[1] |
CHEN Jinghang, PAN Guangjing, ZHAO Mingwei., 2017-5-11.
|
[2] |
赖成喆,郑东. 3GPP认证和密钥协商协议综述[J]. 信息网络安全,2016(8):24-31.
|
[3] |
TSAY J K, MJOLSNES S.Computational Security Analysis of the UMTS and LTE Authentication and Key Agreement Protocols[J]. Computer Science, 2012, 360(12): 12-17.
|
[4] |
FANIAN A, BERENJKOUB M, GULLIVER T A.A Symmetric Polynomial Based Mutual Authentication Protocol for GSM Networks[J]. International Journal of Security & Networks, 2012, 7(7): 161-173.
|
[5] |
王沂,韩广国,李慧智. 无线网络中可证安全的移动用户密钥交换协议[J]. 信息网络安全,2015(3):54-58.
|
[6] |
HUANG Lin. LTE Redirection Attack-forcing Targeted LTE Cellphone into Unsafe Network[EB/OL]. , 2017-5-11.
|
[7] |
TU Guanhua, LI Chiyu, PENG Chunyi, et al.How Voice call Technology Poses Security Threats in 4G LTE Networks[C]//IEEE. 2015 IEEE Conference on Communications and Network Security(CNS), September 28-30, 2015, Florence, Italy. New Jersey: IEEE, 2015: 442-450.
|
[8] |
李旭,刘颖. 物联网通信技术[M]. 北京:交通大学出版社,2014.
|
[9] |
林晓琳. 移动核心网2G/3G/4G互操作能力评估与优化方法研究[D]. 北京:北京邮电大学,2015.
|
[10] |
SHAO Jing, ZHU Dali, JIN Hao, et al. A Joint Detection Method for Identifying Pseudo Base Station Based on Abnormal Access Parameters[EB/OL]. , 2017-5-11.
|
[11] |
LEE C C, HWANG M S, YANG Weiping.Extension of authentication protocol for GSM[J]. Communications, IEE Proceedings, 2003, 150(2): 91-95.
|
[12] |
FANIAN A, BERENJKOUB M, GULLIVER T A.A Symmetric Polynomial Based Mutual Authentication Protocol for GSM Networks[J]. International Journal of Security & Networks, 2010, 7(7): 161-173.
|
[13] |
胡雪,封化民,陈迎亚,等. 一种增强WAPI安全性的改进方法[J]. 信息网络安全,2015(8):47-52.
|
[14] |
田野,刘斐,徐海东. 新型伪基站安全分析研究[J]. 电信工程技术与标准化,2013(8):58-61
|