2019
DOI: 10.11591/ijece.v9i6.pp4860-4865
|View full text |Cite
|
Sign up to set email alerts
|

Ensuring telecommunication network security through cryptology: a case of 4G and 5G LTE cellular network providers

Abstract: <p>This paper aims to present the details regarding telecommunication network security through cryptology protocols. The data was based on scientific data collection and the quantitative method was adopted. The questionnaire was developed and the primary respondents were approached who were working in 4 telecommunication networking companies namely Huawei, Ericsson, SK Telecom and Telefonica. The sample size of the research was 60 participants and the statistical analysis was used to analyze research. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Information used: initial seed 67 and Es/No units signal-to-noise ratio (SNR) dB. RF receiver, the RF receiver model includes the elements shown in Figure 5, where the RF demodulator consists of the following stages as shown in Figure 6 [1], [23], [24]. RF receiver, the RF receiver model includes the elements shown in Figure 5, where the RF demodulator consists of the following stages as shown in Figure 6 [1], [23], [24].…”
Section: Lte Rf Reciever Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Information used: initial seed 67 and Es/No units signal-to-noise ratio (SNR) dB. RF receiver, the RF receiver model includes the elements shown in Figure 5, where the RF demodulator consists of the following stages as shown in Figure 6 [1], [23], [24]. RF receiver, the RF receiver model includes the elements shown in Figure 5, where the RF demodulator consists of the following stages as shown in Figure 6 [1], [23], [24].…”
Section: Lte Rf Reciever Modelmentioning
confidence: 99%
“…RF receiver, the RF receiver model includes the elements shown in Figure 5, where the RF demodulator consists of the following stages as shown in Figure 6 [1], [23], [24]. RF receiver, the RF receiver model includes the elements shown in Figure 5, where the RF demodulator consists of the following stages as shown in Figure 6 [1], [23], [24]. LTE direct conversion receiver, estimate the impact of non-linearity, noise, DC offset, mismatches and imbalance introduced by an RF chain composed by an low noise pre amplifier (LNA), direct conversion demodulator and variable gain amplifier (VGA) parameters illustrated in Table 1, internat protocol (IP3) which is a well-known specification that controlling linearity in radio frequency functions and stages, The output power versus input power behavior of both amplifiers shows that p -12 dB of parallel amplifier is better than single path LNA [25].…”
Section: Lte Rf Reciever Modelmentioning
confidence: 99%
“…The authors have highlight potential challenges and probable solutions using numerical tools and simulation-based approaches. Manasreh et al [16] have presented a detailed analysis of the telecommunication network's cryptology approaches. The analysis is conducted on the basis of scientific data and quantitative and statistical analysis.…”
Section: Introductionmentioning
confidence: 99%