{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T08:32:42Z","timestamp":1726043562930},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030301484"},{"type":"electronic","value":"9783030301491"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-30149-1_23","type":"book-chapter","created":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T23:02:54Z","timestamp":1567638174000},"page":"283-301","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Detecting Signalling DoS Attacks on LTE Networks"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4671-766X","authenticated-orcid":false,"given":"Gin\u00e9s","family":"Escudero-Andreu","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7498-4589","authenticated-orcid":false,"given":"Konstantinos","family":"Kyriakopoulos","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1508-1854","authenticated-orcid":false,"given":"James A.","family":"Flint","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5255-7036","authenticated-orcid":false,"given":"Sangarapillai","family":"Lambotharan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,17]]},"reference":[{"key":"23_CR1","unstructured":"Vintila, C., Patriciu, V.: Security analysis of LTE access network. In: Proceedings 10th International Conference Networks (ICN 2011), pp. 29\u201334 (2011)"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Yu, D., Wen, W.: Non-access-stratum request attack in E-UTRAN. In: Computing, Communications and Applications, pp. 48\u201353 (2012)","DOI":"10.1109\/ComComAp.2012.6154001"},{"key":"23_CR3","unstructured":"Bilogrevic, I., Jadliwala, M., Hubaux, J.: Security issues in next generation mobile networks: LTE and femtocells. In: 2nd International Femtocell Workshop, pp. 1\u20133, Luton, UK (2010)"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Purkhiabani, M., Salahi, A.: Enhanced authentication and key agreement procedure of next generation evolved mobile networks. In: 2011 IEEE 3rd International Conference on Communication Software and Networks, May 2011, pp. 557\u2013563 (2011)","DOI":"10.1109\/ICCSN.2011.6014956"},{"key":"23_CR5","unstructured":"3GPP TS 33.401: Technical Specification Group Services and System Aspects; 3GPP System Architecture Evolution (SAE); Security Architecture, vol. 1, no. v.15.6.0 - Release 15, pp. 1\u201379 (2018)"},{"key":"23_CR6","unstructured":"Vintil\u0103, C.-E., Patriciu, V.-V., Bica, I.: An analysis of secure interoperation of EPC and mobile equipments. In: 6th International Conference on Digital Telecommunications, pp. 1\u20136 (2011)"},{"key":"23_CR7","unstructured":"3GPP TS 33.501: Technical Specification Group Services and System Aspects; Security architecture and procedures for 5G system, vol. 1, no. v.15.3.1 - Release 15, pp. 1\u2013181 (2018)"},{"key":"23_CR8","unstructured":"3GPP TS 38.300: Technical Specification Group Radio Access Network; NR; NR and NG-RAN Overall Description; Stage 2. vol. 0, no. v.15.4.0 - Release 15, pp. 1\u201397 (2018)"},{"key":"23_CR9","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"G Shafer","year":"1976","unstructured":"Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Bassil, R., Chehab, A., Elhajj, I., Kayssi, A.: Signaling oriented denial of service on LTE networks. In: Proceedings of the 10th ACM International Symposium on Mobility Management and Wireless Access, Ser. MobiWac 2012, pp. 153\u2013158. ACM, New York (2012)","DOI":"10.1145\/2386995.2387024"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Jover, R.P., Lackey, J., Raghavan, A.: Enhancing the security of LTE networks against jamming attacks. EURASIP J. Inf. Secur. 1\u201314 (2014)","DOI":"10.1186\/1687-417X-2014-7"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Li, X., Wang, Y.: Security enhanced authentication and key agreement protocol for LTE\/SAE network. In: 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing, September 2011, pp. 1\u20134 (2011)","DOI":"10.1109\/wicom.2011.6040169"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"K\u00f8ien, G.M.: Mutual entity authentication for LTE. In: 2011 7th International Wireless Communications and Mobile Computing Conference, July 2011, pp. 689\u2013694 (2011)","DOI":"10.1109\/IWCMC.2011.5982630"},{"key":"23_CR14","unstructured":"Zheng, Y., He, D., Yu, W., Tang, X.: Trusted computing-based security architecture for 4G mobile networks. In: Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT 2005), pp. 251\u2013255 (2005)"},{"key":"23_CR15","unstructured":"Zheng, Y., He, D., Tang, X., Wang, H.: AKA and authorization scheme for 4G mobile networks based on trusted mobile platform. In: 2005 5th International Conference on Information Communications Signal Processing, December 2005, pp. 976\u2013980 (2005)"},{"key":"23_CR16","unstructured":"3GPP TS 22.278: Technical Specification Group Services and System Aspects; Service requirements for the Evolved Packet System (EPS), Network, vol. 0, no. v.16.1.0 - Release 16, pp. 1\u201350 (2018)"},{"key":"23_CR17","unstructured":"3GPP TS 36.331: Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol specification, no. v.15.4.0 - Release 15 (2018)"},{"key":"23_CR18","volume-title":"OSI Reference Model for Telecommunications","author":"D Wetteroth","year":"2001","unstructured":"Wetteroth, D.: OSI Reference Model for Telecommunications. McGraw-Hill Professional, New York (2001)"},{"issue":"1","key":"23_CR19","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1109\/SURV.2013.041513.00174","volume":"16","author":"J Cao","year":"2014","unstructured":"Cao, J., Ma, M., Li, H., Zhang, Y., Luo, Z.: A Survey on security aspects for LTE and LTE-A networks. IEEE Commun. Surv. Tutor. 16(1), 283\u2013302 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Lichtman, M., Reed, J.H., Clancy, T.C., Norton, M.: Vulnerability of LTE to hostile interference. In: 2013 IEEE Global Conference on Signal and Information Processing, December 2013, pp. 285\u2013288 (2013)","DOI":"10.1109\/GlobalSIP.2013.6736871"},{"key":"23_CR21","series-title":"Application, and Service","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-94-007-5064-7_11","volume-title":"Future Information Technology","author":"J-S Cho","year":"2012","unstructured":"Cho, J.-S., Kang, D., Kim, S., Oh, J., Im, C.: Secure UMTS\/EPS authentication and key agreement. In: Park, J., Leung, V., Wang, C.L., Shon, T. (eds.) Future Information Technology. Application, and Service, pp. 75\u201382. Springer, Dordrecht (2012). https:\/\/doi.org\/10.1007\/978-94-007-5064-7_11"},{"key":"23_CR22","unstructured":"3GPP TS 36.300: Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Overall description; Stage 2, no. v.14.0.2 - Release 14, 2017"},{"key":"23_CR23","unstructured":"Khan, M., Ahmed, A., Cheema, A.R.: Vulnerabilities of UMTS access domain security architecture. In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel\/Distributed Computing, 2008, SNPD 2008, pp. 350\u2013355 IEEE (2008)"},{"key":"23_CR24","unstructured":"Reineking, T.: Belief functions: theory and algorithms. Ph.D. dissertation, Mathematics and Informatics, University of Bremen (2014)"},{"key":"23_CR25","unstructured":"Escudero-Andreu, G.: Protection of Mobile and Wireless Networks Against Service Availability Attacks. Ph.D. dissertation, Loughborough University (2018)"},{"issue":"1","key":"23_CR26","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1049\/iet-ifs.2012.0302","volume":"8","author":"KG Kyriakopoulos","year":"2014","unstructured":"Kyriakopoulos, K.G., Aparicio-Navarro, F.J., Parish, D.J.: Manual and automatic assigned thresholds in multi-layer data fusion intrusion detection system for 802.11 attacks. IET Inf. Secur. 8(1), 42\u201350 (2014)","journal-title":"IET Inf. Secur."},{"key":"23_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76917-0","volume-title":"Advanced Data Mining Techniques","author":"DL Olson","year":"2008","unstructured":"Olson, D.L., Delen, D.: Advanced Data Mining Techniques, 1st edn. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-76917-0","edition":"1"},{"issue":"11","key":"23_CR28","first-page":"290","volume":"2","author":"ME Elhamahmy","year":"2010","unstructured":"Elhamahmy, M.E., Elmahdy, H.N., Saroit, I.A.: A new approach for evaluating intrusion detection system. Artif. Intell. Syst. Mach. Learn. 2(11), 290\u2013298 (2010)","journal-title":"Artif. Intell. Syst. Mach. Learn."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Industrial Networks and Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30149-1_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T14:17:02Z","timestamp":1664288222000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30149-1_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030301484","9783030301491"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30149-1_23","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"17 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INISCOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Industrial Networks and Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ho Chi Minh City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iniscom2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iniscom.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}