{"id":"https://openalex.org/W7135042420","doi":"https://doi.org/10.1109/ojcoms.2026.3673071","title":"RANVDS: Client-Side Detection of Insecure RAN Configurations in Operational 2G\u20135G Networks","display_name":"RANVDS: Client-Side Detection of Insecure RAN Configurations in Operational 2G\u20135G Networks","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7135042420","doi":"https://doi.org/10.1109/ojcoms.2026.3673071"},"language":"en","primary_location":{"id":"doi:10.1109/ojcoms.2026.3673071","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2026.3673071","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/ojcoms.2026.3673071","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5128803403","display_name":"Lucas L. Da Rocha","orcid":null},"institutions":[{"id":"https://openalex.org/I41870","display_name":"Military Institute of Engineering","ror":"https://ror.org/03veakt65","country_code":"BR","type":"education","lineage":["https://openalex.org/I41870"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Lucas L. da Rocha","raw_affiliation_strings":["Department of Defense Engineering, Military Institute of Engineering, Rio de Janeiro, Brazil"],"affiliations":[{"raw_affiliation_string":"Department of Defense Engineering, Military Institute of Engineering, Rio de Janeiro, Brazil","institution_ids":["https://openalex.org/I41870"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128908803","display_name":"Vitor G. A. Carneiro","orcid":null},"institutions":[{"id":"https://openalex.org/I41870","display_name":"Military Institute of Engineering","ror":"https://ror.org/03veakt65","country_code":"BR","type":"education","lineage":["https://openalex.org/I41870"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Vitor G. A. Carneiro","raw_affiliation_strings":["Department of Defense Engineering, Military Institute of Engineering, Rio de Janeiro, Brazil"],"affiliations":[{"raw_affiliation_string":"Department of Defense Engineering, Military Institute of Engineering, Rio de Janeiro, Brazil","institution_ids":["https://openalex.org/I41870"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043917013","display_name":"Ernesto Pinto","orcid":"https://orcid.org/0000-0003-3051-0741"},"institutions":[{"id":"https://openalex.org/I41870","display_name":"Military Institute of Engineering","ror":"https://ror.org/03veakt65","country_code":"BR","type":"education","lineage":["https://openalex.org/I41870"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Ernesto L. Pinto","raw_affiliation_strings":["Department of Defense Engineering, Military Institute of Engineering, Rio de Janeiro, Brazil"],"affiliations":[{"raw_affiliation_string":"Department of Defense Engineering, Military Institute of Engineering, Rio de Janeiro, Brazil","institution_ids":["https://openalex.org/I41870"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5128803403"],"corresponding_institution_ids":["https://openalex.org/I41870"],"apc_list":{"value":1750,"currency":"USD","value_usd":1750},"apc_paid":{"value":1750,"currency":"USD","value_usd":1750},"fwci":22.012,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.99356578,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"7","issue":null,"first_page":"2504","last_page":"2527"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.4659000039100647,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.4659000039100647,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.05350000038743019,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.04500000178813934,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4693000018596649},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.42669999599456787},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.35589998960494995},{"id":"https://openalex.org/keywords/radio-access-network","display_name":"Radio access network","score":0.35339999198913574},{"id":"https://openalex.org/keywords/subscriber-identity-module","display_name":"Subscriber identity module","score":0.35269999504089355},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.3472000062465668},{"id":"https://openalex.org/keywords/delegation","display_name":"Delegation","score":0.34220001101493835},{"id":"https://openalex.org/keywords/beacon","display_name":"Beacon","score":0.3208000063896179},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.3163999915122986}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7200000286102295},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5340999960899353},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4693000018596649},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.42669999599456787},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41850000619888306},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.35589998960494995},{"id":"https://openalex.org/C106365562","wikidata":"https://www.wikidata.org/wiki/Q3078360","display_name":"Radio access network","level":4,"score":0.35339999198913574},{"id":"https://openalex.org/C40367706","wikidata":"https://www.wikidata.org/wiki/Q230110","display_name":"Subscriber identity module","level":3,"score":0.35269999504089355},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.3472000062465668},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.34220001101493835},{"id":"https://openalex.org/C102168758","wikidata":"https://www.wikidata.org/wiki/Q7321258","display_name":"Beacon","level":2,"score":0.3208000063896179},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.3163999915122986},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.31459999084472656},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.31380000710487366},{"id":"https://openalex.org/C50954386","wikidata":"https://www.wikidata.org/wiki/Q656083","display_name":"Paging","level":2,"score":0.3125999867916107},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.30329999327659607},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2996000051498413},{"id":"https://openalex.org/C160704184","wikidata":"https://www.wikidata.org/wiki/Q18031028","display_name":"Ran","level":2,"score":0.2994999885559082},{"id":"https://openalex.org/C131969451","wikidata":"https://www.wikidata.org/wiki/Q5021614","display_name":"Call control","level":2,"score":0.29019999504089355},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.28870001435279846},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.28119999170303345},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.2702000141143799},{"id":"https://openalex.org/C62793504","wikidata":"https://www.wikidata.org/wiki/Q228327","display_name":"Access network","level":2,"score":0.2581000030040741},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.25440001487731934},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.2522999942302704},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.250900000333786}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ojcoms.2026.3673071","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2026.3673071","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:94cb44fcd7f647af939e8b5f788f50ab","is_oa":true,"landing_page_url":"https://doaj.org/article/94cb44fcd7f647af939e8b5f788f50ab","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Open Journal of the Communications Society, Vol 7, Pp 2504-2527 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/ojcoms.2026.3673071","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2026.3673071","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1517403092","https://openalex.org/W1965570021","https://openalex.org/W1972663735","https://openalex.org/W1993966938","https://openalex.org/W1995875735","https://openalex.org/W2045673642","https://openalex.org/W2505574421","https://openalex.org/W2526496292","https://openalex.org/W2784781042","https://openalex.org/W2793421149","https://openalex.org/W2794045175","https://openalex.org/W2946045894","https://openalex.org/W2963061006","https://openalex.org/W3008993478","https://openalex.org/W3038328903","https://openalex.org/W4213453551","https://openalex.org/W4229066873","https://openalex.org/W4229503353","https://openalex.org/W4382396131","https://openalex.org/W4382396276","https://openalex.org/W4385080324","https://openalex.org/W4388295091","https://openalex.org/W4389256502","https://openalex.org/W4392392834","https://openalex.org/W4403796106","https://openalex.org/W4407300691","https://openalex.org/W4408750128","https://openalex.org/W4411721726","https://openalex.org/W4413267765","https://openalex.org/W7135042420"],"related_works":[],"abstract_inverted_index":{"We":[0],"present":[1],"the":[2,44,105,128],"Radio":[3],"Access":[4],"Network":[5],"Vulnerability":[6],"Detection":[7],"System":[8],"(RANVDS),":[9],"a":[10,65,79],"client-side":[11],"system":[12],"developed":[13],"to":[14,36,142],"audit":[15],"configurable":[16],"radio":[17],"access":[18],"security":[19,67],"features":[20],"in":[21,60,78,113,118,133],"operational":[22],"2G\u20135G":[23,95],"deployments":[24],"without":[25],"operator":[26],"cooperation.":[27],"RANVDS":[28,135],"parses":[29],"control-plane":[30],"data":[31],"obtained":[32],"from":[33,89],"commercial":[34],"devices":[35],"infer":[37],"negotiated":[38],"encryption":[39],"and":[40,46,55,86,98,109,127,146],"integrity":[41],"algorithms,":[42],"quantify":[43],"randomness":[45],"reuse":[47],"behavior":[48,120],"of":[49,107,130,150],"temporary":[50],"identifiers":[51],"via":[52],"statistical":[53],"indicators,":[54],"detect":[56],"permanent":[57,131],"identity":[58,132],"exposure":[59],"paging":[61],"procedures,":[62],"thereby":[63],"providing":[64],"comparable":[66],"evaluation":[68],"for":[69],"all":[70],"currently":[71],"deployed":[72],"RAN":[73,152],"standards.":[74],"Correctness":[75],"is":[76,136],"validated":[77],"controlled":[80],"multi-generational":[81],"testbed":[82],"with":[83],"known":[84],"configurations":[85],"field":[87],"measurements":[88],"three":[90],"Brazilian":[91],"mobile":[92,151],"operators":[93],"across":[94],"(including":[96],"NSA":[97],"SA)":[99],"are":[100],"reported.":[101],"The":[102],"results":[103],"highlight":[104],"persistence":[106],"weak":[108],"null":[110],"cipher":[111],"suites":[112],"legacy":[114],"generations,":[115],"measurable":[116],"differences":[117],"temporary-identifier":[119],"that":[121],"can":[122],"impact":[123],"practical":[124],"user":[125],"traceability,":[126],"use":[129],"paging.":[134],"released":[137],"as":[138],"an":[139],"open-source":[140],"project":[141],"enable":[143],"reproducible":[144],"studies":[145],"continuous":[147],"compliance":[148],"monitoring":[149],"security.":[153]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-03-13T00:00:00"}
