|
|
|
Yuejun Guo, Orhan Ermis, Qiang Tang, Hoang Trang and Alexandre De Oliveira
Signalling protocols are responsible for fundamental tasks such as initiating and terminating communication and identifying the state of the communication in telecommunication core networks. Signalling System No. 7 (SS7), Diameter, and GPRS Tunneling Pro...
ver más
|
|
|
|
|
|
|
Andrea G. Forte, Wei Wang, Luca Veltri and Gianluigi Ferrari
Over the years, the cellular mobile network has evolved from a wireless plain telephone system to a very complex system providing telephone service, Internet connectivity and many interworking capabilities with other networks. Its air interface performan...
ver más
|
|
|
|
|
|
|
Seongmin Park, Byungsun Cho, Dowon Kim and Ilsun You
Research to deal with distributed denial of service (DDoS) attacks was kicked off from long ago and has seen technological advancement along with an extensive 5G footprint. Prior studies, and still newer ones, in the realm of DDoS attacks in the 5G envir...
ver más
|
|
|
|
|
|
|
Filippo Dolente, Rosario Giuseppe Garroppo and Michele Pagano
The paper presents an experimental security assessment within two widely used open-source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination concentrates on two network functions (NFs) that are externally exposed within the core ne...
ver más
|
|
|
|
|
|
|
Duc-Minh Ngo, Dominic Lightbody, Andriy Temko, Cuong Pham-Quoc, Ngoc-Thinh Tran, Colin C. Murphy and Emanuel Popovici
This study proposes a heterogeneous hardware-based framework for network intrusion detection using lightweight artificial neural network models. With the increase in the volume of exchanged data, IoT networks? security has become a crucial issue. Anomaly...
ver más
|
|
|
|
|
|
|
Weizhi Meng, Thanassis Giannetsos and Christian D. Jensen
The Internet has rapidly grown into a distributed and collaborative network with over one billion users, e.g., the Internet of Things (IoT). The future Internet will become the core of the next information infrastructure in regard to computation and comm...
ver más
|
|
|
|
|
|
|
Dalibor Uhlir,Dominik Kovac,Jiri Hosek
Pág. 55 - 59
Core part of state-of-the-art mobile networks is composed of several standard elements like GGSN (Gateway General Packet Radio Service Support Node), SGSN (Serving GPRS Support Node), F5 or MSP (Multi Service Proxy). Each node handles network traffic fro...
ver más
|
|
|
|
|
|
|
Ping Huang and Yafeng Wu
Airborne speech enhancement is always a major challenge for the security of airborne systems. Recently, multi-objective learning technology has become one of the mainstream methods of monaural speech enhancement. In this paper, we propose a novel multi-o...
ver más
|
|
|
|
|
|
|
Paul Scalise, Matthew Boeding, Michael Hempel, Hamid Sharif, Joseph Delloiacovo and John Reed
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Nume...
ver más
|
|
|
|
|
|
|
Ayman Khalil and Besma Zeddini
The intersection of cybersecurity and opportunistic networks has ushered in a new era of innovation in the realm of wireless communications. In an increasingly interconnected world, where seamless data exchange is pivotal for both individual users and or...
ver más
|
|
|
|
|
|
|
Michael Xevgenis, Dimitrios G. Kogias, Panagiotis A. Karkazis and Helen C. Leligou
Undoubtedly, we are witnessing a new era of computer networks that aspire to support modern demanding applications by providing the highest Quality of Experience (QoE) to the end user. Next Generations Networks (NGNs) ensure that characteristics such as ...
ver más
|
|
|
|
|
|
|
Sergii Lysenko, Kira Bobrovnikova, Vyacheslav Kharchenko and Oleg Savenko
Cybersecurity is a common Internet of Things security challenge. The lack of security in IoT devices has led to a great number of devices being compromised, with threats from both inside and outside the IoT infrastructure. Attacks on the IoT infrastructu...
ver más
|
|
|
|
|
|
|
Andrii Shalaginov and Muhammad Ajmal Azad
In recent years, the Internet of Things (IoT) devices have become an inseparable part of our lives. With the growing demand for Smart Applications, it becomes clear that IoT will bring regular automation and intelligent sensing to a new level thus improv...
ver más
|
|
|
|
|
|
|
Rezvan Almas Shehni, Karim Faez, Farshad Eshghi and Manoochehr Kelarestaghi
Wide-spread deployment of Wireless Sensor Networks (WSN) necessitates special attention to security issues, amongst which Sybil attacks are the most important ones. As a core to Sybil attacks, malicious nodes try to disrupt network operations by creating...
ver más
|
|
|
|
|
|
|
Rezvan Almas Shehni, Karim Faez, Farshad Eshghi and Manoochehr Kelarestaghi
Wide-spread deployment of Wireless Sensor Networks (WSN) necessitates special attention to security issues, amongst which Sybil attacks are the most important ones. As a core to Sybil attacks, malicious nodes try to disrupt network operations by creating...
ver más
|
|
|
|
|
|
|
Xiruo Liu, Meiyuan Zhao, Sugang Li, Feixiong Zhang and Wade Trappe
The Internet of Things (IoT) is a recent trend that extends the boundary of the Internet to include a wide variety of computing devices. Connecting many stand-alone IoT systems through the Internet introduces many challenges, with security being front-an...
ver más
|
|
|
|
|
|
|
Xiruo Liu, Meiyuan Zhao, Sugang Li, Feixiong Zhang and Wade Trappe
The Internet of Things (IoT) is a recent trend that extends the boundary of the Internet to include a wide variety of computing devices. Connecting many stand-alone IoT systems through the Internet introduces many challenges, with security being front-an...
ver más
|
|
|
|
|
|
|
Igor Kotenko, Olga Polubelova, Andrey Chechulin and Igor Saenko
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security. The overall functionality of SIEM systems depends largely on the quality of solutions imp...
ver más
|
|
|
|
|
|
|
Ruslans Babajans, Darja Cirjulina, Filips Capligins, Deniss Kolosovs and Anna Litvinenko
The current work is focused on studying the performance of the Pecora?Carroll synchronization technique to achieve synchronization between the analog and discrete chaos oscillators. The importance of this study is supported by the growing applications of...
ver más
|
|
|
|
|
|
|
Alvina Ekua Ntefua Saah, Jurng-Jae Yee and Jae-Ho Choi
The construction industry, characterized by its intricate network of stakeholders and diverse workforce, grapples with the challenge of managing information effectively. This study delves into this issue, recognizing the universal importance of safeguard...
ver más
|
|
|
|