Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 2 SI
Page No. 6252 - 6259

Analysis of Different Security and Vulnerability in Cellular Networks

Authors : Anu Ahlawat and Suresh Kumar

References

Abdo, J.B., J. Demerjian, H. Chaouchi and G. Pujolle, 2013. EC-AKA2 a revolutionary AKA protocol. Proceedings of the International Conference on Computer Applications Technology (ICCAT), January 20-22, 2013, IEEE, Sousse, Tunisia, ISBN:978-1-4673-5284-0, pp: 1-6.

Abdo, J.B.B., H. Chaouchi and M. Aoude, 2012. Ensured confidentiality authentication and key agreement protocol for EPS. Proceedings of the 2012 Symposium on Broadband Networks and Fast Internet (RELABIRA), May 28-29, 2012, IEEE, Baabda, Lebanon, ISBN:978-1-4673-2151-8, pp: 73-77.

Aiash, M., G. Mapp, A. Lasebae and R. Phan, 2010. Providing security in 4G systems: Unveiling the challenges. Proceedings of the 6th Advanced International Conference on Telecommunications (AICT), May 9-15, 2010, IEEE, Barcelona, Spain, ISBN: 978-1-4244-6748-8, pp: 439-444.

Al-Humaigani, M., D.B. Dunn and D. Brown, 2009. Security transition roadmap to 4G and future generations wireless networks. Proceedings of the 41st Southeastern Symposium on System Theory (SSST 2009), March 15-17, 2009, IEEE, Tullahoma, Tennessee, ISBN:978-1-4244-3324-7, pp: 94-97.

Barakovic, S. and L.S. Kapov, 2013. Survey and challenges of QoE management issues in wireless networks. J. Comput. Netw. Commun., 2013: 1-28.
Direct Link  |  

Barkan, E., E. Biham and N. Keller, 2003. Instant ciphertext-only cryptanalysis of GSM encrypted communication. Proceedings of the 23rd Annual International Conference on Cryptology (Crypto 2003), August 17-21, 2003, Springer, Santa Barbara, California, pp: 600-616.

Biryukov, A., A. Shamir and D. Wagner, 2000. Real time cryptanalysis of A5/1 on a PC. Proceedings of the 2000 International Workshop on Fast Software Encryption (FSE), March 20-23, 2000, Springer, Berlin, Germany, pp: 1-18.

Bocan, V. and V. Cretu, 2006. Mitigating denial of service threats in GSM networks. Proceedings of the 1st International Conference on Availability, Reliability and Security (ARES 2006), April 20-22, 2006, IEEE, Vienna, Austria, ISBN: 0-7695-2567-9, pp: 1-6.

Chandra, P., 2005. Bulletproof Wireless Security, GSM, UMTS, 802.11 and Ad hoc Security. Newnes Publisher, Newnes, New South Wales, ISBN:9780750677462, Pages: 237.

Chen, X., K. Makki, K. Yen and N. Pissinou, 2009. Sensor network security: A survey. IEEE Commun. Surveys Tutorials, 11: 52-73.
CrossRef  |  

Deng, Y., H. Fu, X. Xie, J. Zhou and Y. Zhang et al., 2009. A novel 3GPP SAE authentication and key agreement protocol. Proceedings of the IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC 2009), November 6-8, 2009, IEEE, Beijing, China, ISBN:978-1-4244-4898-2, pp: 557-561.

Feng, Z., J. Ning, I. Broustis, K. Pelechrinis and S.V. Krishnamurthy et al., 2011. Coping with packet replay attacks in wireless networks. Proceedings of the 8th Annual IEEE Conference on Communications Society on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), June 27-30, 2011, IEEE, Salt Lake City, Utah, ISBN:978-1-4577-0094-1, pp: 368-376.

Gonzalez-Castano, F.J., J. Vales-Alonso, J.M. Pousada-Carballo, F.I. de Vicente and M.J. Fernandez-Iglesias, 2002. Real-time interception systems for the GSM protocol. IEEE Trans. Veh. Technol., 51: 904-914.
CrossRef  |  Direct Link  |  

He, D., J. Wang and Y. Zheng, 2008. User authentication scheme based on self-certified public-key for next generation wireless network. Proceedings of the 2008 International Symposium on Biometrics and Security Technologies (ISBAST 2008), April 23-24, 2008, IEEE, Islamabad, Pakistan, ISBN:978-1-4244-2427-6, pp: 1-8.

Huang, H., N. Ahmed and P. Karthik, 2011. On a new type of denial of service attack in wireless networks: The distributed jammer network. IEEE. Trans. Wirel. Commun., 10: 2316-2324.
CrossRef  |  Direct Link  |  

Husso, M., 2006. Performance analysis of a WimAX system under jamming. MSc Thesis, Helsinki University of Technology, Espoo, Finland,

Katugampala, N.N., K.T. Al-Naimi, S. Villette and A.M. Kondoz, 2005. Real-time end-to-end secure voice communications over GSM voice channel. Proceedings of the 13th European Conference on Signal Processing, September 4-8, 2005, IEEE, Antalya, Turkey, ISBN:978-160-4238-21-1, pp: 1-4.

Kien, G.M., 2009. Entity Authentication and Personal Privacy in Future Cellular Systems. River Publisher, Aalborg Denmark, ISBN:978-87-92329-32-5, Pages: 243.

Li, X. and Y. Wang, 2011. Security enhanced authentication and key agreement protocol for LTE-SAE network. Proceedings of the 7th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), September 23-25, 2011, IEEE, Wuhan, China, ISBN:978-1-4244-6250-6, pp: 1-4.

Lo, C.C. and Y.J. Chen, 1999. Secure communication mechanisms for GSM networks. IEEE. Trans. Consum. Electron., 45: 1074-1080.
CrossRef  |  Direct Link  |  

Lorenz, G., T. Moore, G. Manes, J. Hale and S. Shenoi, 2001. Securing SS7 telecommunications networks. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security Vol. 2, June 5-6, 2001, Military Academy, West Point, New York, USA., pp: 273-278.

Mun, H., K. Han and K. Kim, 2009. 3G-WLAN interworking: Security analysis and new authentication and key agreement based on EAP-AKA. Proceedings of the Wireless Telecommunications Symposium, April 22-24, 2009, Prague, Taiwan, pp: 1-8.

Niemi, V. and K. Nyberg, 2003. UMTS Security. John Wiley and Sons, Chichester, England, ISBN:0-470-85314-X, Pages: 283.

Oberg, L. and Y. Xu, 2007. Prioritizing bad links for fast and efficient flooding in wireless sensor networks. Proceeding of the International Conference on Sensor Technologies and Applications, October 14-20, 2007, Valencia, Spain, pp: 118-126.

Park, Y. and T. Park, 2007. A survey of security threats on 4G networks. Proceedings of the IEEE Workshops on Globecom, November 26-30, 2007, IEEE, Washington, DC., USA., ISBN:978-1-4244-2024-7, pp: 1-6.

Pelechrinis, K., M. Iliofotou and S.V. Krishnamurthy, 2011. Denial of service attacks in wireless networks: The case of jammers. IEEE. Commun. Surv. Tutorials, 13: 245-257.
CrossRef  |  Direct Link  |  

Putz, S. and R. Schmitz, 2000. Secure interoperation between 2G and 3G mobile radio networks. Proceedings of the 1st International Conference on 3G Mobile Communication Technologies, March 27-29, 2000, IET, London, UK., pp. 28-32.

Rankl, W. and W. Effing, 2004. Smart Card Handbook. 3rd Edn., John Wiley and Sons, Chichester, England, ISBN:9780470856680, Pages: 1120.

Rao, J.R., P. Rohatgi, H. Scherzer and S. Tinguely, 2002. Partitioning attacks: Or how to rapidly clone some GSM cards. Proceedings of the 2002 IEEE Symposium on Security and Privacy, May 12-15, 2002, IEEE, Berkeley, California, ISBN:0-7695-1543-6, pp: 31-41.

Rekha, A.B., B. Urnadevi, Y. Solanke and S.R. Kolli, 2005. End-to-end security for GSM users [speech coding method]. Proceedings of the IEEE International Conference on Personal Wireless Communications (ICPWC 2005), January 23-25, 2005, IEEE, New Delhi, India, ISBN:0-7803-8964-6, pp: 434-437.

Shi, Z., Z. Ji, Z. Gao and L. Huang, 2009. Layered security approach in LTE and simulation. Proceedings of the 3rd International Conference on Anti-counterfeiting, Security and Identification in Communication (ASID 2009), August 20-22, 2009, IEEE, Hong Kong, China, ISBN:978-1-4244-3883-9, pp: 171-173.

Shin, M., J. Ma, A. Mishra and W.A. Arbaugh, 2006. Wireless network security and interworking. Proc. IEEE, 94: 455-466.
CrossRef  |  

Siddique, S.M. and M. Amir, 2006. GSM security issues and challenges. Proceedings of the 7th IEEE International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, July 19-20, IEEE Computer Society, Washington DC, USA., pp: 413-418.

Vintila, C.E., V.V. Patriciu and I. Bica, 2011. A J-PAKE based solution for secure authentication in a 4G network. Proceeding of the 10th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications (NEHIPISIC'11), February 20-22, 2011, WSEAS, Cambridge, ISBN: 978-960-474-276-9, pp. 42-47.

Wood, A.D. and J.A. Stankovic, 2002. Denial of service in sensor networks. IEEE Comput. Mag., 35: 54-62.
Direct Link  |  

Wyner, A.D., 1975. The wire-tap channel. Bell Syst. Technical J., 54: 1355-1387.
Direct Link  |  

Zhang, M. and Y. Fang, 2005. Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE. Trans. Wirel. Commun., 4: 734-742.
CrossRef  |  Direct Link  |  

Zheng, Y., D. He, X. Tang and H. Wang, 2005. AKA and authorization scheme for 4G mobile networks based on trusted mobile platform. Proceedings of the 5th International Conference on Information, Communications and Signal Processing, December 6-9, 2005, IEEE, Bangkok, Thailand, ISBN:0-7803-9283-3, pp: 976-980.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved