메뉴 건너뛰기




Volumn 11, Issue 3, 2014, Pages 280-291

A denial of service attack to UMTS networks using SIM-less devices

Author keywords

Cellular networks security; Critical infrastructures; DoS attack; HLR; Mobile security; UMTS

Indexed keywords

3G MOBILE COMMUNICATION SYSTEMS; AUTHENTICATION; CRITICAL INFRASTRUCTURES; DENIAL-OF-SERVICE ATTACK; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK SECURITY; WIRELESS NETWORKS;

EID: 84904003665     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2014.2315198     Document Type: Article
Times cited : (36)

References (27)
  • 2
    • 84880615912 scopus 로고    scopus 로고
    • A secure communication over wireless environments by using a data connection core
    • Y.-L. Huang, F.-Y. Leu, and K.-C. Wei, "A secure communication over wireless environments by using a data connection core," Math. Comput. Modelling, vol. 58, no. 5, pp. 1459-1474, 2013.
    • (2013) Math. Comput. Modelling , vol.58 , Issue.5 , pp. 1459-1474
    • Huang, Y.-L.1    Leu, F.-Y.2    Wei, K.-C.3
  • 4
    • 84896734213 scopus 로고    scopus 로고
    • A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment
    • Available
    • Y.-L. Huang, F.-Y. Leu, I. You, Y.-K. Sun, and C.-C. Chu. (2014). A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment. J. Supercomput. [Online]. 67(3), pp. 635-652. Available:http://dx. doi.org/10.1007/s11227-013-0958-z
    • (2014) J. Supercomput. [Online] , vol.67 , Issue.3 , pp. 635-652
    • Huang, Y.-L.1    Leu, F.-Y.2    You, I.3    Sun, Y.-K.4    Chu, C.-C.5
  • 5
    • 55949087657 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • Oct.-Dec.
    • B. Blanchet, "A computationally sound mechanized prover for security protocols," IEEE Trans. Dependable Secure Comput., vol. 5, no. 4, pp. 193-207, Oct.-Dec. 2008.
    • (2008) IEEE Trans. Dependable Secure Comput. , vol.5 , Issue.4 , pp. 193-207
    • Blanchet, B.1
  • 9
    • 83455168794 scopus 로고    scopus 로고
    • Managing threats by the use of visualisation techniques
    • V. Viduto, C. Maple, and W. Huang, "Managing threats by the use of visualisation techniques," Int. J. Space-Based Situated Comput., vol. 1, no. 2/3, pp. 204-212, 2011.
    • (2011) Int. J. Space-Based Situated Comput. , vol.1 , Issue.2-3 , pp. 204-212
    • Viduto, V.1    Maple, C.2    Huang, W.3
  • 16
  • 22
    • 84892873906 scopus 로고    scopus 로고
    • A denial of service attack to GSM networks via attach procedure
    • [Online]. Available
    • N. Gobbo, A. Merlo, and M. Migliardi. (2013). A denial of service attack to GSM networks via attach procedure, Proc. ARES Workshop, vol. 8128, pp. 361-376, [Online]. Available:http://dx.doi.org/10.1007/978-3-642-40588-4-25
    • (2013) Proc. ARES Workshop , vol.8128 , pp. 361-376
    • Gobbo, N.1    Merlo, A.2    Migliardi, M.3
  • 23
    • 84904004583 scopus 로고    scopus 로고
    • 3GPP, [Online]. Available
    • 3GPP, (2012). TS 25.214 - Physical layer procedures (FDD). [Online]. Available: http://www.3gpp.org/ftp/Specs/html-info/25214.htm
    • (2012) TS 25.214 - Physical Layer Procedures (FDD)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.