{"id":"https://openalex.org/W4296437989","doi":"https://doi.org/10.1109/tnet.2022.3205183","title":"Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures","display_name":"Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures","publication_year":2022,"publication_date":"2022-09-19","ids":{"openalex":"https://openalex.org/W4296437989","doi":"https://doi.org/10.1109/tnet.2022.3205183"},"language":"en","primary_location":{"id":"doi:10.1109/tnet.2022.3205183","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnet.2022.3205183","pdf_url":null,"source":{"id":"https://openalex.org/S62238642","display_name":"IEEE/ACM Transactions on Networking","issn_l":"1063-6692","issn":["1063-6692","1558-2566"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/ACM Transactions on Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050821230","display_name":"Yu-Han Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Yu-Han Lu","raw_affiliation_strings":["Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001416444","display_name":"Sandy Hsin-Yu Hsiao","orcid":null},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Sandy Hsin-Yu Hsiao","raw_affiliation_strings":["Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101531317","display_name":"Chi-Yu Li","orcid":"https://orcid.org/0000-0002-1077-6801"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chi-Yu Li","raw_affiliation_strings":["Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"],"raw_orcid":"https://orcid.org/0000-0002-1077-6801","affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089673882","display_name":"Yi\u2010Chen Hsieh","orcid":"https://orcid.org/0000-0002-1863-287X"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yi-Chen Hsieh","raw_affiliation_strings":["Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042361597","display_name":"Po-Yi Chou","orcid":null},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Po-Yi Chou","raw_affiliation_strings":["Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030646634","display_name":"Yao\u2010Yu Li","orcid":"https://orcid.org/0000-0002-4245-0689"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yao-Yu Li","raw_affiliation_strings":["Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067723727","display_name":"Tian Xie","orcid":"https://orcid.org/0000-0003-1309-6091"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tian Xie","raw_affiliation_strings":["Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA"],"raw_orcid":"https://orcid.org/0000-0003-1309-6091","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA","institution_ids":["https://openalex.org/I87216513"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006027092","display_name":"Guan-Hua Tu","orcid":"https://orcid.org/0000-0002-2542-4817"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guan-Hua Tu","raw_affiliation_strings":["Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA"],"raw_orcid":"https://orcid.org/0000-0002-2542-4817","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA","institution_ids":["https://openalex.org/I87216513"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5050821230"],"corresponding_institution_ids":["https://openalex.org/I148366613"],"apc_list":null,"apc_paid":null,"fwci":1.0161,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.74961705,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"31","issue":"2","first_page":"800","last_page":"815"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8247007131576538},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7610034346580505},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7484018802642822},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7145265340805054},{"id":"https://openalex.org/keywords/ip-multimedia-subsystem","display_name":"IP Multimedia Subsystem","score":0.7055901288986206},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6422019600868225},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5966121554374695},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.5891414284706116},{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.5486956834793091},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.4921078085899353},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4472631812095642},{"id":"https://openalex.org/keywords/session-initiation-protocol","display_name":"Session Initiation Protocol","score":0.4155704081058502},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.3448040187358856},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.1551370918750763},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14010778069496155},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.12853527069091797}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8247007131576538},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7610034346580505},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7484018802642822},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7145265340805054},{"id":"https://openalex.org/C26878273","wikidata":"https://www.wikidata.org/wiki/Q1140664","display_name":"IP Multimedia Subsystem","level":3,"score":0.7055901288986206},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6422019600868225},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5966121554374695},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.5891414284706116},{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.5486956834793091},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.4921078085899353},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4472631812095642},{"id":"https://openalex.org/C41878487","wikidata":"https://www.wikidata.org/wiki/Q191018","display_name":"Session Initiation Protocol","level":3,"score":0.4155704081058502},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3448040187358856},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.1551370918750763},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14010778069496155},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.12853527069091797},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnet.2022.3205183","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnet.2022.3205183","pdf_url":null,"source":{"id":"https://openalex.org/S62238642","display_name":"IEEE/ACM Transactions on Networking","issn_l":"1063-6692","issn":["1063-6692","1558-2566"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/ACM Transactions on Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5299999713897705,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G1738941280","display_name":null,"funder_award_id":"CNS-1815636","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5450969564","display_name":null,"funder_award_id":"CNS-1814551","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320334105","display_name":"Center for High Performance Computing","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W1482497150","https://openalex.org/W1497732153","https://openalex.org/W1555977059","https://openalex.org/W1592966710","https://openalex.org/W1622684078","https://openalex.org/W1669302834","https://openalex.org/W1716861721","https://openalex.org/W1972663735","https://openalex.org/W2008934589","https://openalex.org/W2010579408","https://openalex.org/W2014199851","https://openalex.org/W2016763420","https://openalex.org/W2070996757","https://openalex.org/W2107187535","https://openalex.org/W2111505384","https://openalex.org/W2114698832","https://openalex.org/W2115026336","https://openalex.org/W2120900307","https://openalex.org/W2129281072","https://openalex.org/W2129649418","https://openalex.org/W2149357410","https://openalex.org/W2156147568","https://openalex.org/W2159342279","https://openalex.org/W2184681400","https://openalex.org/W2244024587","https://openalex.org/W2254431573","https://openalex.org/W2399978149","https://openalex.org/W2421166805","https://openalex.org/W2508482518","https://openalex.org/W2537607123","https://openalex.org/W2540093921","https://openalex.org/W2601223729","https://openalex.org/W2602424816","https://openalex.org/W2752511791","https://openalex.org/W2766754441","https://openalex.org/W2778029521","https://openalex.org/W2886622674","https://openalex.org/W2897513307","https://openalex.org/W2902873511","https://openalex.org/W2919917402","https://openalex.org/W2932741641","https://openalex.org/W2945154566","https://openalex.org/W2963061006","https://openalex.org/W4239510810","https://openalex.org/W4242138061","https://openalex.org/W4290473017","https://openalex.org/W6628731089","https://openalex.org/W6629724652","https://openalex.org/W6713095524","https://openalex.org/W6744029567"],"related_works":["https://openalex.org/W2624141182","https://openalex.org/W2049076692","https://openalex.org/W2791075267","https://openalex.org/W2739896159","https://openalex.org/W2165481648","https://openalex.org/W73281580","https://openalex.org/W2900248145","https://openalex.org/W2355708774","https://openalex.org/W2087686708","https://openalex.org/W3140879055"],"abstract_inverted_index":{"IMS":[0],"(IP":[1],"Multimedia":[2],"Subsystem)":[3],"is":[4,14,35,104,135],"an":[5,169],"essential":[6],"4G/5G":[7],"component":[8],"to":[9,17,62,66,100,109,129,157,219],"offer":[10],"multimedia":[11],"services.":[12],"It":[13,103],"used":[15],"worldwide":[16],"support":[18],"two":[19],"call":[20,111,131,145],"services:":[21],"VoLTE":[22],"(Voice":[23,28],"over":[24,29],"LTE)":[25],"and":[26,40,93,203],"VoWiFi":[27,44],"WiFi).":[30],"In":[31],"this":[32],"study,":[33],"it":[34],"shown":[36,105],"that":[37,106],"the":[38,55,60,96,110,144,166,193],"signaling":[39,56],"voice":[41,167],"sessions":[42],"of":[43,71,124,197,217],"can":[45,83,114,148,171],"both":[46],"be":[47,84,101,115],"hijacked":[48],"by":[49,120,164,213],"a":[50,122,139,215],"malicious":[51],"adversary.":[52],"By":[53],"hijacking":[54,165],"session,":[57,168],"s(he)":[58],"gains":[59],"ability":[61],"make":[63],"ghost":[64],"calls":[65,154],"launch":[67,172],"stealthy":[68,173],"DoS":[69,112,146],"(Denial":[70],"Service)":[72],"or":[73,90],"caller-ID":[74],"spoofing":[75],"attacks":[76,82,113,147,177],"against":[77],"specific":[78],"cellular":[79,125],"users.":[80],"Such":[81],"carried":[85],"out":[86],"without":[87,160],"any":[88],"malware":[89],"network":[91,126],"information,":[92],"require":[94],"only":[95],"victim\u2019s":[97],"phone":[98,180,208],"number":[99],"known.":[102],"phones":[107],"vulnerable":[108],"detected":[116],"at":[117],"run":[118],"time":[119,159],"exploiting":[121],"vulnerability":[123],"infrastructures":[127],"referred":[128],"as":[130],"information":[132],"leakage,":[133],"which":[134],"exposed":[136],"based":[137,178],"on":[138,179],"machine":[140],"learning":[141],"method.":[142],"Especially,":[143],"prevent":[149],"victims":[150],"from":[151],"receiving":[152],"incoming":[153],"for":[155],"up":[156],"99.0%":[158],"user":[161],"awareness.":[162],"Moreover,":[163],"adversary":[170],"free":[174],"data":[175],"transfer":[176],"numbers":[181],"alone":[182],"rather":[183],"than":[184],"IP":[185],"addresses.":[186],"The":[187,210],"identified":[188],"vulnerabilities/attacks":[189],"are":[190],"validated":[191],"in":[192],"operational":[194],"4G":[195],"networks":[196],"four":[198],"top-tier":[199],"carriers":[200],"across":[201],"Asia":[202],"North":[204],"America":[205],"with":[206],"seven":[207],"brands.":[209],"study":[211],"concludes":[212],"presenting":[214],"suite":[216],"solutions":[218],"address":[220],"them.":[221]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
