{"id":"https://openalex.org/W2187201788","doi":"https://doi.org/10.1109/cns.2015.7346856","title":"How voice call technology poses security threats in 4G LTE networks","display_name":"How voice call technology poses security threats in 4G LTE networks","publication_year":2015,"publication_date":"2015-09-01","ids":{"openalex":"https://openalex.org/W2187201788","doi":"https://doi.org/10.1109/cns.2015.7346856","mag":"2187201788"},"language":"en","primary_location":{"id":"doi:10.1109/cns.2015.7346856","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2015.7346856","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006027092","display_name":"Guan-Hua Tu","orcid":"https://orcid.org/0000-0002-2542-4817"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Guan-Hua Tu","raw_affiliation_strings":["Department of Computer Science, University of California, Los Angeles, Los Angeles, CA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of California, Los Angeles, Los Angeles, CA","institution_ids":["https://openalex.org/I161318765"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101531317","display_name":"Chi-Yu Li","orcid":"https://orcid.org/0000-0002-1077-6801"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chi-Yu Li","raw_affiliation_strings":["Department of Computer Science, University of California, Los Angeles, Los Angeles, CA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of California, Los Angeles, Los Angeles, CA","institution_ids":["https://openalex.org/I161318765"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028740131","display_name":"Chunyi Peng","orcid":"https://orcid.org/0000-0002-2361-2224"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chunyi Peng","raw_affiliation_strings":["Dept. of Computer Science Engineering, The Ohio State University, Columbus, OH"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science Engineering, The Ohio State University, Columbus, OH","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020188879","display_name":"Songwu Lu","orcid":"https://orcid.org/0000-0003-3779-0918"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Songwu Lu","raw_affiliation_strings":["Department of Computer Science, University of California, Los Angeles, Los Angeles, CA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of California, Los Angeles, Los Angeles, CA","institution_ids":["https://openalex.org/I161318765"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5006027092"],"corresponding_institution_ids":["https://openalex.org/I161318765"],"apc_list":null,"apc_paid":null,"fwci":3.1845,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.9265128,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"442","last_page":"450"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7848121523857117},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7247814536094666},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6871658563613892},{"id":"https://openalex.org/keywords/downgrade","display_name":"Downgrade","score":0.6408219933509827},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5087311863899231},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.49723413586616516},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.4502505660057068},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.4309290051460266},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.0956379771232605}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7848121523857117},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7247814536094666},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6871658563613892},{"id":"https://openalex.org/C2779628075","wikidata":"https://www.wikidata.org/wiki/Q1253258","display_name":"Downgrade","level":2,"score":0.6408219933509827},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5087311863899231},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.49723413586616516},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.4502505660057068},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.4309290051460266},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0956379771232605},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cns.2015.7346856","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2015.7346856","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.702.6909","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.702.6909","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://web.cs.ucla.edu/%7Eghtu/cns15.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6700000166893005}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1482497150","https://openalex.org/W1628976715","https://openalex.org/W1972663735","https://openalex.org/W1985263156","https://openalex.org/W2010312722","https://openalex.org/W2014199851","https://openalex.org/W2016763420","https://openalex.org/W2031427758","https://openalex.org/W2040729286","https://openalex.org/W2054506899","https://openalex.org/W2061036215","https://openalex.org/W2087546474","https://openalex.org/W2097725665","https://openalex.org/W2110695400","https://openalex.org/W2144190599","https://openalex.org/W2347017209","https://openalex.org/W6636593611","https://openalex.org/W6652845030"],"related_works":["https://openalex.org/W3206633188","https://openalex.org/W2041034096","https://openalex.org/W2058759559","https://openalex.org/W2392180086","https://openalex.org/W2792049201","https://openalex.org/W3124827474","https://openalex.org/W4381281138","https://openalex.org/W2522787438","https://openalex.org/W2351303197","https://openalex.org/W2244900583"],"abstract_inverted_index":{"To":[0],"support":[1],"voice":[2],"calls":[3],"vital":[4],"to":[5,35,51,83,90,101,171],"mobile":[6,36,95,111],"users":[7,37,96,112],"and":[8,21,129,142,161],"carriers,":[9],"4G":[10,106,116],"LTE":[11,117,135],"cellular":[12],"networks":[13],"adopt":[14],"two":[15,76,124],"solutions:":[16],"VoLTE":[17,47],"(Voice":[18],"Over":[19],"LTE)":[20],"CSFB":[22,74],"(Circuit-Switched":[23],"FallBack).":[24],"In":[25],"this":[26],"paper,":[27],"we":[28],"disclose":[29],"that":[30,144],"both":[31],"schemes":[32],"are":[33,113],"harmful":[34],"from":[38,99],"a":[39,62],"security":[40,165],"perspective.":[41],"The":[42],"adoption":[43],"of":[44,57,78,115],"the":[45,53,58,68,145,173],"latest":[46],"allows":[48],"an":[49],"attacker":[50],"manipulate":[52],"radio":[54],"resource":[55],"states":[56],"victim's":[59,69],"device":[60],"in":[61,148],"silent":[63],"call":[64],"attack,":[65],"thereby":[66],"draining":[67],"battery":[70],"5-8":[71],"times":[72],"faster.":[73],"exhibits":[75],"vulnerabilities":[77],"exposing":[79],"4G\u21943G":[80],"network":[81],"switch":[82],"adversaries.":[84],"This":[85],"can":[86],"be":[87],"further":[88],"exploited":[89],"launch":[91],"ping-pong":[92],"attacks":[93,109,126],"where":[94,110],"may":[97],"suffer":[98],"up":[100],"91.5%":[102],"performance":[103],"downgrade,":[104],"or":[105],"denial-of-service":[107],"(DoS)":[108],"deprived":[114],"connectivity":[118],"without":[119],"their":[120,131,139],"consent.":[121],"We":[122,137,167],"devise":[123],"proof-of-concept":[125],"as":[127],"showcases,":[128],"demonstrate":[130],"viability":[132],"over":[133],"operational":[134],"networks.":[136],"analyze":[138],"root":[140],"causes":[141],"uncover":[143],"problems":[146],"lie":[147],"seemingly":[149],"sound":[150],"design":[151],"decisions":[152],"for":[153,164],"functional":[154],"correctness":[155],"but":[156],"such":[157],"choices":[158],"bear":[159],"unexpected":[160],"intriguing":[162],"implications":[163],"design.":[166],"finally":[168],"propose":[169],"remedies":[170],"mitigate":[172],"attack":[174],"damage.":[175]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
