{"id":"https://openalex.org/W2889791335","doi":"https://doi.org/10.1109/access.2019.2899254","title":"Security and Protocol Exploit Analysis of the 5G Specifications","display_name":"Security and Protocol Exploit Analysis of the 5G Specifications","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2889791335","doi":"https://doi.org/10.1109/access.2019.2899254","mag":"2889791335"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2899254","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2899254","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08641117.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08641117.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042587036","display_name":"Roger Piqueras Jover","orcid":"https://orcid.org/0000-0002-1420-2987"},"institutions":[{"id":"https://openalex.org/I1299907687","display_name":"Bloomberg (United States)","ror":"https://ror.org/02rdpzb15","country_code":"US","type":"company","lineage":["https://openalex.org/I1299907687"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Roger Piqueras Jover","raw_affiliation_strings":["Bloomberg LP, New York, NY, USA"],"affiliations":[{"raw_affiliation_string":"Bloomberg LP, New York, NY, USA","institution_ids":["https://openalex.org/I1299907687"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089510906","display_name":"Vuk Marojevic","orcid":"https://orcid.org/0000-0002-1217-7052"},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vuk Marojevic","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Mississippi State University, Starkville, MS, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Mississippi State University, Starkville, MS, USA","institution_ids":["https://openalex.org/I99041443"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5042587036"],"corresponding_institution_ids":["https://openalex.org/I1299907687"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":7.869,"has_fulltext":true,"cited_by_count":107,"citation_normalized_percentile":{"value":0.97977148,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"7","issue":null,"first_page":"24956","last_page":"24963"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8365696668624878},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.83101487159729},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6873415112495422},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5082363486289978},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5070686340332031},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5037710070610046},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4617915153503418},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4579886198043823},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.43337973952293396},{"id":"https://openalex.org/keywords/security-domain","display_name":"Security domain","score":0.4244658052921295},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41482222080230713},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.21987667679786682}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8365696668624878},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.83101487159729},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6873415112495422},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5082363486289978},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5070686340332031},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5037710070610046},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4617915153503418},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4579886198043823},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.43337973952293396},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.4244658052921295},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41482222080230713},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.21987667679786682},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2899254","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2899254","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08641117.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a7166b3e40ad40bc91de700aa3055d1a","is_oa":true,"landing_page_url":"https://doaj.org/article/a7166b3e40ad40bc91de700aa3055d1a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 24956-24963 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2899254","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2899254","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08641117.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.5799999833106995,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2889791335.pdf","grobid_xml":"https://content.openalex.org/works/W2889791335.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W1965092937","https://openalex.org/W2016999686","https://openalex.org/W2103972037","https://openalex.org/W2122440889","https://openalex.org/W2238866705","https://openalex.org/W2281055050","https://openalex.org/W2303624833","https://openalex.org/W2563150995","https://openalex.org/W2582366210","https://openalex.org/W2586568318","https://openalex.org/W2792636363","https://openalex.org/W2809727329","https://openalex.org/W2889791335","https://openalex.org/W2901318097","https://openalex.org/W2932741641","https://openalex.org/W2962983518","https://openalex.org/W2963061006","https://openalex.org/W2963505936","https://openalex.org/W2963609486","https://openalex.org/W2964227640","https://openalex.org/W4248377795","https://openalex.org/W6743447353","https://openalex.org/W6749530320","https://openalex.org/W6754298063","https://openalex.org/W6760689836"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W2013342653","https://openalex.org/W2371673014","https://openalex.org/W1535022842","https://openalex.org/W151483138","https://openalex.org/W3152135288","https://openalex.org/W2125214135","https://openalex.org/W4379134739"],"abstract_inverted_index":{"The":[0,139],"third":[1],"generation":[2],"partnership":[3],"project":[4],"released":[5],"its":[6,22],"first":[7],"5G":[8,52,62,151],"security":[9,19,40,115,126,152],"specifications":[10],"in":[11,30,83],"March":[12],"2018.":[13],"This":[14],"paper":[15],"reviews":[16],"the":[17,31,134,137,150,164],"proposed":[18],"architecture":[20],"and":[21,25,27,35,55,73,79,127,167],"main":[23],"requirements":[24],"procedures":[26],"evaluates":[28],"them":[29],"context":[32],"of":[33,113,136,155],"known":[34,142],"new":[36],"protocol":[37,56,146],"exploits.":[38],"Although":[39],"has":[41],"been":[42],"improved":[43],"from":[44],"previous":[45],"generations,":[46],"our":[47],"analysis":[48],"identifies":[49],"potentially":[50],"unrealistic":[51],"system":[53,85],"assumptions":[54],"edge":[57],"cases":[58],"that":[59,149],"can":[60,80],"render":[61],"communication":[63],"systems":[64],"vulnerable":[65],"to":[66,91,99],"adversarial":[67],"attacks.":[68],"For":[69],"example,":[70],"null":[71,74],"encryption":[72],"authentication":[75],"are":[76,131],"still":[77],"supported":[78],"be":[81,121],"used":[82],"valid":[84],"configurations.":[86],"With":[87],"no":[88],"clear":[89],"proposal":[90],"tackle":[92],"pre-authentication":[93],"message-based":[94],"exploits,":[95],"mobile":[96],"devices":[97],"continue":[98],"implicitly":[100],"trust":[101],"any":[102],"serving":[103],"network,":[104],"which":[105,118],"may":[106,108,119],"or":[107,117],"not":[109,120,161],"enforce":[110],"a":[111],"number":[112],"optional":[114],"features,":[116],"legitimate.":[122],"Moreover,":[123],"several":[124],"critical":[125],"key":[128],"management":[129],"functions":[130],"considered":[132],"beyond":[133],"scope":[135],"specifications.":[138],"comparison":[140],"with":[141],"4G":[143],"long-term":[144],"evolution":[145],"exploits":[147],"reveals":[148],"specifications,":[153],"as":[154],"Release":[156],"15,":[157],"Version":[158],"1.0.0,":[159],"do":[160],"fully":[162],"address":[163],"user":[165],"privacy":[166],"network":[168],"availability":[169],"challenges.":[170]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":17},{"year":2022,"cited_by_count":22},{"year":2021,"cited_by_count":18},{"year":2020,"cited_by_count":14},{"year":2019,"cited_by_count":12},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
