{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T05:19:33Z","timestamp":1740201573006,"version":"3.37.3"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,6]]},"DOI":"10.1109\/comsnets63942.2025.10885619","type":"proceedings-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:05:58Z","timestamp":1740081958000},"page":"1240-1245","source":"Crossref","is-referenced-by-count":0,"title":["Standardization aspects of Authentication Relay Attack using False Base Station"],"prefix":"10.1109","author":[{"given":"K","family":"Sowjanya","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Delhi,Bharti School TTM,New Delhi,India"}]},{"given":"Soumen","family":"Jana","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Bhilai,Computer Science and Engineering,Bhilai,India"}]},{"given":"Vipin","family":"Kumar","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Bhilai,Computer Science and Engineering,Bhilai,India"}]},{"given":"Dhiman","family":"Saha","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Bhilai,Computer Science and Engineering,Bhilai,India"}]},{"given":"Brejesh","family":"Lall","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Delhi,Department of Electrical Engineering,New Delhi,India"}]}],"member":"263","reference":[{"article-title":"3GPP Release 15: An end to the battle against false base stations?","year":"2018","author":"Nakarmi","key":"ref1"},{"year":"2023","key":"ref2","article-title":"Study on 5G Security Enhancement against False Base Stations (FBS)"},{"key":"ref3","article-title":"Securing 5G Broadcast Messages","volume-title":"Master\u2019s Thesis in Computer Science and Engineering","author":"Natu","year":"2021"},{"journal-title":"XSTP-5GsecRM 5G security standardization roadmap","year":"2022","key":"ref4"},{"year":"2009","key":"ref5","article-title":"Lawful Interception (LI); Security framework in Lawful Interception and Retained Data environment"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3112659"},{"key":"ref7","article-title":"Location privacy via private proximity testing","volume":"11","author":"Narayanan","year":"2011","journal-title":"NDSS"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2017.7993948"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2016.7878794"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511194"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647604"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3423165"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197514"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3103673"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2024.3406729"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3052208"},{"journal-title":"Elliptic Curves for Security","key":"ref17"},{"journal-title":"Security architecture and procedures for 5G system","year":"2023","key":"ref18"}],"event":{"name":"2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)","start":{"date-parts":[[2025,1,6]]},"location":"Bengaluru, India","end":{"date-parts":[[2025,1,10]]}},"container-title":["2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10885406\/10885547\/10885619.pdf?arnumber=10885619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:28:08Z","timestamp":1740122888000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10885619\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/comsnets63942.2025.10885619","relation":{},"subject":[],"published":{"date-parts":[[2025,1,6]]}}}