메뉴 건너뛰기




Volumn 34, Issue 3, 2011, Pages 226-235

DoS attacks exploiting signaling in UMTS and IMS

Author keywords

Denial of service; EAP AKA; IMS; Security; UMTS

Indexed keywords

DENIAL OF SERVICE; EAP-AKA; IMS; SECURITY; UMTS;

EID: 78751649037     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2010.02.010     Document Type: Article
Times cited : (38)

References (35)
  • 2
    • 78751648500 scopus 로고    scopus 로고
    • Kazumi Algorithm Specification, ETSI TS 135 202 V7.0.0 (accessed13.01.08)
    • Kazumi Algorithm Specification, ETSI TS 135 202 V7.0.0. < http://www.etsi.org/website/document/algorithms/ts-135202v070000p.pdf > (accessed 13.01.08).
  • 6
    • 78149401077 scopus 로고    scopus 로고
    • 3GPP Technical Specification, 3GPP (Release 8), TS 33.102 V8.3.0, June
    • 3GPP Technical Specification, 3GPP, 3G Security; Security Architecture (Release 8), TS 33.102 V8.3.0, June 2009.
    • (2009) 3G Security; Security Architecture
  • 7
    • 78751650253 scopus 로고    scopus 로고
    • Information Technology; Security Techniques; Entity Authentication
    • ISO/IEC 9798-4 1999
    • ISO/IEC 9798-4 (1999). Information Technology; Security Techniques; Entity Authentication. Part 4: Mechanisms Using a Cryptographic Check Function, 1999.
    • (1999) Part 4: Mechanisms Using A Cryptographic Check Function
  • 9
    • 0012453383 scopus 로고    scopus 로고
    • 3GPP TR 33.900 (1.2.0) January
    • 3GPP TR 33.900 (1.2.0), A Guide to 3G Security, January 2000.
    • (2000) A Guide to 3G Security
  • 14
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attack and defense strategies
    • IEEE Press, New York, May-June
    • W. Xu, K. Ma, W. Trappe, Y. Zhang, Jamming sensor networks: attack and defense strategies, IEEE Network, vol. 20(3), IEEE Press, New York, May-June 2006, pp. 41-47.
    • (2006) IEEE Network , vol.20 , Issue.3 , pp. 41-47
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4
  • 19
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • IEEE Press, New York, October
    • A.D. Wood, J.A. Stankovic, Denial of service in sensor networks, IEEE Computer, vol. 35(10), IEEE Press, New York, October 2002, pp. 54-62.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 23
  • 30
    • 33750013256 scopus 로고    scopus 로고
    • Denial of service attacks targeting a SIP VoIP infrastructure: Attack scenarios and prevention mechanisms
    • D. Sisalem, J. Kuthan, S. Ehlert, Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms, IEEE Network, IEEE Press, New York, September/October 2006, pp. 26-31.
    • (2006) IEEE Network, IEEE Press, New York, September/October , pp. 26-31
    • Sisalem, D.1    Kuthan, J.2    Ehlert, S.3
  • 31
    • 78751649684 scopus 로고    scopus 로고
    • 3GPP, Generic Bootstrapping Architecture (GBA) (Rel. 7), TS 33.220 V7, 2005
    • 3GPP, Generic Bootstrapping Architecture (GBA) (Rel. 7), TS 33.220 V7, 2005.
  • 32
    • 78751648097 scopus 로고    scopus 로고
    • 3GPP, Generic Authentication Architecture (GAA); Access to Network Application Functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS) (Rel.7), TS 33.222 V7, 2005
    • 3GPP, Generic Authentication Architecture (GAA); Access to Network Application Functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS) (Rel.7), TS 33.222 V7, 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.