4.7 Article

A Survey on Security Aspects for LTE and LTE-A Networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Attacks and Countermeasures on 802.16: Analysis and Assessment

Constantinos Kolias et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Computer Science, Hardware & Architecture

A simple and robust handover authentication between HeNB and eNB in LTE networks

Jin Cao et al.

COMPUTER NETWORKS (2012)

Article Engineering, Electrical & Electronic

An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks

Jin Cao et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2012)

Article Computer Science, Information Systems

DoS attacks exploiting signaling in UMTS and IMS

Georgios Kambourakis et al.

COMPUTER COMMUNICATIONS (2011)

Article Engineering, Electrical & Electronic

Home M2M Networks: Architectures, Standards, and QoS Improvement

Yan Zhang et al.

IEEE COMMUNICATIONS MAGAZINE (2011)

Article Engineering, Electrical & Electronic

Toward Intelligent Machine-to-Machine Communications in Smart Grid

Zubair Md. Fadlullah et al.

IEEE COMMUNICATIONS MAGAZINE (2011)

Article Computer Science, Hardware & Architecture

Fast and Secure Reauthentications for 3GPP Subscribers during WiMAX-WLAN Handovers

Ali Al Shidhani et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2011)

Article Telecommunications

Machine-to-Machine Communications and Security Solution in Cellular Systems

Mahdy Saedy et al.

INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING (2011)

Article Computer Science, Information Systems

LTE key management analysis with session keys context

Dan Forsberg

COMPUTER COMMUNICATIONS (2010)

Article Computer Science, Hardware & Architecture

LTE-ADVANCED: NEXT-GENERATION WIRELESS BROADBAND TECHNOLOGY

Amitava Ghosh et al.

IEEE WIRELESS COMMUNICATIONS (2010)

Article Engineering, Electrical & Electronic

Femtocell Access Control Strategy in UMTS and LTE

Assen Golaup et al.

IEEE COMMUNICATIONS MAGAZINE (2009)

Article Engineering, Electrical & Electronic

Network Access Security in Next-Generation 3GPP Systems: A Tutorial

C. B. Sankaran

IEEE COMMUNICATIONS MAGAZINE (2009)

Article Engineering, Electrical & Electronic

LTE: The Evolution of Mobile Broadband

David Astely et al.

IEEE COMMUNICATIONS MAGAZINE (2009)

Article Engineering, Electrical & Electronic

TRUST IN M2M COMMUNICATION

Inhyok Cha et al.

IEEE VEHICULAR TECHNOLOGY MAGAZINE (2009)

Proceedings Paper Computer Science, Artificial Intelligence

Security Transition Roadmap to 4G and Future Generations Wireless Networks

Muhammad Al-Humaigani et al.

SSST: 2009 41ST SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY (2009)

Article Engineering, Electrical & Electronic

An efficient mobile authentication scheme for wireless networks

Caimu Tang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2008)

Article Engineering, Electrical & Electronic

One-pass GPKS and IMS authentication procedure for UMTS

YB Lin et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2005)

Article Engineering, Electrical & Electronic

Security analysis and enhancements of 3GPP authentication and key agreement protocol

MX Zhang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2005)

Article Engineering, Electrical & Electronic

Advanced SSL/TLS-based authentication for secure WLAN-3G interworking

G Kambourakis et al.

IEE PROCEEDINGS-COMMUNICATIONS (2004)