireless multimedia applications constitute the motivation to the development of broadband wireless access technologies in recent years. The Long Term Evolution/System Architecture Evolution (LTE/SAE) system has been specified by the Third Generation Partnership Project (3GPP) on the way towards fourth-generation (4G) mobile to ensure 3GPP keeping the dominance of the cellular communication technologies. Through the design and optimization of new radio access techniques and a further evolution of the LTE systems, the 3GPP is developing the future LTE-Advanced (LTE-A) wireless networks as the 4G standard of the 3GPP. Since the 3GPP LTE and LTE-A architecture are designed to support flat Internet Protocol (IP) connectivity and full interworking with heterogeneous wireless access networks, the new unique features bring some new challenges in the design of the security mechanisms. This paper makes a number of contributions to the security aspects of the LTE and LTE-A networks. First, we present an overview of the security functionality of the LTE and LTE-A networks. Second, the security vulnerabilities existing in the architecture and the design of the LTE and LTE-A networks are explored. Third, the existing solutions to these problems are classically reviewed. Finally, we show the potential research issues for the future research works.read more
Citations
More filters
Journal ArticleDOI
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
TL;DR: A comprehensive review of the domain of physical layer security in multiuser wireless networks, with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security and observations on potential research directions in this area.
Journal ArticleDOI
A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends
TL;DR: The security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues, and the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer are discussed.
Journal ArticleDOI
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
TL;DR: In this article, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer.
Journal ArticleDOI
Security and Privacy in Device-to-Device (D2D) Communication: A Review
TL;DR: This paper presents an extensive review of the state-of-the-art solutions for enhancing security and privacy in D2D communication and identifies lessons to be learned from existing studies and derive a set of “best practices.”
Journal ArticleDOI
Security for 5G and Beyond
TL;DR: This paper outlines the 5G network threat landscape, the security vulnerabilities in the new technological concepts that will be adopted by 5G, and provides either solutions to those threats or future directions to cope with those security challenges.
References
More filters
Journal ArticleDOI
LTE-advanced: next-generation wireless broadband technology [Invited Paper]
TL;DR: An overview of the techniques being considered for LTE Release 10 (aka LTEAdvanced) is discussed, which includes bandwidth extension via carrier aggregation to support deployment bandwidths up to 100 MHz, downlink spatial multiplexing including single-cell multi-user multiple-input multiple-output transmission and coordinated multi point transmission, and heterogeneous networks with emphasis on Type 1 and Type 2 relays.
Journal ArticleDOI
LTE: the evolution of mobile broadband
TL;DR: An overview of the LTE radio interface, recently approved by the 3GPP, together with a more in-depth description of its features such as spectrum flexibility, multi-antenna transmission, and inter-cell interference control are provided.
Journal ArticleDOI
Toward intelligent machine-to-machine communications in smart grid
TL;DR: The most reliable technology to facilitate M2M communication in the SG home area network is pointed out, and its shortcoming is noted, and a possible solution to deal with this shortcoming to improve SG communications scalability is presented.
Journal ArticleDOI
Home M2M networks: Architectures, standards, and QoS improvement
TL;DR: The architecture of home M2M networks decomposed into three subareas depending on the radio service ranges and potential applications is presented, and cross-layer joint admission and rate control design is reported for QoS-aware multimedia sharing.
Proceedings ArticleDOI
A man-in-the-middle attack on UMTS
Ulrike Meyer,Susanne Wetzel +1 more
TL;DR: A man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies, is presented, showing that an attacker can mount an impersonation attack since GSM base stations do not support integrity protection.