Abstract
With the evolution and popularization of mobile communication systems, especially for access to data services, it becomes increasingly important to have a closer look at security systems. From analog systems to the fourth generation, many changes and evolutions occurred. This makes possible to question whether mobile networks have sufficiently secure systems, and what vulnerabilities we should be aware of. Due to the widespread risk of attacks on mobile communications, telecommunication companies are increasingly emphasizing telecommunication security technologies specifically in fourth generation (4G) technology, in order to ensure the main security functions to provide an efficient service to its customers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Dahlman, E., Parkvall, S., Skold, J., Beming, P.: 3G evolution: HSPA and LTE for mobile broadband. Academic Press (2010)
Rupprecht, D., Kohls, K., Holz, T., Pöpper, C.: Breaking LTE on layer two. In: IEEE Symposium on Security & Privacy, pp. 2–16 (2019)
Rost, P., Banchs, A., Berberana, I., Breitbach, M., Doll, M., Droste, H., Sayadi, B.: Mobile network architecture evolution toward 5G. IEEE Commun. Mag. 54(5), 84–91 (2016)
Gupta, P.: Evolvement of mobile generations: 1G to 5G. Int. J. Technol. Res. Eng. 1, 152–157 (2013)
Ratasuk, R., Prasad, A., Li, Z., Ghosh, A., Uusitalo, M.A.: Recent advancements in M2M communications in 4G networks and evolution towards 5G. In: 18th International Conference on Intelligence in Next Generation Networks (ICIN) (2015)
Dahlman, E., Parkvall, S., Skold, J.: 4G, LTE-advanced Pro and the road to 5G. Academic Press (2016)
Sun, K., Kim, Y.: Gap analysis for adapting the distributed mobility management model in 4G/5G mobile networks. In: IEEE Conference on Network Softwarization (NetSoft) (2017)
Garba, A.B., Armarego, J., Murray, D., Kenworthy, W.: Review of the information security and privacy challenges in bring your own device (BYOD) environments. J. Inf. Priv. Secur. 11(1), 38–54 (2015)
Li, S., Tryfonas, T., Li, H.: The internet of things: a security point of view. Internet Res. 26(2), 337–359 (2016)
Maxim, M., Pollino, D.: Wireless Security. McGraw-Hill/Osborne (2002)
Yang, H., Ricciato, F., Lu, S., Zhang, L.: Securing a wireless world. Proc. IEEE 94(2), 442–454 (2006)
Welch, D., Lathrop, S.: Wireless security threat taxonomy. In: Information Assurance Workshop, pp. 78–83 (2003)
Liyanage, M., Abro, A.B., Ylianttila, M., Gurtov, A.: Opportunities and challenges of software-defined mobile networks in network security. IEEE Secur. Priv. 14(4), 34–44 (2016)
Mavoungou, S., Kaddoum, G., Taha, M., Matar, G.: Survey on threats and attacks on mo-bile networks. IEEE Access 4, 4543–4572 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Guarda, T., Augusto, M.F., Lopes, I., Victor, J.A., Rocha, Á., Molina, L. (2020). Mobile Communication Systems: Evolution and Security. In: Rocha, Á., Pereira, R. (eds) Developments and Advances in Defense and Security. Smart Innovation, Systems and Technologies, vol 152. Springer, Singapore. https://doi.org/10.1007/978-981-13-9155-2_8
Download citation
DOI: https://doi.org/10.1007/978-981-13-9155-2_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9154-5
Online ISBN: 978-981-13-9155-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)