2021
DOI: 10.1016/j.comnet.2021.108532
|View full text |Cite
|
Sign up to set email alerts
|

Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(7 citation statements)
references
References 39 publications
0
6
0
1
Order By: Relevance
“…A past study 96 discussed that information acquisition in the context of 5G technology refers to learning about and comprehending its characteristics, advantages, and potential drawbacks. Users can gain trustworthy information with the support of clear guidelines, regulations, and communication from regulatory organizations, which may favourably impact their decision to use 5G 53 . Users should consider environmental issues, including the effect on humans, electromagnetic radiation, or energy usage, when deploying and using 5G networks.…”
Section: Discussion and Recommendationsmentioning
confidence: 99%
See 1 more Smart Citation
“…A past study 96 discussed that information acquisition in the context of 5G technology refers to learning about and comprehending its characteristics, advantages, and potential drawbacks. Users can gain trustworthy information with the support of clear guidelines, regulations, and communication from regulatory organizations, which may favourably impact their decision to use 5G 53 . Users should consider environmental issues, including the effect on humans, electromagnetic radiation, or energy usage, when deploying and using 5G networks.…”
Section: Discussion and Recommendationsmentioning
confidence: 99%
“…Some individuals may worry about the increased electromagnetic radiation associated with 5G networks and its impact on human health. People perceive 5G technology as a potential threat to their well-being; they may be less inclined to use it 53 . That is why trustworthiness is an important element built when users believe the company adopts sufficient safety measures before launching a new technology.…”
Section: Literature Review With Hypothesis Developmentmentioning
confidence: 99%
“…Nevertheless, a different pattern was proposed for carrier spacing and the symbol length. 5G-NR implements an extended set of subcarrier spacing defined by the value of µs parameter [47], from the set of [0, 1, 2, 3, 4], which corresponds to the subcarrier spacing of [15,30,60,120,240] kHz respectively. At this point it must be noted that the higher the subcarrier spacing, the shorter the length of the OFDM symbol, which implies a shorter duration of the slot, which, in this case, is in a range from 62,5 µs (240 kHz subcarrier spacing) to 1 ms (15 kHz subcarrier spacing).…”
Section: Time-frequency Structure Of the 5g And Nb-iot Signals A 5g-n...mentioning
confidence: 99%
“…In this model, the network is controlled by the adversary; passive adversaries can eavesdrop on the communication, whereas active adversaries can also intercept, inject, manipulate or drop messages. Under this model, there are so many attack variants that their taxonomy is challenging and too vast to be described here [18], but we summarize the most important for the understanding of this paper. Firstly, replay attacks are one of the simplest attacks carried out by an active adversary, and they consist of two phases.…”
Section: Installationmentioning
confidence: 99%