2018
DOI: 10.1109/access.2018.2792534
|View full text |Cite
|
Sign up to set email alerts
|

LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
29
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 63 publications
(29 citation statements)
references
References 61 publications
0
29
0
Order By: Relevance
“…Parne et al [13] proposed the performance and security enhanced (PSE-AKA) protocol for LTE/LTE-A network, which generated the authentication vectors with small overhead. 5G AKA protocol enhances the AKA protocol of 4G LTE [14] [15] by providing the next party and channel with proof of successful authentication of the UE from the visited network [16]. Idrissi et al [17] proposed enhancement of AKA protocol in order to meet the requirements of authentication and authorization in 5G networks by using a new key framework, which not only improved performance, but also enabled fast re-authentication during handover.…”
Section: B Related Workmentioning
confidence: 99%
“…Parne et al [13] proposed the performance and security enhanced (PSE-AKA) protocol for LTE/LTE-A network, which generated the authentication vectors with small overhead. 5G AKA protocol enhances the AKA protocol of 4G LTE [14] [15] by providing the next party and channel with proof of successful authentication of the UE from the visited network [16]. Idrissi et al [17] proposed enhancement of AKA protocol in order to meet the requirements of authentication and authorization in 5G networks by using a new key framework, which not only improved performance, but also enabled fast re-authentication during handover.…”
Section: B Related Workmentioning
confidence: 99%
“…Although the methods to detect various attacks have been intensively researched and reported in the literature, none of them provide a thorough review on security data collection and data analytics for detecting mainstream attacks in WSNs. Some recent surveys focus on security data collection [93], [94] and data analytics in the Internet [92], Ad Hoc network [96], LTE/LTE-A network [97] and mobile phones [95], rather than WSN. Some surveys [6][7][8], [12] mainly focus on a limited number of typical attacks and lack detailed performance analysis under uniform criteria in WSN.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, increased capacity is an on-going concern owing to continuous growth of the number of users. The rapid development in cellular networks, for instance, the long-term evolution (LTE) and LTE-advance (LTE-A) allowed to help the user to receive high bandwidth and fast connectivity [1][2][3]. Nonetheless, wide dissemination of portable devices and new applications lead Manuscript to higher requirements on networks, since signaling overhead directly affects the cellular performance.…”
Section: Introductionmentioning
confidence: 99%
“…Nonetheless, wide dissemination of portable devices and new applications lead Manuscript to higher requirements on networks, since signaling overhead directly affects the cellular performance. High levels of signaling overhead result in increased computational cost and more power consumption [1]. This could take a form of high load and data traffic in the core network which harms the cellular network reliability.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation