1 |
M. Agiwal, A. Roy, and N. Saxena: "Next Generation 5G Wireless Networks: A Comprehensive Survey," IEEE Communications Surveys & Tutorials, Vol. 18, No. 3, pp. 1617-1655, 3rd Quart., 2016, DOI: 10.1109/COMST.2016.2532458
DOI
|
2 |
I. Ahmad, S. Shahabuddin, T. Kumar, J. Okwuibe, A. Gurtovand, M. Ylianttila, "Security for 5G and Beyond", IEEE Communications Surveys & Tutorials, Vol. 21, No. 4, pp. 3682-3722, May 2019. DOI: 10.1109/COMST.2019.2916180
DOI
|
3 |
C. Cremers and M. Dehnel-Wild, "Component-based formal analysis of 5G-AKA: channel assumptions and session confusion," in Proc. 26th Annual Network and Distributed System Security Symposium, NDSS, pp. 24-27, Feb. 2019. DOI: 10.14722/ndss.2019.23394
DOI
|
4 |
K. Kim, K. Park, T.K. Park: "Analysis of Deregistration Attacks in 5G Standalone Non-Public Network," Journal of the Korea Society of Computer and Information, Vol. 26, No. 9, pp. 81-88, Sep. 2021. DOI: 10.9708/jksci.2021.26.09.081
DOI
|
5 |
3GPP TS 38.304 v16.4.0: "NR; User Equipment (UE) procedures in Idle mode and RRC Inactive state," Mar. 2021.
|
6 |
3GPP TS 38.300 v16.5.0, "NR; NR and NG-RAN Overall Description; Stage 2," Mar. 2021.
|
7 |
H. Kim, J. Lee, E. Lee, Y. Kim: "Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane," in Proc. IEEE Symposium on Security and Privacy (SP), pp. 1153-1168, May 2019. DOI: 10.1109/SP.2019.00038
DOI
|
8 |
D. Basin, J. Dreier, L. Hirschi, S. Radomirovic, R. Sasse, and V. Stettler, "A Formal Analysis of 5G Authentication," In Proc. the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS '18), pp. 1383-1396, Oct. 2018. DOI: 10.1145/3243734.3243846
DOI
|
9 |
3GPP TS 38.331 v16.3.1: "Radio Resource Control (RRC) protocol specification," Jan. 2021.
|
10 |
R. Khan, P. Kumar, D. N. K. Jayakody, and M. Liyanage: "A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions," IEEE Communications Surveys & Tutorials, Vol. 22, No. 1, pp. 196-248, 1st Quart., 2020. DOI: 10.1109/COMST.2019.2933899
DOI
|
11 |
3GPP TS 38.133 v.16.7.0, "NR; Requirements for support of radio resource management," Mar. 2021.
|
12 |
S.R. Hussain, M. Echeverria, I. Karim, O. Chowdhury, E. Bertino: "5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol," in Proc. 2019 ACM SIGSAC Conference on Computer and Communications Security, pp.669-684, Nov. 2019. DOI: 10.1145/3319535.3354263
DOI
|
13 |
5G-ACIA White Paper: "5G Non-Public Networks for Industrial Scenarios," July 2019.
|
14 |
T.K. Park, J.G. Park, K. Kim: "Security Threats and Potential Security Requirements in 5G Non-Public Networks for Industrial Applications," Journal of the Korea Society of Computer and Information, Vol. 25, No. 11, pp. 105-114, Nov. 2020. DOI: 10.9708/jksci.2020.25.11.105.
DOI
|
15 |
M. Wollschlaeger, T. Sauter and J. Jasperneite, "The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0," IEEE Industrial Electronics Magazine, Vol. 11, No. 1, pp. 17-27, Mar. 2017, DOI: 10.1109/MIE.2017.2649104.
DOI
|