{"id":"https://openalex.org/W7118898286","doi":"https://doi.org/10.1109/vtc2025-fall65116.2025.11310666","title":"Research on the Vulnerabilities of Radio Access Network under Cross-Layer Attack","display_name":"Research on the Vulnerabilities of Radio Access Network under Cross-Layer Attack","publication_year":2025,"publication_date":"2025-10-19","ids":{"openalex":"https://openalex.org/W7118898286","doi":"https://doi.org/10.1109/vtc2025-fall65116.2025.11310666"},"language":null,"primary_location":{"id":"doi:10.1109/vtc2025-fall65116.2025.11310666","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2025-fall65116.2025.11310666","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 102nd Vehicular Technology Conference (VTC2025-Fall)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046402236","display_name":"J. Bradley Chen","orcid":"https://orcid.org/0009-0004-4807-5906"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jingni Chen","raw_affiliation_strings":["National University of Defense Technology,College of Electronic Science and Technology,Changsha,China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Electronic Science and Technology,Changsha,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122150055","display_name":"Shan Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shan Wang","raw_affiliation_strings":["National University of Defense Technology,College of Electronic Science and Technology,Changsha,China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Electronic Science and Technology,Changsha,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122169129","display_name":"Chen Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chen Zhang","raw_affiliation_strings":["National University of Defense Technology,College of Electronic Science and Technology,Changsha,China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Electronic Science and Technology,Changsha,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033773955","display_name":"Quan Peng","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Quan Peng","raw_affiliation_strings":["National University of Defense Technology,College of Electronic Science and Technology,Changsha,China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Electronic Science and Technology,Changsha,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122076153","display_name":"Shi Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shi Hu","raw_affiliation_strings":["National University of Defense Technology,College of Electronic Science and Technology,Changsha,China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Electronic Science and Technology,Changsha,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101384273","display_name":"Jingyu Tang","orcid":"https://orcid.org/0009-0008-8259-8531"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingyu Tang","raw_affiliation_strings":["National University of Defense Technology,College of Electronic Science and Technology,Changsha,China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Electronic Science and Technology,Changsha,China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5046402236"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.70677821,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.23340000212192535,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.23340000212192535,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.13189999759197235,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.09260000288486481,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6593999862670898},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5508999824523926},{"id":"https://openalex.org/keywords/interrupt","display_name":"Interrupt","score":0.48590001463890076},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.42969998717308044},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.3668000102043152},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.35429999232292175},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.3488999903202057},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.3409000039100647}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7062000036239624},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6629999876022339},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6593999862670898},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5846999883651733},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5508999824523926},{"id":"https://openalex.org/C41661131","wikidata":"https://www.wikidata.org/wiki/Q220764","display_name":"Interrupt","level":3,"score":0.48590001463890076},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.42969998717308044},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.3668000102043152},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.35429999232292175},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.3488999903202057},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3409000039100647},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.32339999079704285},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.3012000024318695},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.3001999855041504},{"id":"https://openalex.org/C2984118289","wikidata":"https://www.wikidata.org/wiki/Q29954","display_name":"Power consumption","level":3,"score":0.2921000123023987},{"id":"https://openalex.org/C120524526","wikidata":"https://www.wikidata.org/wiki/Q1709148","display_name":"Reboot","level":2,"score":0.28139999508857727},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.2766000032424927},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2759000062942505},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.27140000462532043},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.26429998874664307},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.25940001010894775}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vtc2025-fall65116.2025.11310666","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2025-fall65116.2025.11310666","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 102nd Vehicular Technology Conference (VTC2025-Fall)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.9158806800842285}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2281055050","https://openalex.org/W2303624833","https://openalex.org/W2337120071","https://openalex.org/W2562730816","https://openalex.org/W2586568318","https://openalex.org/W2792636363","https://openalex.org/W2929535634","https://openalex.org/W2932741641","https://openalex.org/W2952782444","https://openalex.org/W2987215725","https://openalex.org/W3008993478","https://openalex.org/W4287122280","https://openalex.org/W4382396276","https://openalex.org/W4401751492","https://openalex.org/W4402264281","https://openalex.org/W4402957804"],"related_works":[],"abstract_inverted_index":{"Current":[0],"research":[1],"on":[2,12,101],"the":[3,23,32,74,117,150,155,165],"security":[4,162],"of":[5,22,154,168],"radio":[6],"access":[7],"networks":[8],"(RAN)":[9],"mainly":[10],"focuses":[11],"constructing":[13],"and":[14,81,94],"analyzing":[15],"attack":[16,28,138],"models":[17],"that":[18,108],"target":[19,75],"individual":[20],"layers":[21],"protocol":[24,115,173],"stack.":[25],"However,":[26],"such":[27],"methods":[29],"often":[30],"overlook":[31],"inherent":[33],"vulnerabilities":[34,112],"arising":[35],"from":[36],"interactions":[37],"between":[38],"different":[39],"layers,":[40,116],"which":[41,62],"can":[42,140],"be":[43],"exploited":[44],"to":[45,66,71,84,131,144],"launch":[46],"more":[47],"effective":[48],"attacks.":[49],"We":[50],"propose":[51],"a":[52,68,85,92,127,133],"novel":[53],"control-plane":[54],"cross-layer":[55,172],"attack,":[56],"called":[57],"CLAS":[58,119],"(Cross-Layer":[59],"Attack":[60],"System),":[61],"enables":[63],"an":[64],"attacker":[65],"use":[67],"single":[69],"device":[70],"stealthily":[72],"spoof":[73],"user,":[76],"interrupt":[77],"its":[78],"existing":[79],"connection,":[80],"hijack":[82],"it":[83],"fake":[86],"base":[87,129],"station.":[88],"This":[89,158],"results":[90],"in":[91,164,171],"covert":[93],"persistent":[95],"Denial-of-Service":[96],"(DoS)":[97],"attack.":[98],"Through":[99],"experiments":[100],"commercial":[102],"off-the-shelf":[103],"(COTS)":[104],"devices,":[105],"we":[106],"demonstrate":[107],"by":[109],"collaboratively":[110],"exploiting":[111],"across":[113],"multiple":[114],"proposed":[118],"only":[120],"requires":[121],"4dB":[122],"higher":[123],"transmit":[124],"power":[125],"than":[126],"legitimate":[128],"station":[130],"achieve":[132],"100%":[134],"success":[135],"rate.":[136],"The":[137],"effect":[139],"persist":[141],"for":[142],"up":[143],"760.2":[145],"seconds,":[146],"while":[147],"simultaneously":[148],"doubling":[149],"energy":[151],"consumption":[152],"rate":[153],"victim":[156],"device.":[157],"paper":[159],"highlights":[160],"critical":[161],"gaps":[163],"current":[166],"architecture":[167],"RAN,":[169],"particularly":[170],"vulnerability":[174],"management.":[175]},"counts_by_year":[],"updated_date":"2026-01-08T20:10:11.968330","created_date":"2026-01-08T00:00:00"}
