{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T11:32:52Z","timestamp":1774438372464,"version":"3.50.1"},"reference-count":198,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Franco-German BERCOM Project through the German Federal Ministry of Education and Research","award":["FKZ: 13N13741"],"award-info":[{"award-number":["FKZ: 13N13741"]}]},{"name":"DFG Research Training Group GRK","award":["1817\/1"],"award-info":[{"award-number":["1817\/1"]}]},{"name":"COMET K1 program through the Austrian Research Promoting Agency and the Public Employment Service Austria"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/comst.2018.2820728","type":"journal-article","created":{"date-parts":[[2018,4,2]],"date-time":"2018-04-02T20:37:38Z","timestamp":1522701458000},"page":"2518-2542","source":"Crossref","is-referenced-by-count":76,"title":["On Security Research Towards Future Mobile Network Generations"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5880-013X","authenticated-orcid":false,"given":"David","family":"Rupprecht","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0340-6204","authenticated-orcid":false,"given":"Adrian","family":"Dabrowski","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2783-1264","authenticated-orcid":false,"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[]},{"given":"Christina","family":"Popper","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997246"},{"key":"ref172","article-title":"Guidelines for independent remote interconnect security testing","author":"maxwell","year":"2017"},{"key":"ref171","year":"2013","journal-title":"Skylock Product Description 2013"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.23"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00006"},{"key":"ref176","article-title":"Handling of signaling storms in mobile networks: The role of the user data management system","year":"2015"},{"key":"ref175","article-title":"Weather the signaling storm","author":"yang","year":"2011"},{"key":"ref178","first-page":"139","article-title":"Pricing via processing or combatting junk mail","author":"dwork","year":"1992","journal-title":"Proc Int'l Cryptology Conf (CRYPTO)"},{"key":"ref177","author":"simpson","year":"2011","journal-title":"RFC 6013 TCP Cookie Transactions (TCPCT)"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2016.7497239"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.4108\/eai.18-6-2016.2264393"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.05.008"},{"key":"ref38","author":"scahill","year":"2015","journal-title":"The Great SIM Heist&#x2014;How Spies Stole the Keys to the Encyption Castle"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2641745"},{"key":"ref32","year":"2017","journal-title":"OpenBTS"},{"key":"ref31","author":"wojtowicz","year":"2015","journal-title":"OpenLTE&#x2014;An Open Source 3GPP LTE Implementation"},{"key":"ref30","year":"2016","journal-title":"OsmocomBB Open Source GSM Baseband Software Implementation"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2007.376605"},{"key":"ref36","year":"2017","journal-title":"Apple Push Notification Service Overview"},{"key":"ref35","year":"2017","journal-title":"Firebase Cloud Messaging"},{"key":"ref34","author":"timberg","year":"2014","journal-title":"For Sale Systems That Can Secretly Track Where Cellphone Users Go Around the Globe"},{"key":"ref181","author":"brown","year":"2015","journal-title":"WARNING This Text Message Will CRASH and Reboot YOUR iPhone"},{"key":"ref180","author":"goodin","year":"2016","journal-title":"Software Flaw Puts Mobile Phones and Networks at Risk of Complete Takeover"},{"key":"ref185","year":"2017","journal-title":"StreamOn Optionen"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382220"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2014.29"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.33"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7452266"},{"key":"ref188","first-page":"7","article-title":"LTE resistance to jamming capability","author":"philippe","year":"2013","journal-title":"Proc Commun Inf Syst Conf (MCC)"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069323"},{"key":"ref186","year":"2017","journal-title":"Bing"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660346"},{"key":"ref27","year":"2010"},{"key":"ref179","author":"back","year":"2002","journal-title":"Hashcash A Denial of Service Countermeasure"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2980159.2980163"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/0470845546.ch15"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820027"},{"key":"ref24","year":"2011"},{"key":"ref23","year":"2010"},{"key":"ref26","author":"thompson","year":"2015","journal-title":"Army Examines Feasibility of Integrating 4G LTE with Tactical Network"},{"key":"ref25","year":"2010"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170787"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.34"},{"key":"ref154","year":"1999"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-013-9154-9"},{"key":"ref156","first-page":"514","article-title":"Ciphering indicator approaches and user awareness","volume":"6","author":"androulidakis","year":"2012","journal-title":"Maejo Int J Sci Technol"},{"key":"ref155","year":"2009","journal-title":"Android Issue 5353 Ciphering Indicator"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2013.6645525"},{"key":"ref152","article-title":"Green cryptanalysis: Meet-in-the-middle key-recovery for the full KASUMI cipher","author":"jia","year":"2011"},{"key":"ref151","author":"nohl","year":"2011","journal-title":"GPRS Intercept Wardriving Your Country"},{"key":"ref146","first-page":"1","article-title":"Your secret stingray&#x2019;s no secret anymore: The vanishing government monopoly over cell phone surveillance and its impact on national security and consumer privacy","volume":"28","author":"pell","year":"2014","journal-title":"Harvard J Law Technol"},{"key":"ref147","first-page":"5","article-title":"La cryptographie militaire","volume":"9","author":"kerckhoffs","year":"1883","journal-title":"J Sci Militaires"},{"key":"ref148","article-title":"The (real-time) cryptanalysis of A5\/2","author":"goldberg","year":"1999","journal-title":"CRYPTO2010 Rump Session"},{"key":"ref149","author":"dunkelman","year":"2010","journal-title":"A Practical-Time Attack on the A5\/3 Cryptosystem Used in Third Generation GSM Telephony"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24174-6_24"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_20"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004360"},{"key":"ref56","article-title":"SS7: Locate. Track. Manipulate","author":"engel","year":"2014","journal-title":"Proc Chaos Commun Congr (31C3)"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653690"},{"key":"ref54","first-page":"33","article-title":"Let me answer that for you: Exploiting broadcast information in cellular networks","author":"golde","year":"2013","journal-title":"Proc Usenix Security Symp"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925939"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102171"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2013.136"},{"key":"ref167","article-title":"Locating mobile phones using signalling system 7","author":"engel","year":"2008","journal-title":"Proc Chaos Commun Congr (25C3)"},{"key":"ref166","year":"2017","journal-title":"Remote Provisioning Architecture for Embedded UICC Technical Specification (27 May 2016)"},{"key":"ref165","article-title":"Security vulnerability in 5G-AKA draft","author":"dehnel-wild","year":"2018"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.70"},{"key":"ref163","author":"groves","year":"2016","journal-title":"Sakai&#x2013;Kasahara Key Encryption (SAKKE)"},{"key":"ref162","author":"groves","year":"2016","journal-title":"Elliptic Curve-Based Certificateless Signatures for Identity-Based Encryption (ECCSI)"},{"key":"ref161","year":"2009"},{"key":"ref160","year":"2015"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23236"},{"key":"ref3","year":"2017","journal-title":"First Responder Network Authority"},{"key":"ref6","year":"2011"},{"key":"ref5","article-title":"Location leaks on the GSM air interface","author":"kune","year":"2012","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref8","article-title":"Practical cellphone spying","author":"paget","year":"2010","journal-title":"Proc DEFCON 19"},{"key":"ref159","year":"2009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382221"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2015.7343507"},{"key":"ref157","article-title":"SIM\/USIM internal and external interworking aspects","year":"2009"},{"key":"ref9","first-page":"235","article-title":"Easy 4G\/LTE IMSI catchers for non-programmers","author":"mj\u00f8lsnes","year":"2017","journal-title":"Proc Conf Math Methods Models Archit Comput Netw Security (MMM-ACNS)"},{"key":"ref158","year":"2011"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2013.6736871"},{"key":"ref45","year":"2008","journal-title":"Egypt Tries to Control the Use of GPS by Banning Except With Individual Licences"},{"key":"ref48","first-page":"1","article-title":"Security attacks against the availability of LTE mobility networks: Overview and research directions","author":"jover","year":"2013","journal-title":"Proc IEEE Symp Wireless Pers Multimedia Commun (WPMC)"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2556871.2556882"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.010"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2565585.2565599"},{"key":"ref44","author":"farivar","year":"2008","journal-title":"Apple Removes GPS Functionality From Egyptian iPhones"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ComComAp.2012.6154001"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2004.1368846"},{"key":"ref72","author":"kaljevic","year":"2003","journal-title":"SIMSCAN v2 01"},{"key":"ref71","author":"briceno","year":"1998","journal-title":"An Implementation of the GSM A3A8 Algorithm (Specifically COMP128 )"},{"key":"ref70","author":"briceno","year":"2002","journal-title":"GSM Cloning"},{"key":"ref76","author":"briceno","year":"1999","journal-title":"A pedagogical implementation of A5\/1"},{"key":"ref77","year":"2010","journal-title":"Kraken A5\/1 Decryption Rainbow Tables Via Bittorent"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.242"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9001-y"},{"key":"ref78","article-title":"GSM&#x2014;SRSLY?","author":"nohl","year":"2009","journal-title":"Proc Chaos Commun Congr (26C3)"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69053-0_17"},{"key":"ref60","author":"osipov","year":"2015","journal-title":"Adventures in Femtoland 350 Yuan for Invaluable Fun"},{"key":"ref62","first-page":"40","article-title":"Putting LTE security functions to the test: A framework to evaluate implementation correctness","author":"rupprecht","year":"2016","journal-title":"Proceedings of USENIX Workshop on Offensive Technologies (WOOT)"},{"key":"ref61","article-title":"How to not break LTE crypto","author":"michau","year":"2016","journal-title":"Proc ANSSI Symp sur la s&#x00E9;curit&#x00E9; des Technol de l&#x2019;information et des Commun (SSTIC)"},{"key":"ref63","article-title":"OpenBSC&#x2014;Running your own GSM network","author":"welte","year":"2009","journal-title":"Proc Hacking Random"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664272"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_13"},{"key":"ref66","article-title":"Mobile self-defense","author":"nohl","year":"2014","journal-title":"Proc Chaos Communication Congress"},{"key":"ref67","author":"malette","year":"2015","journal-title":"Catcher Catcher"},{"key":"ref68","year":"2017","journal-title":"Android IMSI-Catcher Detector (#AIMSICD)"},{"key":"ref69","year":"2014","journal-title":"Snoopsnitch"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2532458"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2705720"},{"key":"ref193","author":"dalton","year":"2016","journal-title":"Florida Man Fined 48k for Jamming Cellphones While Driving"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460912"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.100608"},{"key":"ref196","year":"2016","journal-title":"Standardization of NB-IoT completed"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23118"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978393"},{"key":"ref190","year":"2016","journal-title":"How to Build Cell Phone Jammer"},{"key":"ref93","author":"hassidim","year":"2016","journal-title":"Ephemeral Identifiers Mitigating Tracking & Spoofing Threats to BLE Beacons"},{"key":"ref191","first-page":"2016","article-title":"LTE security, protocol exploits and location tracking experimentation with low-cost software radio","author":"jover","year":"0","journal-title":"ArXiv"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23098"},{"key":"ref192","year":"2017","journal-title":"Universal Software Radio Peripheral"},{"key":"ref91","author":"court","year":"2017","journal-title":"WAP Just Happened to My Samsung Galaxy?"},{"key":"ref90","first-page":"363","article-title":"SMS of death: From analyzing to attacking mobile phones on a large scale","author":"mulliner","year":"2011","journal-title":"Proc Usenix Security Symp"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813718"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018479"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/2444776.2444779"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813618"},{"key":"ref82","author":"borgaonkar","year":"2017","journal-title":"New Adventures in Spying 3G & 4G Users Locate Track Monitor"},{"key":"ref81","article-title":"Defending mobile phones","author":"nohl","year":"2011","journal-title":"Proc Chaos Commun Congr (28C3)"},{"key":"ref84","article-title":"LTE redirection: Forcing targeted LTE cellphone into unsafe network","author":"zhang","year":"2016","journal-title":"Proceedings of the DEFCON"},{"key":"ref83","article-title":"Practical attacks on VoLTE and VoWIFI","author":"chalakkal","year":"2017"},{"key":"ref80","first-page":"1","article-title":"Real time cryptanalysis of A5\/1 on a PC","author":"biryukov","year":"2000","journal-title":"Fast Software Encryption workshop (FSE"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04897-0_12"},{"key":"ref85","author":"nohl","year":"2013","journal-title":"Rooting SIM Cards"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23349"},{"key":"ref87","year":"2016","journal-title":"Heap Memory Corruption in ASN 1 Parsing Code Generated by Objective Systems Inc ASN1C Compiler for C\/C++"},{"key":"ref88","first-page":"2","article-title":"Baseband attacks: Remote exploitation of memory corruptions in cellular protocol stacks","author":"weinmann","year":"2012","journal-title":"Proceedings of USENIX Workshop on Offensive Technologies (WOOT)"},{"key":"ref101","article-title":"Technical specification group services and system aspects; study on the security aspects of the next generation system","year":"2017"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.500"},{"key":"ref127","year":"2017","journal-title":"SS7 Security Map"},{"key":"ref126","year":"2010"},{"key":"ref125","year":"2007"},{"key":"ref124","year":"2009"},{"key":"ref129","article-title":"Verfahren und einevorrichtung zur sicherung einer signalisierungssystem- nr. 7-schnittstelle","author":"engel","year":"2016"},{"key":"ref128","author":"ashdown","year":"2001","journal-title":"SS7 Firewall System"},{"key":"ref130","article-title":"Study into routeing of MT-SMs via the HPLMN","year":"2007"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-7"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1145\/3054924"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"ref136","year":"2010"},{"key":"ref135","article-title":"Running your own GSM network","author":"welte","year":"2008","journal-title":"25th Chaos Commun Congr"},{"key":"ref138","first-page":"1","author":"biddle","year":"2016","journal-title":"Long-Secret Stingray Manuals Detail How Police an Spy on Phones"},{"key":"ref137","year":"2017","journal-title":"3G UMTS IMSI Catcher"},{"key":"ref139","year":"2017","journal-title":"GSMK debuts new security systems to protect mobile network operators against eavsdropping and fraud"},{"key":"ref140","year":"2017","journal-title":"GSM Security Map"},{"key":"ref141","first-page":"2","article-title":"The TESLA broadcast authentication protocol","volume":"5","author":"perrig","year":"2005","journal-title":"CryptoBytes"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23313"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023662"},{"key":"ref2","year":"2017","journal-title":"Revenue Forecast Mobile Operators Worldwide"},{"key":"ref144","year":"2007"},{"key":"ref1","year":"2017","journal-title":"Number of mobile phone users worldwide from 2013 to 2019"},{"key":"ref145","author":"muncaster","year":"2014","journal-title":"Chinese cops cuff 1 500 in fake base station spam raid"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1155\/S1687147204403016"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055870"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.148"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00021-8"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27152-1_9"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813615"},{"key":"ref103","article-title":"Rationale and track of security decisions in long term evolution (LTE) RAN \/ 3GPP system architecture evolution (SAE)","year":"2009"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23082"},{"key":"ref111","article-title":"White-stingray: Evaluating IMSI catchers detection applications","author":"park","year":"2017","journal-title":"Proceedings of USENIX Workshop on Offensive Technologies (WOOT)"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICITCS.2016.7740306"},{"key":"ref110","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1515\/popets-2017-0027","article-title":"Sea-glass: Enabling city-wide IMSI-catcher detection","author":"ney","year":"2017","journal-title":"Proc 13th Privacy Enhancing Technologies Symp (PETS)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2007.4394792"},{"key":"ref11","author":"golde","year":"2016","journal-title":"Breaking Band"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.22"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.33"},{"key":"ref14","first-page":"5","article-title":"IPv6 security: Attacks and countermeasures in a nutshell","author":"ullrich","year":"2014","journal-title":"Proceedings of USENIX Workshop on Offensive Technologies (WOOT)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.27"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23176"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2005.01.015"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.40"},{"key":"ref117","first-page":"25","article-title":"Mutual authentication and key agreement for GSM","author":"kumar","year":"2006","journal-title":"Proc IEEE Int Conf Mobile Bus (ICMB)"},{"key":"ref18","author":"jover","year":"2017","journal-title":"Some Key Challenges in Securing 5G Wireless Networks"},{"key":"ref19","year":"2011"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46598-2_2"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-287-936-3_13"},{"key":"ref113","year":"2017","journal-title":"GSMK CryptoPhone"},{"key":"ref116","year":"2017","journal-title":"Protect yourself from cell phone interception"},{"key":"ref115","year":"2017","journal-title":"GSMK debuts new security systems to protect mobile network operators against eavsdropping and fraud"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-009-9276-4"},{"key":"ref121","year":"2017","journal-title":"Enhancements to GSM\/UMTS AKA 3GPP TSG SA WG3 Security S3-030542"},{"key":"ref122","year":"2017","journal-title":"On the Introduction and Use of UMTS AKA in GSM 3GPP TSG SA WG3 Security S3-040534"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39555-5_2"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/8443345\/08329226.pdf?arnumber=8329226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:09:55Z","timestamp":1642003795000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8329226\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":198,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/comst.2018.2820728","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}