{"id":"https://openalex.org/W4401509605","doi":"https://doi.org/10.1109/iccworkshops59551.2024.10615651","title":"6G Security: The Vulnerability of Roaming Technology via DoS Exploit of Signaling Control Plane","display_name":"6G Security: The Vulnerability of Roaming Technology via DoS Exploit of Signaling Control Plane","publication_year":2024,"publication_date":"2024-06-09","ids":{"openalex":"https://openalex.org/W4401509605","doi":"https://doi.org/10.1109/iccworkshops59551.2024.10615651"},"language":"en","primary_location":{"id":"doi:10.1109/iccworkshops59551.2024.10615651","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccworkshops59551.2024.10615651","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Communications Workshops (ICC Workshops)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101535908","display_name":"Chia\u2010Hao Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Chia-Hao Chang","raw_affiliation_strings":["National Taiwan University,Department of Electrical Engineering,Taipei,Taiwan"],"affiliations":[{"raw_affiliation_string":"National Taiwan University,Department of Electrical Engineering,Taipei,Taiwan","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113330523","display_name":"Rui-Lin Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Rui-Lin Chang","raw_affiliation_strings":["National Taiwan University,Department of Electrical Engineering,Taipei,Taiwan"],"affiliations":[{"raw_affiliation_string":"National Taiwan University,Department of Electrical Engineering,Taipei,Taiwan","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014364398","display_name":"Hong-Yen Chen","orcid":"https://orcid.org/0000-0001-5638-8030"},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Hong-Yen Chen","raw_affiliation_strings":["National Taiwan University,Department of Electrical Engineering,Taipei,Taiwan"],"affiliations":[{"raw_affiliation_string":"National Taiwan University,Department of Electrical Engineering,Taipei,Taiwan","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039482466","display_name":"Tsung-Nan Lin","orcid":"https://orcid.org/0000-0001-5659-1194"},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Tsung-Nan Lin","raw_affiliation_strings":["National Taiwan University,Department of Electrical Engineering,Taipei,Taiwan"],"affiliations":[{"raw_affiliation_string":"National Taiwan University,Department of Electrical Engineering,Taipei,Taiwan","institution_ids":["https://openalex.org/I16733864"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101535908"],"corresponding_institution_ids":["https://openalex.org/I16733864"],"apc_list":null,"apc_paid":null,"fwci":1.4653,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.8311336,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1413","last_page":"1418"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.8102999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.8102999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.8052999973297119,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.886135458946228},{"id":"https://openalex.org/keywords/roaming","display_name":"Roaming","score":0.8065224885940552},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6602665185928345},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5568731427192688},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5203534960746765},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.296689510345459}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.886135458946228},{"id":"https://openalex.org/C194498986","wikidata":"https://www.wikidata.org/wiki/Q680016","display_name":"Roaming","level":2,"score":0.8065224885940552},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6602665185928345},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5568731427192688},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5203534960746765},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.296689510345459}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccworkshops59551.2024.10615651","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccworkshops59551.2024.10615651","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Communications Workshops (ICC Workshops)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2471647275","https://openalex.org/W2735151978","https://openalex.org/W2968070090","https://openalex.org/W2985336933","https://openalex.org/W3161594686","https://openalex.org/W3183514509","https://openalex.org/W4211123510","https://openalex.org/W4312698066","https://openalex.org/W4322576964","https://openalex.org/W4388517146"],"related_works":["https://openalex.org/W2906845177","https://openalex.org/W4200107511","https://openalex.org/W2891427086","https://openalex.org/W3048799479","https://openalex.org/W1968625315","https://openalex.org/W3006507989","https://openalex.org/W2779961139","https://openalex.org/W2763500028","https://openalex.org/W4240288358","https://openalex.org/W4240241597"],"abstract_inverted_index":{"As":[0,99],"the":[1,45,53,75,83,88,100,113,126,148,162,167,177,186,210],"next":[2],"generation":[3],"leap":[4],"in":[5,71,87,144,183,204],"mobile":[6],"communication":[7],"technology,":[8],"6G":[9,105],"not":[10],"only":[11],"brings":[12],"forward":[13],"innovative":[14],"visions":[15],"but":[16],"also":[17,157],"poses":[18],"new":[19],"challenges":[20],"to":[21,64,81,174],"traditional":[22],"security":[23,46],"architectures.":[24],"Considering":[25],"that":[26,93,159],"standard":[27],"organizations":[28],"are":[29,106],"concluding":[30],"their":[31],"discussions":[32],"on":[33,44,112,166],"application":[34],"scenarios":[35],"and":[36,104,146,193],"key":[37,66],"technologies,":[38],"our":[39,110],"focus":[40],"has":[41,58],"subsequently":[42],"intensified":[43],"aspects":[47],"of":[48,55,68,102,115,121,164,180,191,198,215],"6G.":[49,72],"Particularly":[50],"noteworthy":[51],"is":[52,74],"role":[54],"roaming,":[56],"which":[57],"evolved":[59],"from":[60],"a":[61,65,119],"specialized":[62],"function":[63],"enabler":[67],"global":[69],"coverage":[70],"However,":[73],"current":[76],"roaming":[77,129,145,160,184,199],"technology":[78],"adequately":[79],"equipped":[80],"handle":[82],"widespread":[84],"usage":[85],"anticipated":[86],"future?":[89],"Previous":[90],"research":[91,208],"indicates":[92],"this":[94],"remains":[95],"an":[96],"unresolved":[97],"issue.":[98],"architectures":[101],"5G":[103,116],"compatible,":[107],"we":[108,136],"focused":[109],"study":[111],"scenario":[114],"roaming.":[117],"Following":[118],"series":[120],"investigations,":[122],"two":[123,138,178],"vulnerabilities":[124,153],"within":[125],"3GPP":[127],"defined":[128],"control":[130],"plane":[131],"protocols":[132],"were":[133],"identified.":[134],"Additionally,":[135],"discovered":[137],"viable":[139],"signaling":[140],"DoS":[141],"attack":[142,187],"models":[143],"demonstrated":[147],"repercussions":[149],"posed":[150],"by":[151,189],"these":[152,216],"practically.":[154],"Our":[155,207],"findings":[156],"reveal":[158],"exacerbates":[161],"impact":[163,188],"attacks":[165,182],"Public":[168],"Land":[169],"Mobile":[170],"Network":[171],"(PLMN).":[172],"Compared":[173],"non-roaming":[175],"scenarios,":[176],"types":[179],"orchestrated":[181],"magnified":[185],"factors":[190],"1.26":[192],"2.69,":[194],"respectively.":[195],"Although":[196],"threats":[197],"have":[200],"been":[201],"previously":[202],"proposed":[203],"past":[205],"studies.":[206],"provides":[209],"first":[211],"quantifiable":[212],"experimental":[213],"validation":[214],"threats.":[217]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
