2010
DOI: 10.1002/9780470973271
|View full text |Cite
|
Sign up to set email alerts
|

LTE Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(16 citation statements)
references
References 0 publications
0
16
0
Order By: Relevance
“…In fact, the challengeresponse procedure is achieved between the mobile users and MME while authentication parameters are generated in HSS database. This procedure is illustrated and explained bellow [3]:…”
Section: Eps-aka Protocolmentioning
confidence: 99%
“…In fact, the challengeresponse procedure is achieved between the mobile users and MME while authentication parameters are generated in HSS database. This procedure is illustrated and explained bellow [3]:…”
Section: Eps-aka Protocolmentioning
confidence: 99%
“…1) Tracking user temporary ID TMSI's can't be hidden completely, but we will focus on hiding the TMSI/IMSI relationship or minimize the effect of identity capture [5] [6] [7]. 3GPP's proposed countermeasure is discussed next:…”
Section: B Ue Trackingmentioning
confidence: 99%
“…The eNB is a base station that modulates and demodulates the signals to perform the radio communications between the UEs and EPC. The latter includes the Home Subscriber Serve (HSS), Mobility Management Entity (MME), Serving Gateway (S-GW), Packet Data Network Gateway (P-GW), Authentication Center (AuC) and Policy Charging Rules Function (PCRF) [7].…”
Section: Introductionmentioning
confidence: 99%