{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:20:36Z","timestamp":1740169236692,"version":"3.37.3"},"reference-count":76,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100010665","name":"H2020 Marie SkodowskaCurie Actions","doi-asserted-by":"publisher","award":["823997"],"award-info":[{"award-number":["823997"]}],"id":[{"id":"10.13039\/100010665","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010686","name":"H2020 European Institute of Innovation and Technology","doi-asserted-by":"publisher","award":["H2020-EU.3.7.4-SPIDER-833685"],"award-info":[{"award-number":["H2020-EU.3.7.4-SPIDER-833685"]}],"id":[{"id":"10.13039\/100010686","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3045322","type":"journal-article","created":{"date-parts":[[2020,12,17]],"date-time":"2020-12-17T02:36:17Z","timestamp":1608172577000},"page":"224677-224701","source":"Crossref","is-referenced-by-count":8,"title":["On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0009-4479","authenticated-orcid":false,"given":"Anna","family":"Angelogianni","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1083-0345","authenticated-orcid":false,"given":"Ilias","family":"Politis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0966-7974","authenticated-orcid":false,"given":"Farnaz","family":"Mohammadi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6718-122X","authenticated-orcid":false,"given":"Christos","family":"Xenakis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Technical Specification Group Radio Access Network NR Radio Resource Control (RRC) Protocol Specification (Release 16)","year":"2020","key":"ref73"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422741"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700345"},{"journal-title":"Ericsson Mobility Visualizer","year":"2020","key":"ref70"},{"journal-title":"Technical Specification Group Core Network and Terminals Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS) Stage 3 (Release 16)","year":"2020","key":"ref76"},{"journal-title":"Technical Specification Group Core Network and Terminals Non-Access-Stratum (NAS) protocol for 5G System (5GS) Stage 3 (Release 16)","year":"2002","key":"ref74"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ITST.2009.5399279"},{"journal-title":"Technical Specification Group Radio Access Network Evolved Universal Terrestrial Radio Access (E-UTRA) Radio Resource Control (RRC) Protocol specification (Release 16)","year":"2020","key":"ref75"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16558-0_8"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00006"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354263"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23313"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2792534"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3324927"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.03.005"},{"journal-title":"Security Research Labs Berlin","year":"2012","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Spring48590.2020.9129373"},{"key":"ref60","first-page":"33","article-title":"Let me answer that for you: Exploiting broadcast information in cellular networks","author":"golde","year":"2013","journal-title":"Proc 22nd USENIX Secur Symp"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23082"},{"key":"ref61","first-page":"55","article-title":"Hiding in plain signal: Physical signal overshadowing attack on LTE","author":"yang","year":"2019","journal-title":"Proc 28th Secur Symp"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098248"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2601009"},{"journal-title":"Technical Specification Group Core Network and Terminals Numbering addressing and identification (Release 15)","year":"2019","key":"ref64"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-187"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664272"},{"key":"ref66","first-page":"124","article-title":"Threat modeling using attack trees","volume":"23","author":"saini","year":"2008","journal-title":"J Comput Sci Colleges"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2820728"},{"key":"ref67","first-page":"21","article-title":"Attack trees","volume":"24","author":"schneier","year":"1999","journal-title":"Dr Dobb&#x2019;s J"},{"key":"ref68","first-page":"1","article-title":"Location leaks on the GSM air interface","author":"kune","year":"2012","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"journal-title":"IMT Vision - Framework and Overall Objectives of the Future Development of IMT for 2020 and beyond","year":"2015","key":"ref69"},{"journal-title":"EU coordinated risk assessment 5G cybersecurity","year":"2019","key":"ref2"},{"journal-title":"Adapting to New Realities","year":"2020","author":"cerwall","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000662"},{"journal-title":"Cybersecurity of 5G Networks EU Toolbox of Risk Mitigating Measures","year":"2020","key":"ref22"},{"journal-title":"Directive 2018\/1972 Establishing the European Electronic Communications Code","year":"2018","key":"ref21"},{"journal-title":"Technical Specification Group Service and System Aspects Security of H(e)NB (Release 8)","year":"2009","key":"ref24"},{"journal-title":"Cyber Implementation of the Network and Information Security (NIS) Directive","year":"2017","key":"ref23"},{"journal-title":"Technical Specification Group Services and System Aspects 3G Security Security architecture (Release 9)","year":"2009","key":"ref26"},{"journal-title":"Technical Specification Group Services and System Aspects Study on the Security Aspects of the Next Generation System (Release 14)","year":"2017","key":"ref25"},{"journal-title":"Technical Specification Group Services and system Aspects Security related network functions (Release 4)","year":"2000","key":"ref50"},{"journal-title":"Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2 Document 5 Design and Evaluation Report","year":"2006","key":"ref51"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3319728"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDA.2016.7509848"},{"journal-title":"Technical Specification Group Services and System Aspects Specification of the GEA5 and GIA5 encryption algorithms for General Packet Radio Service (GPRS) GEA5 and GIA5 algorithm specification (Release 15)","year":"2018","key":"ref57"},{"journal-title":"Technical Specification Group Services and System Aspects Specification of the GIA4 integrity algorithm for General Packet Radio Service (GPRS) Design conformance test data Release 15","year":"2018","key":"ref56"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23349"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23442"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23236"},{"journal-title":"Ericsson 3GPP Release 15 An End to the Battle Against False Base Stations","year":"2020","key":"ref52"},{"journal-title":"Cybersecurity of 5G Networks","year":"2019","key":"ref10"},{"journal-title":"Fifth Generation Wireless Network and Device Security","year":"2016","key":"ref11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2008.123"},{"journal-title":"Technical Specification Group Services and System Aspects 3G Security Security Threats and Requirements (Release 4)","year":"2001","key":"ref12"},{"journal-title":"NIST Special Publication 800-30 Risk Management Guide for Information Technology Systems","year":"2002","author":"stoneburner","key":"ref13"},{"journal-title":"NIST Special Publication 800&#x2013;30 Rev 1 Guide for Conducting Risk Assessments","year":"2012","key":"ref14"},{"journal-title":"Ericsson Network Slicing","year":"2020","key":"ref15"},{"journal-title":"Technical Specification Group Services and System Aspects 3GPP System Architecture Evolution (SAE) Security Architecture (Release 8)","year":"2009","key":"ref16"},{"journal-title":"Technical Specification Group Radio Access Network Evolved Universal Terrestrial Radio Access (E-UTRA) Radio Resource Control (RRC) Protocol Specification (Release 8)","year":"2007","key":"ref17"},{"journal-title":"Security Architecture and Procedures for 5G System (Release 16)","year":"2019","key":"ref18"},{"journal-title":"Technical Specification Group Services and System Aspects 3G Security Security architecture (Release 15)","year":"2018","key":"ref19"},{"key":"ref4","first-page":"1","article-title":"LTE phone number catcher: A practical attack against mobile privacy","volume":"2019","author":"yu chuan","year":"2019","journal-title":"Secur Commun Netw"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.28"},{"journal-title":"Regulation EU 2016\/679 on the Protection of Natural Persons With Regard to the Processing of Personal Data and on the Free Movement of Such Data and Repealing Directive 95\/46\/EC (GDPR)","year":"2016","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2"},{"journal-title":"Directive 2002\/58\/ec Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector (Directive on Privacy and Electronic Communications)","year":"2002","key":"ref8"},{"journal-title":"Directive 2002\/21\/EC on a common regulatory framework for electronic communications networks and services","year":"2002","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00038"},{"journal-title":"Directive EU 2016\/1148 Concerning Measures for a High Common Level of Security of Network and Information Systems Across the Union","year":"2016","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_35"},{"journal-title":"Technical Specification Group Services and System Aspects 3G Security Specification of the MILENAGE Algorithm Set An example algorithm set for the 3GPP authentication and key generation functions f1 f1* f2 f3 f4 f5 and f5* Document 2 Algorithm Specification (Release 15)","year":"2018","key":"ref45"},{"journal-title":"Implementation and Performance Analysis of Barkan Biham and Keller&#x2019;s Attack on A5\/2","year":"2011","author":"paglieri","key":"ref48"},{"journal-title":"A5\/1 Decryption Tool SRLabs","year":"2020","key":"ref47"},{"journal-title":"Technical Specification Group Services and system Aspects Security related network functions (Release 15)","year":"2018","key":"ref42"},{"journal-title":"Technical Specification Group Service and System Aspects Access Security Review (Release 7)","year":"2012","key":"ref41"},{"journal-title":"Technical Specification Group Services and System Aspects 3GPP System Architecture Evolution (SAE) Security architecture (Release 15)","year":"2019","key":"ref44"},{"journal-title":"Non-Access-Stratum (NAS) Protocol for Evolved Packet System (EPS)","year":"2015","key":"ref43"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09296264.pdf?arnumber=9296264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T01:09:07Z","timestamp":1641949747000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9296264\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":76,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3045322","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}