{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:46:25Z","timestamp":1743155185237,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030129415"},{"type":"electronic","value":"9783030129422"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-12942-2_16","type":"book-chapter","created":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T08:26:50Z","timestamp":1549355210000},"page":"204-217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Roaming Interface Signaling Security for LTE Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1673-6464","authenticated-orcid":false,"given":"Isha","family":"Singh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2616-6212","authenticated-orcid":false,"given":"Silke","family":"Holtmanns","sequence":"additional","affiliation":[]},{"given":"Raimo","family":"Kantola","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,6]]},"reference":[{"key":"16_CR1","unstructured":"3GGP: 3GPP TS 29.215 version 9.9.0 release 9. \n                    https:\/\/www.etsi.org\/deliver\/etsi_ts\/129200_129299\/129215\/09.09.00_60\/ts_129215v090900p.pdf"},{"key":"16_CR2","unstructured":"3GGP: Evolved Packet Core. \n                    http:\/\/www.3gpp.org\/technologies\/keywords-acronyms\/100-the-evolved-packet-core"},{"key":"16_CR3","unstructured":"3GGP: Numbering, addressing and identification. \n                    http:\/\/www.qtc.jp\/3GPP\/Specs\/23003-3e0.pdf"},{"key":"16_CR4","unstructured":"3GGP: Policy and Charging Control 3GPP TS 29.212 version 12.6.0 release 12. \n                    https:\/\/www.etsi.org\/deliver\/etsi_ts\/129200_129299\/129212\/12.06.00_60\/ts_129212v120600p.pdf"},{"key":"16_CR5","doi-asserted-by":"publisher","unstructured":"Cichonski, J., Franklin, J.M., Bartock, M.: Guide to LTE security. Technical report, NIST SP 800\u2013187, National Institute of Standards and Technology, Gaithersburg, MD, December 2017. \n                    https:\/\/doi.org\/10.6028\/NIST.SP.800-187\n                    \n                  . \n                    https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-187.pdf\n                    \n                  , 00002","DOI":"10.6028\/NIST.SP.800-187"},{"issue":"10","key":"16_CR6","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/MCOM.2013.6619579","volume":"51","author":"R Ferrus","year":"2013","unstructured":"Ferrus, R., Sallent, O., Baldini, G., Goratti, L.: LTE: the technology driver for future public safety communications. IEEE Commun. Mag. 51(10), 154\u2013161 (2013). \n                    https:\/\/doi.org\/10.1109\/MCOM.2013.6619579","journal-title":"IEEE Commun. Mag."},{"key":"16_CR7","doi-asserted-by":"publisher","DOI":"10.1002\/9781118380642","volume-title":"LTE Security","author":"D Forsberg","year":"2012","unstructured":"Forsberg, D., Horn, G., Moeller, W.D., Niemi, V.: LTE Security. Wiley, Hoboken (2012). Google-Books-ID: 9wTs815ii70C, 00097"},{"key":"16_CR8","unstructured":"GSMA: Guidelines for IPX Provider networks. \n                    https:\/\/www.gsma.com\/newsroom\/wp-content\/uploads\/\/IR.34-v14.0-3.pdf"},{"key":"16_CR9","unstructured":"GSMA: International roaming explained. \n                    https:\/\/www.gsma.com\/latinamerica\/wp-content\/uploads\/2012\/08\/GSMA-Mobile-roaming-web-English.pdf"},{"key":"16_CR10","unstructured":"GSMA: IPX White Paper. \n                    https:\/\/www.gsma.com\/publicpolicy\/wp-content\/uploads\/2012\/03\/ipxwp12.pdf"},{"key":"16_CR11","unstructured":"GSMA: IR.88 - LTE and EPC Roaming Guidelines. \n                    https:\/\/www.gsma.com\/newsroom\/wp-content\/uploads\/\/IR.88v18.0.pdf"},{"key":"16_CR12","unstructured":"GSMA: NRTRDE. \n                    http:\/\/www.archclearing.com\/html\/Service\/FraudandRevenueAssurance\/NRTRDE\/NRTRDE.htm"},{"key":"16_CR13","unstructured":"Holtmanns, S.: Mobile Data Interception from the Interconnection Link. \n                    https:\/\/media.ccc.de\/v\/34c3-8879-mobile_data_interception_from_the_interconnection_link"},{"key":"16_CR14","unstructured":"Holtmanns, S.: Interconnection Security-SS7 and Diameter, December 2017. \n                    https:\/\/www.youtube.com\/watch?v=GczSCWRWyCk"},{"issue":"1","key":"16_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.13052\/jicts2245-800X.411","volume":"4","author":"Silke  Holtmanns","year":"2016","unstructured":"Holtmanns, S., Nokia Bell Labs, Karakaari 13, 01620 Espoo, Finland: interconnection security standards - we are all connected. J. ICT Stand. 4(1), 1\u201318 (2016). \n                    https:\/\/doi.org\/10.13052\/jicts2245-800X.411\n                    \n                  . \n                    http:\/\/www.riverpublishers.com\/journal_read_html_article.php?j=JICTS\/4\/1\/1\n                    \n                  , 0000","journal-title":"Journal of ICT Standardization"},{"key":"16_CR16","unstructured":"Holtmanns, S., Oliver, I.: SMS and one-time-password interception in LTE networks (2017). \n                    https:\/\/www.semanticscholar.org\/paper\/SMS-and-one-time-password-interception-in-LTE-Holtmanns-Oliver\/d53b731b979697cab9bd99639563be0a10f3530a\n                    \n                  , 00003"},{"key":"16_CR17","unstructured":"Huawei: LTE International Roaming Whitepaper. \n                    http:\/\/carrier.huawei.com\/en\/technical-topics\/core-network\/lte-roaming-whitepaper"},{"key":"16_CR18","unstructured":"IETF: Diameter Base Protocol. \n                    https:\/\/tools.ietf.org\/html\/rfc3588"},{"key":"16_CR19","unstructured":"Ivan, I., Milodin, D., Zamfiroiu, A.: Security of M-Commerce transactions. \n                    http:\/\/store.ectap.ro\/articole\/880.pdf"},{"issue":"12","key":"16_CR20","doi-asserted-by":"publisher","first-page":"e3268","DOI":"10.1002\/dac.3268","volume":"30","author":"R Kantola","year":"2017","unstructured":"Kantola, R., Kabir, H., Loiseau, P.: Cooperation and end-to-end in the internet. Int. J. Commun. Syst. 30(12), e3268 (2017). \n                    https:\/\/doi.org\/10.1002\/dac.3268\n                    \n                  . \n                    https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/dac.3268\n                    \n                  , e3268 IJCS-15-0043.R4","journal-title":"Int. J. Commun. Syst."},{"key":"16_CR21","doi-asserted-by":"publisher","unstructured":"Kumar, K.R.R.: International mobile data roaming: managed or unmanaged? In: 2010 9th Conference of Telecommunication, Media and Internet, pp. 1\u20139, June 2010. \n                    https:\/\/doi.org\/10.1109\/CTTE.2010.5557699\n                    \n                  , 00004","DOI":"10.1109\/CTTE.2010.5557699"},{"issue":"1","key":"16_CR22","doi-asserted-by":"publisher","first-page":"53","DOI":"10.13052\/jicts2245-800X.513","volume":"5","author":"S Mashukov","year":"2017","unstructured":"Mashukov, S.: Diameter security: an auditor\u2019s viewpoint. J. ICT Stand. 5(1), 53\u201368 (2017). \n                    https:\/\/doi.org\/10.13052\/jicts2245-800X.513\n                    \n                  . \n                    https:\/\/riverpublishers.com\/journalreadhtmlarticle.php?j=JICTS\/5\/1\/3\n                    \n                  , 00000","journal-title":"J. ICT Stand."},{"key":"16_CR23","unstructured":"Rupprecht, D., Dabrowski, A., Holz, T., Weippl, E., P\u00f6pper, C.: On security research towards future mobile network generations. \n                    arXiv:1710.08932\n                    \n                   [cs], October 2017, 00006"},{"key":"16_CR24","unstructured":"Sanyal, R.: Challenges in interoperability and roaming between LTE - legacy core for mobility management, routing, real time charging. In: 2011 Technical Symposium at ITU Telecom World (ITU WT), pp. 116\u2013122, October 2011"},{"key":"16_CR25","unstructured":"Holtmanns, S., Kotte, B., Rao, S.: Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk. \n                    https:\/\/www.blackhat.com\/eu-16\/speakers\/Dr-Silke-Holtmanns.html"},{"key":"16_CR26","unstructured":"Syniverse Technologies: Preparing for LTE Roaming. \n                    https:\/\/pdfs.semanticscholar.org\/presentation\/7a09\/50e6a2679ad03948b259445852797206247e.pdf"},{"key":"16_CR27","unstructured":"Tata Communications: Fighting Fraud on 4G. \n                    https:\/\/www.tatacommunications.com\/sites\/default\/files\/MOB-LTE-Fraud-WP-87299.pdf"}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-12942-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T22:38:44Z","timestamp":1558478324000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-12942-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030129415","9783030129422"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-12942-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"6 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SECITC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security for Information Technology and Communications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bucharest","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Romania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.secitc.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"70","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"35","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.0","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"5.0","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Three papers of invited keynote speakers are included.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}