{"id":"https://openalex.org/W2886452343","doi":"https://doi.org/10.1109/icc.2018.8422191","title":"How Voice Service Threatens Cellular-Connected IoT Devices in the Operational 4G LTE Networks","display_name":"How Voice Service Threatens Cellular-Connected IoT Devices in the Operational 4G LTE Networks","publication_year":2018,"publication_date":"2018-05-01","ids":{"openalex":"https://openalex.org/W2886452343","doi":"https://doi.org/10.1109/icc.2018.8422191","mag":"2886452343"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2018.8422191","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2018.8422191","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067723727","display_name":"Tian Xie","orcid":"https://orcid.org/0000-0003-1309-6091"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tian Xie","raw_affiliation_strings":["Computer Science and Engineering, Michigan State University, East Lansing, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Michigan State University, East Lansing, USA","institution_ids":["https://openalex.org/I87216513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101531317","display_name":"Chi-Yu Li","orcid":"https://orcid.org/0000-0002-1077-6801"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chi-Yu Li","raw_affiliation_strings":["Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan (R.O.C)"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan (R.O.C)","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040639891","display_name":"Jiliang Tang","orcid":"https://orcid.org/0000-0001-7125-3898"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jiliang Tang","raw_affiliation_strings":["Computer Science and Engineering, Michigan State University, East Lansing, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Michigan State University, East Lansing, USA","institution_ids":["https://openalex.org/I87216513"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006027092","display_name":"Guan-Hua Tu","orcid":"https://orcid.org/0000-0002-2542-4817"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guan-Hua Tu","raw_affiliation_strings":["Computer Science and Engineering, Michigan State University, East Lansing, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Michigan State University, East Lansing, USA","institution_ids":["https://openalex.org/I87216513"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5067723727"],"corresponding_institution_ids":["https://openalex.org/I87216513"],"apc_list":null,"apc_paid":null,"fwci":0.515,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.67374594,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6785564422607422},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6573621034622192},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6165318489074707},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.5528950095176697},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.5462881326675415},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.41247260570526123},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34908097982406616},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09962818026542664}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6785564422607422},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6573621034622192},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6165318489074707},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.5528950095176697},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.5462881326675415},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.41247260570526123},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34908097982406616},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09962818026542664},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2018.8422191","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2018.8422191","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6000000238418579}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W72496981","https://openalex.org/W1587130936","https://openalex.org/W1989860229","https://openalex.org/W2010579408","https://openalex.org/W2144576616","https://openalex.org/W2187201788","https://openalex.org/W2586432806","https://openalex.org/W2613352518","https://openalex.org/W6737630436"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660"],"abstract_inverted_index":{"LTE":[0],"networks":[1],"are":[2,13,83],"rolling":[3],"out":[4],"cellular":[5,70,115],"Internet-of-":[6],"Things":[7],"(IoT)":[8],"services.":[9],"Cellular-connected":[10],"IoT":[11,71],"devices":[12,38],"becoming":[14],"increasingly":[15],"popular":[16],"and":[17,62,89],"the":[18,33,132],"number":[19],"is":[20],"forecasted":[21],"to":[22,28,85,98,130],"grow":[23],"almost":[24],"fourfold":[25],"from":[26,92],"2015":[27],"2021.":[29],"Since":[30],"they":[31,78],"share":[32],"same":[34],"infrastructure":[35],"with":[36],"non-IoT":[37],"such":[39],"as":[40,80,82],"smartphones,":[41],"we":[42],"may":[43,73],"expect":[44],"no":[45],"big":[46],"differences":[47],"between":[48],"them":[49],"in":[50,111],"terms":[51],"of":[52,103],"voice/data":[53],"service":[54],"accounting/charging":[55],"(e.g.,":[56],"paying":[57],"for":[58],"what":[59,77],"you":[60],"get)":[61],"security":[63,134],"risks.":[64],"However,":[65],"our":[66,107],"study":[67],"shows":[68],"that":[69],"users":[72],"pay":[74],"more":[75],"than":[76,121],"get,":[79],"well":[81],"vulnerable":[84],"voice":[86],"signaling":[87],"spams":[88],"thus":[90],"suffer":[91],"an":[93],"overcharging":[94],"attack":[95,110],"which":[96,118],"leads":[97],"financial":[99],"loss":[100],"or":[101],"denial":[102],"service.":[104],"We":[105,125],"validate":[106],"proof-of-":[108],"concept":[109],"a":[112,128],"major":[113],"U.S.":[114],"network":[116],"operator":[117],"takes":[119],"higher":[120],"35%":[122],"market":[123],"share.":[124],"finally":[126],"propose":[127],"solution":[129],"address":[131],"identified":[133],"vulnerabilities.":[135]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
