{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:03:30Z","timestamp":1760709810898,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_18","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:07:57Z","timestamp":1548306477000},"page":"242-256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Security Threats Against LTE Networks: A Survey"],"prefix":"10.1007","author":[{"given":"Khyati","family":"Vachhani","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"issue":"4","key":"18_CR1","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MCOM.2009.4907406","volume":"47","author":"D. Astely","year":"2009","unstructured":"Ast\u00e9ly, D., Dahlman, E., Furusk\u00e4r, A., Jading, Y., Lindstr\u00f6m, M., Parkvall, S.: LTE: the evolution of mobile broadband. IEEE Commun. Mag. 47(4) (2009)","journal-title":"IEEE Communications Magazine"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Bassil, R., Elhajj, I.H., Chehab, A., Kayssi, A.: Effects of signaling attacks on LTE networks. In: 2013 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 499\u2013504. IEEE (2013)","DOI":"10.1109\/WAINA.2013.136"},{"issue":"2","key":"18_CR3","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MSP.2012.136","volume":"11","author":"AN Bikos","year":"2013","unstructured":"Bikos, A.N., Sklavos, N.: LTE\/SAE security issues on 4\u00a0G wireless networks. IEEE Secur. Priv. 11(2), 55\u201362 (2013)","journal-title":"IEEE Secur. Priv."},{"issue":"1","key":"18_CR4","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1109\/SURV.2013.041513.00174","volume":"16","author":"J Cao","year":"2014","unstructured":"Cao, J., Ma, M., Li, H., Zhang, Y., Luo, Z.: A survey on security aspects for lte and LTE-A networks. IEEE Commun. Surv. Tutorials 16(1), 283\u2013302 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Dubey, A., Vohra, D., Vachhani, K., Rao, A.: Demonstration of vulnerabilities in GSM security with USRP B200 and open-source penetration tools. In: 2016 22nd Asia-Pacific Conference on Communications (APCC), pp. 496\u2013501. IEEE (2016)","DOI":"10.1109\/APCC.2016.7581461"},{"key":"18_CR6","unstructured":"Golde, N., Redon, K., Borgaonkar, R.: Weaponizing femtocells: the effect of rogue devices on mobile telecommunications. In: NDSS (2012)"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Hasan, K., Shetty, S., Oyedare, T.: Cross layer attacks on GSM mobile networks using software defined radios. In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 357\u2013360. IEEE (2017)","DOI":"10.1109\/CCNC.2017.7983134"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"He, L., Yan, Z., Atiquzzaman, M.: LTE\/LTE-A network security data collection and analysis for security measurement: a survey. IEEE Access (2018)","DOI":"10.1109\/ACCESS.2018.2792534"},{"key":"18_CR9","unstructured":"Heuveldop, N., et al.: Ericsson mobility report. Ericsson AB, Technology Emerging Business, Stockholm, Sweden, Technical report EAB-17 5964 (2017)"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Holtmanns, S., Rao, S.P., Oliver, I.: User location tracking attacks for LTE networks using the interworking functionality. In: IFIP Networking Conference (IFIP Networking) and Workshops, pp. 315\u2013322. IEEE (2016)","DOI":"10.1109\/IFIPNetworking.2016.7497239"},{"key":"18_CR11","unstructured":"Jover, R.P., Giura, P.: How vulnerabilities in wireless networks can enable advanced persistent threats. Int. J. Inf. Technol. (IREIT) (1), 2 (2013)"},{"key":"18_CR12","unstructured":"Jover, R.P.: Security attacks against the availability of lte mobility networks: overview and research directions. In: 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC), pp. 1\u20139. IEEE (2013)"},{"key":"18_CR13","unstructured":"Jover, R.P.: LTE security, protocol exploits and location tracking experimentation with low-cost software radio. arXiv preprint \n                  arXiv:1607.05171\n                  \n                 (2016)"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Khosroshahy, M., Qiu, D., Ali, M.K.M.: Botnets in 4\u00a0G cellular networks: platforms to launch DDoS attacks against the air interface. In: 2013 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT), pp. 30\u201335. IEEE (2013)","DOI":"10.1109\/MoWNet.2013.6613793"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-319-65127-9_19","volume-title":"Computer Network Security","author":"SF Mj\u00f8lsnes","year":"2017","unstructured":"Mj\u00f8lsnes, S.F., Olimid, R.F.: Easy 4G\/LTE IMSI catchers for non-programmers. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds.) MMM-ACNS 2017. LNCS, vol. 10446, pp. 235\u2013246. Springer, Cham (2017). \n                  https:\/\/doi.org\/10.1007\/978-3-319-65127-9_19"},{"key":"18_CR16","unstructured":"Park, S., Shaik, A., Borgaonkar, R., Martin, A., Seifert, J.P.: Whitestingray: evaluating IMSI catchers detection applications. In: USENIX Workshop on Offensive Technologies (WOOT). USENIX Association (2017)"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Qiang, L., Zhou, W., Cui, B., Na, L.: Security analysis of TAU procedure in LTE network. In: 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp. 372\u2013376. IEEE (2014)","DOI":"10.1109\/3PGCIC.2014.124"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Shaik, A., Borgaonkar, R., Asokan, N., Niemi, V., Seifert, J.P.: Practical attacks against privacy and availability in 4G\/LTE mobile communication systems. arXiv preprint \n                  arXiv:1510.07563\n                  \n                 (2015)","DOI":"10.14722\/ndss.2016.23236"},{"key":"18_CR19","unstructured":"Spaar, D.: A practical DoS attack to the GSM network. In: DeepSec (2009)"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Vohra, D., Dubey, A., Vachhhani, K.: Investigating GSM control channels with RTL-SDR and GNU radio. In: International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 1008\u20131012. IEEE (2016)","DOI":"10.1109\/WiSPNET.2016.7566288"},{"key":"18_CR21","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1007\/978-3-319-22915-7_40","volume-title":"Security in Computing and Communications","author":"T Yadav","year":"2015","unstructured":"Yadav, T., Rao, A.M.: Technical aspects of cyber kill chain. In: Abawajy, J.H., Mukherjea, S., Thampi, S.M., Ruiz-Mart\u00ednez, A. (eds.) SSCC 2015. CCIS, vol. 536, pp. 438\u2013452. Springer, Cham (2015). \n                  https:\/\/doi.org\/10.1007\/978-3-319-22915-7_40"},{"issue":"3","key":"18_CR22","first-page":"27","volume":"11","author":"A Zugenmaier","year":"2009","unstructured":"Zugenmaier, A., Aono, H.: Security technology for SAE\/LTE. NTT DOCOMO Tech. J. 11(3), 27\u201330 (2009)","journal-title":"NTT DOCOMO Tech. J."}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:50:46Z","timestamp":1558396246000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}