{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:19:05Z","timestamp":1774120745057,"version":"3.50.1"},"reference-count":94,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/ojcoms.2026.3673071","type":"journal-article","created":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T19:39:32Z","timestamp":1773257972000},"page":"2504-2527","source":"Crossref","is-referenced-by-count":0,"title":["RANVDS: Client-Side Detection of Insecure RAN Configurations in Operational 2G\u20135G Networks"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-7293-9096","authenticated-orcid":false,"given":"Lucas L.","family":"da Rocha","sequence":"first","affiliation":[{"name":"Department of Defense Engineering, Military Institute of Engineering, Rio de Janeiro, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5738-168X","authenticated-orcid":false,"given":"Vitor G. A.","family":"Carneiro","sequence":"additional","affiliation":[{"name":"Department of Defense Engineering, Military Institute of Engineering, Rio de Janeiro, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3051-0741","authenticated-orcid":false,"given":"Ernesto L.","family":"Pinto","sequence":"additional","affiliation":[{"name":"Department of Defense Engineering, Military Institute of Engineering, Rio de Janeiro, Brazil"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470973271"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.11.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3626705.3627773"},{"key":"ref4","volume-title":"Nemo Handy Handheld Measurement Solution","year":"2025"},{"key":"ref5","volume-title":"Network Signal Guru","year":"2025"},{"key":"ref6","volume-title":"For the Security of Next-Generation Mobile Networks","year":"2025"},{"key":"ref7","volume-title":"SnoopSnitch","year":"2014"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973751"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/vtc2020-spring48590.2020.9129373"},{"key":"ref10","article-title":"Why we cannot win: On fake base stations and their detection methods","author":"Park","year":"2023"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.23919\/wons60642.2024.10449586"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2025.108091"},{"key":"ref13","volume-title":"GR-GSM Wiki","year":"2025"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3558482.3590196"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/sp46215.2023.10179353"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3528559"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3558482.3581776"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2025.3593140"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3636534.3690696"},{"key":"ref20","volume-title":"Growth Strategies in Cellular Baseband Communication Chip Market: 2025\u20132033 Outlook","year":"2025"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/9781119346913"},{"key":"ref22","volume-title":"Digital Cellular Telecommunications System (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; Network Architecture","year":"2024"},{"key":"ref23","volume-title":"5G; NG-RAN; Architecture Description","year":"2024"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2025.241115"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3734477.3734716"},{"key":"ref26","volume-title":"Digital Cellular Telecommunications System (Phase 2+) (GSM); Security Related Network Functions","year":"2024"},{"key":"ref27","volume-title":"Digital Cellular Telecommunications System (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; 5G; 3G Security; Security Architecture","year":"2024"},{"key":"ref28","volume-title":"Digital Cellular Telecommunications System (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; 3GPP System Architecture Evolution (SAE); Security Architecture","year":"2025"},{"key":"ref29","volume-title":"5G; Security Architecture and Procedures for 5G System","year":"2025"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23082"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23349"},{"key":"ref32","volume-title":"Digital Cellular Telecommunications System (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; 5G; Numbering, Addressing and Identification","year":"2024"},{"key":"ref33","volume-title":"Digital Cellular Telecommunications System (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; Intra-domain Connection of Radio Access Network (RAN) Nodes to Multiple Core Network (CN) Nodes","year":"2024"},{"key":"ref34","first-page":"1","article-title":"GSM\u2014SRSLY?","volume-title":"Proc. 26th Chaos Commun. Congr.","author":"Nohl"},{"issue":"4","key":"ref35","first-page":"86","article-title":"Vulnerability by design in mobile network security","volume":"14","author":"J\u00f8sang","year":"2015","journal-title":"J. Inf. Warf."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-013-9154-9"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1051\/itmconf\/20224201004"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24283"},{"key":"ref39","first-page":"1","article-title":"Location leaks on the GSM air interface","volume-title":"Proc. NDSS","author":"Kune"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23236"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382221"},{"key":"ref42","volume-title":"Digital Cellular Telecommunications System (Phase 2+) (GSM); Mobile Radio Interface Layer 3 Specification; GSM\/EDGE Radio Resource Control (RRC) Protocol","year":"2024"},{"key":"ref43","volume-title":"Digital Cellular Telecommunications System (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; 5G; Mobile Radio Interface Layer 3 Specification; Core Network Protocols; Stage 3","year":"2024"},{"key":"ref44","volume-title":"Universal Mobile Telecommunications System (UMTS); Radio Resource Control (RRC); Protocol Specification","year":"2024"},{"key":"ref45","volume-title":"LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol Specification","year":"2025"},{"key":"ref46","volume-title":"Universal Mobile Telecommunications System (UMTS); LTE; 5G; Non-Access-Stratum (NAS) Protocol for Evolved Packet System (EPS); Stage 3","year":"2025"},{"key":"ref47","volume-title":"5G; NR; Radio Resource Control (RRC); Protocol Specification","year":"2025"},{"key":"ref48","volume-title":"5G; Non-Access-Stratum (NAS) Protocol for 5G System (5GS); Stage 3","year":"2025"},{"key":"ref49","volume-title":"Digital Cellular Telecommunications System (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; 5G; Mobile Radio Interface Signalling Layer 3; General Aspects","year":"2024"},{"key":"ref50","volume-title":"Wireshark Dissectors","year":"2025"},{"key":"ref51","volume-title":"GSMTAP","year":"2025"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2018.2804913"},{"key":"ref53","volume-title":"GSMTAPv3","year":"2025"},{"key":"ref54","volume-title":"SCAT: Signaling Collection and Analysis Tool","year":"2018"},{"key":"ref55","volume-title":"Presenting QCSuper: A Tool for Capturing Your 2G\/3G\/4G Air Traffic on Qualcomm-Based Phones","year":"2018"},{"key":"ref56","volume-title":"XGoldmon","year":"2025"},{"key":"ref57","volume-title":"Baseband Diagnosis Tools","year":"2025"},{"key":"ref58","volume-title":"4G Wireshark Dissector Based on Samsung USB Stick","year":"2025"},{"key":"ref59","volume-title":"GR-GSM","year":"2025"},{"key":"ref60","volume-title":"LTESniffer","year":"2023"},{"key":"ref61","volume-title":"5GSniffer","year":"2024"},{"key":"ref62","volume-title":"SRSRAN Project","year":"2013"},{"key":"ref63","volume-title":"QCSuper","year":"2025"},{"key":"ref64","volume-title":"Diag-Parser","year":"2025"},{"key":"ref65","volume-title":"LTE_monitor_c2xx","year":"2025"},{"key":"ref66","volume-title":"MobileInsight","year":"2024"},{"key":"ref67","volume-title":"Mobile Network Security Report: Brazil","year":"2019"},{"key":"ref68","volume-title":"CSAI","year":"2020"},{"key":"ref69","article-title":"RANVDS V1.0.0","author":"Rocha","year":"2025"},{"key":"ref70","article-title":"RANVDS controlled testbed data","author":"da Rocha","year":"2025"},{"key":"ref71","volume-title":"Nuitka the Python Compiler","year":"2025"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-22r1a"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-90b"},{"key":"ref74","volume-title":"Samsung Galaxy Book3 360 Intel Core I7 1TB","year":"2025"},{"key":"ref75","volume-title":"DragonOS Focal Wiki","year":"2025"},{"key":"ref76","volume-title":"USRP B210","year":"2025"},{"key":"ref77","volume-title":"HID OMNIKEY 6121 Mobile","year":"2025"},{"key":"ref78","volume-title":"SysmoISIM-SJA2","year":"2025"},{"key":"ref79","volume-title":"Samsung Galaxy S21+ 5G (SM-G996B)","year":"2025"},{"key":"ref80","volume-title":"Xiaomi Poco X4 Pro 5G (2201116PG)","year":"2025"},{"key":"ref81","volume-title":"OpenBTS","year":"2008"},{"key":"ref82","volume-title":"OpenBTS-UMTS","year":"2010"},{"key":"ref83","volume-title":"Open5GS","author":"Lee","year":"2017"},{"key":"ref84","volume-title":"Pain\u00e9is De Dados\u2014Acessos","year":"2025"},{"key":"ref85","volume-title":"Security Algorithm Deployment Guidance. FS.35 Version 3.0","year":"2022"},{"key":"ref86","volume-title":"Digital Cellular Telecommunications System (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; Service Aspects and Requirements for Network Sharing","year":"2024"},{"key":"ref87","volume-title":"Security Assurance (SCAS) Spercifications","year":"2024"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3319728"},{"key":"ref89","volume-title":"Technology Upgrades and Legacy Network Sunsets on the Rise","year":"2025"},{"key":"ref90","volume-title":"2G Connectivity Toggle","year":"2025"},{"key":"ref91","volume-title":"Ato N\u00b0 77, De 5 De Janeiro De 2021\u2014Requisitos T\u00e9cnicos E Procedimentos De Ensaios Aplic\u00e1veis Aos Terminais M\u00f3veis Celulares","year":"2021"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref93","first-page":"95","article-title":"Note on the bias of information estimates","volume-title":"Information Theory in Psychology: Problems and Methods","author":"Miller","year":"1955"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198522294.001.0001"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/11343983\/11430592.pdf?arnumber=11430592","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T04:38:48Z","timestamp":1774067928000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11430592\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":94,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2026.3673071","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}