{"id":"https://openalex.org/W2946045894","doi":"https://doi.org/10.1145/3317549.3319728","title":"New vulnerabilities in 4G and 5G cellular access network protocols","display_name":"New vulnerabilities in 4G and 5G cellular access network protocols","publication_year":2019,"publication_date":"2019-05-15","ids":{"openalex":"https://openalex.org/W2946045894","doi":"https://doi.org/10.1145/3317549.3319728","mag":"2946045894"},"language":"en","primary_location":{"id":"doi:10.1145/3317549.3319728","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3317549.3319728","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034768977","display_name":"Altaf Shaik","orcid":"https://orcid.org/0000-0003-2657-6975"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Altaf Shaik","raw_affiliation_strings":["Technische Universit\u00e4t Berlin"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Berlin","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031042511","display_name":"Ravishankar Borgaonkar","orcid":"https://orcid.org/0000-0003-2874-3650"},"institutions":[{"id":"https://openalex.org/I4387930215","display_name":"SINTEF Digital","ror":"https://ror.org/028m52w57","country_code":null,"type":"facility","lineage":["https://openalex.org/I173888879","https://openalex.org/I4387930215"]},{"id":"https://openalex.org/I173888879","display_name":"SINTEF","ror":"https://ror.org/01f677e56","country_code":"NO","type":"facility","lineage":["https://openalex.org/I173888879"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Ravishankar Borgaonkar","raw_affiliation_strings":["SINTEF Digital"],"affiliations":[{"raw_affiliation_string":"SINTEF Digital","institution_ids":["https://openalex.org/I173888879","https://openalex.org/I4387930215"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081481350","display_name":"Shinjo Park","orcid":"https://orcid.org/0000-0002-8569-1327"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Shinjo Park","raw_affiliation_strings":["Technische Universit\u00e4t Berlin"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Berlin","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001159554","display_name":"Jean\u2010Pierre Seifert","orcid":"https://orcid.org/0000-0002-5372-4825"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jean-Pierre Seifert","raw_affiliation_strings":["Technische Universit\u00e4t Berlin"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Berlin","institution_ids":["https://openalex.org/I4577782"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5034768977"],"corresponding_institution_ids":["https://openalex.org/I4577782"],"apc_list":null,"apc_paid":null,"fwci":19.7033,"has_fulltext":false,"cited_by_count":120,"citation_normalized_percentile":{"value":0.99265692,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"221","last_page":"231"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7632933855056763},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.7187064290046692},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6436920166015625},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4993863105773926},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4785338342189789},{"id":"https://openalex.org/keywords/gsm","display_name":"GSM","score":0.4563494324684143},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.43769603967666626},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4217206537723541},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40247857570648193},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2139873504638672},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.14684763550758362},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09111958742141724}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7632933855056763},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.7187064290046692},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6436920166015625},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4993863105773926},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4785338342189789},{"id":"https://openalex.org/C59201141","wikidata":"https://www.wikidata.org/wiki/Q46904","display_name":"GSM","level":2,"score":0.4563494324684143},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.43769603967666626},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4217206537723541},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40247857570648193},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2139873504638672},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.14684763550758362},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09111958742141724},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3317549.3319728","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3317549.3319728","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4099999964237213}],"awards":[],"funders":[{"id":"https://openalex.org/F4320335254","display_name":"Horizon 2020","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2019698782","https://openalex.org/W2104812013","https://openalex.org/W2560837778","https://openalex.org/W2574448563","https://openalex.org/W2606512193","https://openalex.org/W2760047100","https://openalex.org/W2810067257","https://openalex.org/W2932741641","https://openalex.org/W2963061006"],"related_works":["https://openalex.org/W1823457431","https://openalex.org/W2553656238","https://openalex.org/W4238732447","https://openalex.org/W2155503889","https://openalex.org/W2116284816","https://openalex.org/W3034529322","https://openalex.org/W4243960761","https://openalex.org/W2136583354","https://openalex.org/W2142972685","https://openalex.org/W1528209454"],"abstract_inverted_index":{"Cellular":[0],"devices":[1,84,172],"support":[2],"various":[3],"technical":[4,19,52],"features":[5,20,53],"and":[6,12,34,54,61,82,85,95,116,137,147,161,173,184,194],"services":[7,37,56],"for":[8,80],"2G,":[9],"3G,":[10],"4G":[11,81,136,171,193],"upcoming":[13,138,195],"5G":[14,83,139,196],"networks.":[15,174,197],"For":[16],"example,":[17],"these":[18,51],"contain":[21],"physical":[22],"layer":[23],"throughput":[24],"categories,":[25],"radio":[26],"protocol":[27],"information,":[28],"security":[29,48,90],"algorithm,":[30],"carrier":[31],"aggregation":[32],"bands":[33],"type":[35],"of":[36,128],"such":[38],"as":[39,58],"GSM-R,":[40],"Voice":[41],"over":[42],"LTE":[43],"etc.":[44],"In":[45,71],"the":[46,64,67,93,107,110,120,180],"cellular":[47,152],"standardisation":[49,182],"context,":[50],"network":[55,65,108],"termed":[57],"device":[59,68,76,94,102,132,189],"capabilities":[60,77,103,133,190],"exchanged":[62,105],"with":[63,106],"during":[66],"registration":[69],"phase.":[70],"this":[72],"paper,":[73],"we":[74,123],"study":[75],"information":[78,134],"specified":[79],"their":[86,166],"role":[87],"in":[88,135,192],"establishing":[89],"association":[91],"between":[92],"network.":[96,121],"Our":[97],"research":[98],"results":[99],"reveal":[100],"that":[101],"are":[104],"before":[109],"authentication":[111],"stage":[112],"without":[113],"any":[114],"protection":[115],"not":[117],"verified":[118],"by":[119],"Consequently,":[122],"present":[124],"three":[125],"novel":[126],"classes":[127],"attacks":[129,150,157,191],"exploiting":[130],"unprotected":[131],"networks":[140],"-":[141],"identification":[142],"attacks,":[143,146],"bidding":[144],"down":[145],"battery":[148],"drain":[149],"against":[151,168],"devices.":[153],"We":[154,175],"implement":[155],"proof-of-concept":[156],"using":[158],"low-cost":[159],"hardware":[160],"software":[162],"setup":[163],"to":[164,179,187],"evaluate":[165],"impact":[167],"commercially":[169],"available":[170],"reported":[176],"identified":[177],"vulnerabilities":[178],"relevant":[181],"bodies":[183],"provide":[185],"countermeasure":[186],"mitigate":[188]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":25},{"year":2024,"cited_by_count":17},{"year":2023,"cited_by_count":21},{"year":2022,"cited_by_count":16},{"year":2021,"cited_by_count":24},{"year":2020,"cited_by_count":12},{"year":2019,"cited_by_count":4}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
