2018 IEEE Canadian Conference on Electrical &Amp; Computer Engineering (CCECE) 2018
DOI: 10.1109/ccece.2018.8447670
|View full text |Cite
|
Sign up to set email alerts
|

Threat Modeling in LTE Small Cell Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Raza, et al uncovered the vulnerabilities in the current LTE security measures [10]. Danish, et al presented an asset-focused threat model for small cell LTE networks [11]. Three major risks, the availability of the network resources, unauthorized access, end-user privacy and confidentiality, can affect the security of the LTE networks and their users [11].…”
Section: Introduction the Terminal Communication Access Network Ismentioning
confidence: 99%
See 1 more Smart Citation
“…Raza, et al uncovered the vulnerabilities in the current LTE security measures [10]. Danish, et al presented an asset-focused threat model for small cell LTE networks [11]. Three major risks, the availability of the network resources, unauthorized access, end-user privacy and confidentiality, can affect the security of the LTE networks and their users [11].…”
Section: Introduction the Terminal Communication Access Network Ismentioning
confidence: 99%
“…Danish, et al presented an asset-focused threat model for small cell LTE networks [11]. Three major risks, the availability of the network resources, unauthorized access, end-user privacy and confidentiality, can affect the security of the LTE networks and their users [11]. Kazi J. et al analyzed the security issues in LTE-based vehicle to everything (V2X) network and proposed a security architecture [12].…”
Section: Introduction the Terminal Communication Access Network Ismentioning
confidence: 99%
“…Table 2.1 shows an overview of the evolution of mobile networks. [10] as well as the flexibility to tailor the services to each customer or a small area [11].…”
Section: Mobile Networkmentioning
confidence: 99%