{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:33:42Z","timestamp":1771025622261,"version":"3.50.1"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2899254","type":"journal-article","created":{"date-parts":[[2019,2,13]],"date-time":"2019-02-13T20:15:43Z","timestamp":1550088943000},"page":"24956-24963","source":"Crossref","is-referenced-by-count":87,"title":["Security and Protocol Exploit Analysis of the 5G Specifications"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1420-2987","authenticated-orcid":false,"given":"Roger","family":"Piqueras Jover","sequence":"first","affiliation":[]},{"given":"Vuk","family":"Marojevic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","year":"2013","journal-title":"Non-Access-Stratum (NAS) Protocol for Evolved Packet System (EPS)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.4108\/eai.18-6-2016.2264114"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN.2015.7390464"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2016.7440650"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170787"},{"key":"ref11","first-page":"18","article-title":"LTEInspector: A systematic approach for adversarial testing of 4G LTE","author":"hussain","year":"2018","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref12","first-page":"14","article-title":"IMSI catcher","author":"strobel","year":"2007","journal-title":"Chair for Communication Security"},{"key":"ref13","year":"2018","journal-title":"Security architecture and procedures for 5G System"},{"key":"ref14","year":"2017","journal-title":"Study on the Security Aspects of the Next Generation System (Release 14)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1500706CM"},{"key":"ref16","year":"2018","journal-title":"Pentagon Orders Stores on Military Bases to Remove Huawei ZTE Phones The Wall Street Journal"},{"key":"ref17","article-title":"LTE security and protocol exploits","author":"jover","year":"2016"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2017.1700040"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243846"},{"key":"ref28","article-title":"LTE and IMSI catcher myths","author":"shaik","year":"2015","journal-title":"Proc of the BlackHat Europe"},{"key":"ref4","author":"thompson","year":"2012","journal-title":"Army Examines Feasibility of Integrating 4G LTE with Tactical Network"},{"key":"ref27","article-title":"Wideband GSM sniffing","author":"nohl","year":"2010","journal-title":"Proc 27th Chaos Commun Congr"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736746"},{"key":"ref6","article-title":"Breaking LTE on layer two","author":"rupprecht","year":"2019","journal-title":"Proc IEEE Symp Secur Privacy (SP)"},{"key":"ref29","first-page":"1","article-title":"Performance analysis of a mission-critical portable LTE system in targeted RF interference","author":"marojevic","year":"2017","journal-title":"Proc IEEE Veh Technol Conf (VTC)"},{"key":"ref5","year":"2018","journal-title":"Technical Specification Group Services and System Aspects"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2016.23236","article-title":"Practical attacks against privacy and availability in 4G\/LTE mobile communication systems","author":"shaik","year":"2016","journal-title":"Proc 23rd Annu Netw Distrib Syst Secur Symp (NDSS)"},{"key":"ref7","article-title":"Security and protocol exploit analysis of the 5G specifications","volume":"abs 1809 6925","author":"jover","year":"2018","journal-title":"CoRR"},{"key":"ref2","year":"2014","journal-title":"DOCOMO 5G White Paper 5G Radio Access Requirements Concept and Technologies"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.13052\/popcas001"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6894453"},{"key":"ref20","author":"dehnel-wild","year":"2018","journal-title":"Security vulnerability in 5G-AKA draft"},{"key":"ref22","author":"khan","year":"2018","journal-title":"Defeating the downgrade attack on identity privacy in 5G"},{"key":"ref21","author":"koutsos","year":"2018","journal-title":"The 5G-AKA authentication protocol privacy"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6101"},{"key":"ref23","author":"housley","year":"1998","journal-title":"Internet X 509 Public Key Infrastructure Certificate and CRL Profile"},{"key":"ref26","author":"bisson","year":"2017","journal-title":"5GPPP phase 1 security landscape"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1155\/S1687147204403016"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08641117.pdf?arnumber=8641117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T05:48:23Z","timestamp":1643262503000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8641117\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2899254","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}