{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T16:10:57Z","timestamp":1758125457233,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030503987"},{"type":"electronic","value":"9783030503994"}],"license":[{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-50399-4_45","type":"book-chapter","created":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T11:02:37Z","timestamp":1591700557000},"page":"468-480","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Vestiges of Past Generation: Threats to 5G Core Network"],"prefix":"10.1007","author":[{"given":"Seongmin","family":"Park","sequence":"first","affiliation":[]},{"given":"Bomin","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Youngkwon","family":"Park","sequence":"additional","affiliation":[]},{"given":"Dowon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Eunseon","family":"Jeong","sequence":"additional","affiliation":[]},{"given":"Kangbin","family":"Yim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,10]]},"reference":[{"key":"45_CR1","unstructured":"ENISA (European Union Agency For Cybersecurity), Signaling Security in Telecom SS7\/Diameter\/5G, March 2018"},{"key":"45_CR2","unstructured":"3GPP. \nhttps:\/\/www.3gpp.org\/release-15"},{"key":"45_CR3","unstructured":"3GPP. Universal Mobile Telecommunications System (UMTS); LTE; 5G; Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3 (Release 15). TS 24.301 V15.8.0, December 2019"},{"key":"45_CR4","unstructured":"3GPP. \nhttps:\/\/www.3gpp.org\/release-16"},{"key":"45_CR5","unstructured":"3GPP. General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access (Release 15). TS 23.401 V15.10.0, December 2019"},{"key":"45_CR6","unstructured":"3GPP. Evolved Universal Terrestrial Radio Access Network (E-UTRAN); X2 application protocol (X2AP) (Release 15). TS 36.423 V15.7.0, October 2019"},{"key":"45_CR7","unstructured":"3GPP. System Architecture for the 5G System; Stage 2 (Release 15). TS 23.501 V15.8.0, December 2019"},{"key":"45_CR8","unstructured":"3GPP. 5G; 5G System; Technical Realization of Service Based Architecture; Stage 3 (Release 15). TS 29.500 V15.5.0, September 2019"},{"key":"45_CR9","unstructured":"3GPP. Evolved General Packet Radio Service (GPRS) Tunnelling Protocol for Control plane (GTPv2-C); Stage 3 (Release 15). TS 29.274 V15.9.0, September 2019"},{"key":"45_CR10","unstructured":"3GPP. General Packet Radio System (GPRS) Tunnelling Protocol User Plane (GTPv1-U) (Release 15). TS 29.281 V15.7.0, December 2019"},{"key":"45_CR11","unstructured":"3GPP. Universal Mobile Telecommunications System (UMTS); LTE; Evolved Packet System (EPS); Mobility Management Entity (MME) and Serving GPRS Support Node (SGSN) related interfaces based on Diameter protocol (Release 15). TS 29.272 V15.10.0, December 2019"},{"key":"45_CR12","unstructured":"Egners, A., Rey, E., Schmidt, H., Schneider, P., Wessel, S.: Threat and risk analysis for mobile communication networks and mobile terminals, March 2012"},{"issue":"1","key":"45_CR13","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1504\/IJWGS.2017.082060","volume":"13","author":"S Park","year":"2017","unstructured":"Park, S., Kim, S., Son, K., Kim, H., Park, J., Yim, K.: Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment. Int. J. Web Grid Serv. (IJWGS) 13(1), 3\u201324 (2017)","journal-title":"Int. J. Web Grid Serv. (IJWGS)"},{"key":"45_CR14","doi-asserted-by":"crossref","unstructured":"Ghannam, R., Sharevski, F., Chung, A.: User-targeted denial-of-service attacks in LTE mobile networks. In: 2018 IEEE 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), October 2018","DOI":"10.1109\/WiMOB.2018.8589140"},{"key":"45_CR15","unstructured":"Positive Technologies. Threats to Packet Core Security of 4G Network, September 2017"},{"key":"45_CR16","unstructured":"HUAWEI. HUAWEI Secospace USG9000 Unified Security Gateway V200R001C01 Feature Description, December 2012"},{"key":"45_CR17","unstructured":"Borgaonkar, R., Udar, S.: Understanding IMSI privacy. In: BlackHat (2014)"},{"key":"45_CR18","doi-asserted-by":"crossref","unstructured":"Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., Weippl, E.: IMSI-catch me if you can: IMSI-catcher-catchers. In: ACM Annual Computer Security Applications Conference (ACSAC) (2014)","DOI":"10.1145\/2664243.2664272"},{"key":"45_CR19","doi-asserted-by":"crossref","unstructured":"Hussain, S.R., Echeverria, M., Chowdhury, O., Li, N., Bertino, E.: Privacy attacks to the 4G and 5G cellular paging protocols using side channel information. In: 26th Annual Network and Distributed System Security Symposium (NDSS) (2019)","DOI":"10.14722\/ndss.2019.23442"},{"key":"45_CR20","unstructured":"Kune, D.F., Koelndorfer, J., Kim, Y.: Location leaks on the GSM air interface. In: 19th Annual Network and Distributed System Security Symposium (NDSS) (2012)"},{"key":"45_CR21","doi-asserted-by":"crossref","unstructured":"Shaik, A., Seifert, J., Borgaonkar, R., Asokan, N., Niemi, V.: Practical attacks against privacy and availability in 4G\/LTE mobile communication systems. In: 23rd Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, pp. 21\u201324, February 2016","DOI":"10.14722\/ndss.2016.23236"},{"key":"45_CR22","doi-asserted-by":"crossref","unstructured":"Gomez-Miguelez, I., Garcia-Saavedra, A., Sutton, P.D., Serrano, P., Cano, C., Leith, D.J.: srsLTE: an open-source platform for LTE evolution and experimentation. In: Wireless Network Testbeds Experimental Evaluation, and Characterization (WiNTECH). ACM (2016)","DOI":"10.1145\/2980159.2980163"},{"key":"45_CR23","unstructured":"Kim, B., Bae, S., Kim, Y.: Guti reallocation demystified: Cellular location tracking with changing temporary identifier. In: 25th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, pp. 18\u201321, February 2018"},{"key":"45_CR24","unstructured":"Golde, N., Redon, K., Seifert, J.-P.: Let me answer that for you: Exploiting broadcast information in cellular networks. In: 22nd USENIX Conference on Security, pp. 33\u201348 (2013)"},{"key":"45_CR25","doi-asserted-by":"crossref","unstructured":"Arapinis, M., Mancini, L.I., Ritter, E., Ryan, M.: Privacy through pseudonymity in mobile telephony systems. In: 21st Annual Network and Distributed System Security Symposium (NDSS) (2014)","DOI":"10.14722\/ndss.2014.23082"},{"key":"45_CR26","doi-asserted-by":"crossref","unstructured":"Arapinis, M., Mancini, L., Ritter, E., Ryan, M., Golde, N., Redon, K., Borgaonkar, R.: New privacy issues in mobile telephony: fix and verification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS), pp. 205\u2013216. ACM (2012)","DOI":"10.1145\/2382196.2382221"},{"key":"45_CR27","doi-asserted-by":"crossref","unstructured":"Hussain, S.R., Chowdhury, O., Mehnaz, S., Bertino, E.: LTEinspector: a systematic approach for adversarial testing of 4G LTE. In: 25th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, pp. 18\u201321, February 2018","DOI":"10.14722\/ndss.2018.23313"},{"key":"45_CR28","unstructured":"5G PPP Security WG, 5G PPP Phase 1 Security Landscape"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50399-4_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T11:28:58Z","timestamp":1591702138000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-50399-4_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,10]]},"ISBN":["9783030503987","9783030503994"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50399-4_45","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,6,10]]},"assertion":[{"value":"10 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lodz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/imis\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}