- IoT and Edge/Fog Computing
- IPv6, Mobility, Handover, Networks, Security
- Caching and Content Delivery
- Internet Traffic Analysis and Secure E-voting
- Advanced Malware Detection Techniques
- Hedgehog Signaling Pathway Studies
- Green IT and Sustainability
- Software-Defined Networks and 5G
- Context-Aware Activity Recognition Systems
- Network Security and Intrusion Detection
- Wireless Body Area Networks
- Anomaly Detection Techniques and Applications
- Network Packet Processing and Optimization
- IoT Networks and Protocols
- Advanced MIMO Systems Optimization
- Cystic Fibrosis Research Advances
- Fetal and Pediatric Neurological Disorders
Electronics and Telecommunications Research Institute
2024
Korea Advanced Institute of Science and Technology
2016-2018
Kootenay Association for Science & Technology
2018
To keep subscribers' identity confidential, a cellular network operator must use temporary identifier instead of permanent one according to the 3GPP standard.Temporary identifiers include Temporary Mobile Subscriber Identity (TMSI) and Globally Unique Identifier (GUTI) for GSM/3G Long-Term Evolution (LTE) networks, respectively.Unfortunately, recent studies have shown that carriers fail protect subscribers in both LTE mainly because these static persistent values.These can be used track...
A cellular network is a closed system, and each operator has built unique “walled garden” for their by combining different operation policies, configurations, implementation optimizations. Unfortunately, some of these combinations can induce performance degradation due to misconfiguration or unnecessary procedures. To detect such degradation, thorough understanding even the minor details standards operator-specific implementations important. However, it difficult problems, as control plane...
Recently, cellular operators have started migrating to IPv6 in response the increasing demand for IP addresses. With introduction of IPv6, middleboxes, such as firewalls preventing malicious traffic from Internet and stateful NAT64 boxes providing backward compatibility with legacy IPv4 services, become crucial maintain stability networks. This paper presents security problems currently deployed middleboxes five major operators. To this end, we first investigate several key features current...
Cellular networks such as 4G and 5G have been exceedingly successful, but encountered a parallel surge in security threats. Random access (RA) is an essential procedure performed between user base station to facilitate attachment the network obtaining radio resources for downlink uplink transmissions. Particularly, users get tightly synchronized based on timing advance (TA) command that estimates propagation delay over air during RA procedure. In this paper, we investigate issues related...
An effort to deploy security devices by the network provider has been increasing as is being exposed various types of attacks. However, providers are incapable handling all attacks each device designed for a certain purpose. If an attack breaks out, only one particular becomes busy in terms resource usage while others idle. Moreover, it hard adjust level service with respect importance flow. To address these issues, we propose new solution, QoSE, which provides adaptive services based on...
5G has undergone significant changes in its over-the-air control channel architecture compared to legacy networks, aimed at enhancing performance. These have unintentionally strengthened the security of channels, reducing vulnerabilities radio channels for attackers. However, based on our experimental results, less than 10% Physical Downlink Control Channel (PDCCH) messages could be decoded using sniffers. We demonstrate that even with this limited data, cell scanning and targeted user...