Publications and responsibilities
5G Security & Challenges
New vulnerabilities in 4G and 5G cellular access network protocols : exposing device capabilities
Cellular devices support various technical features and services for 2G, 3G, 4G and upcoming 5G networks. For example, these tech- nical features contain physical layer throughput categories, radio protocol information, security algorithm, carrier aggregation bands and type of services such as GSM-R...
New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols
Mobile communications are used by more than two-thirds of the world population who expect security and privacy guarantees. The 3rd Generation Partnership Project (3GPP) responsible for the worldwide standardization of mobile communication has designed and mandated the use of the AKA protocol to prot...
On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks
Mobile network operators choose Self Organizing Network (SON) concept as a cost-effective method to deploy LTE/4G networks and meet user expectations for high quality of service and bandwidth. The main objective of SON is to introduce automation into network management activities and reduce human in...