-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathreferences.html
More file actions
69 lines (64 loc) · 2.88 KB
/
references.html
File metadata and controls
69 lines (64 loc) · 2.88 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
<!DOCTYPE html>
<html lang="en">
<style>
.hero {
padding-bottom: 0rem !important;
}
</style>
<head>
<meta charset="UTF-8" />
<title>References – 4G/5G Security Project</title>
<meta name="viewport" content="width=device-width, initial-scale=1" />
<link rel="stylesheet" href="style.css" />
</head>
<body>
<header>
<div class="nav-inner">
<div class="logo">4G / 5G Security</div>
<nav>
<ul>
<li><a href="index.html">Introduction</a></li>
<li><a href="mechanisms.html">Security Mechanisms</a></li>
<li><a href="attacks.html">Attacks & Feasibility</a></li>
<li><a href="opinions.html">Opinion & Conclusion</a></li>
<li><a href="references.html" class="active">References</a></li>
</ul>
</nav>
</div>
</header>
<main>
<section class="hero">
<h1>6. References</h1>
</section>
<section>
<h3>Standard</h3>
<ul class="small">
<li>[1] 3rd Generation Partnership Project (3GPP), "3GPP System Architecture Evolution (SAE); Security architecture," 3GPP TS 33.401, V19.1.0, Sep. 2025.</li>
<li>[2] 3rd Generation Partnership Project (3GPP), "Security architecture and procedures for 5G System," 3GPP TS 33.501, V19.4.0, Sep. 2025.</li>
</ul>
</section>
<section>
<h3>Academic Paper & Articles</h3>
<ul class="small">
<li>[3] G. Arfaoui et al., "A Security Architecture for 5G Networks," in IEEE Access, vol. 6, pp. 22466-22479, 2018, doi: 10.1109/ACCESS.2018.2827419.</li>
<li>[4] Y. Park and T. Park, "A Survey of Security Threats on 4G Networks," 2007 IEEE Globecom Workshops, Washington, DC, USA, 2007, pp. 1-6, doi: 10.1109/GLOCOMW.2007.4437813.</li>
<li>[5] Shaik, Altaf, et al. "Practical attacks against privacy and availability in 4G/LTE mobile communication systems." arXiv preprint arXiv:1510.07563 (2015).</li>
<li>[6] D. Fang, Y. Qian and R. Q. Hu, "Security for 5G Mobile Wireless Networks," in IEEE Access, vol. 6, pp. 4850-4874, 2018, doi: 10.1109/ACCESS.2017.2779146</li>
<li>[7] S. Mavoungou, G. Kaddoum, M. Taha and G. Matar, "Survey on Threats and Attacks on Mobile Networks," in IEEE Access, vol. 4, pp. 4543-4572, 2016, doi: 10.1109/ACCESS.2016.2601009.</li>
<li>[8] Kim, Hwankuk. "5G core network security issues and attack classification from network protocol perspective." J. Internet Serv. Inf. Secur. 10.2 (2020): 1-15.</li>
</ul>
</section>
<section>
<h3>Other Materials</h3>
<ul class="small">
<li>[9] Michalek, L. (2025). *Network Technologies I: Mobile Networks. VSB – Technical University of Ostrava, Faculty of Electrical Engineering and Computer Science.</li>
</ul>
</section>
</main>
<footer>
<p class="muted">
© 2025 JongYeon Bae — Security in 4G / 5G Mobile Networks.
</p>
</footer>
</body>
</html>