{"id":"https://openalex.org/W4241097879","doi":"https://doi.org/10.1002/bltj.20346","title":"Secure base stations","display_name":"Secure base stations","publication_year":2009,"publication_date":"2009-02-25","ids":{"openalex":"https://openalex.org/W4241097879","doi":"https://doi.org/10.1002/bltj.20346"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/bltj.20346","pdf_url":null,"source":{"id":"https://openalex.org/S177220781","display_name":"Bell Labs Technical Journal","issn_l":"1089-7089","issn":["1089-7089","1538-7035","1538-7305"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ris.utwente.nl/ws/files/6781243/SecureBaseStations.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011721449","display_name":"Peter B\u00f6sch","orcid":"https://orcid.org/0000-0002-0480-3439"},"institutions":[],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Peter Bosch","raw_affiliation_strings":["Services Infrastructure group at Bell Labs Antwerp, in Belgium"],"affiliations":[{"raw_affiliation_string":"Services Infrastructure group at Bell Labs Antwerp, in Belgium","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023211970","display_name":"Alec Brusilovsky","orcid":null},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alec Brusilovsky","raw_affiliation_strings":["Secure Communications group of the Alcatel-Lucent Wireless Standards Development department in Naperville, Illinois"],"affiliations":[{"raw_affiliation_string":"Secure Communications group of the Alcatel-Lucent Wireless Standards Development department in Naperville, Illinois","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004307939","display_name":"Rae McLellan","orcid":null},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rae McLellan","raw_affiliation_strings":["Bell Labs End to End Wireless Networking Research department in Murray Hill, New Jersey"],"affiliations":[{"raw_affiliation_string":"Bell Labs End to End Wireless Networking Research department in Murray Hill, New Jersey","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057001271","display_name":"Sape J. Mullender","orcid":null},"institutions":[],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Sape Mullender","raw_affiliation_strings":["Network Systems Lab at Bell Labs Antwerp, in Belgium"],"affiliations":[{"raw_affiliation_string":"Network Systems Lab at Bell Labs Antwerp, in Belgium","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083036939","display_name":"P. Polakos","orcid":null},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"Paul Polakos","raw_affiliation_strings":["Bell Labs End to End Wireless Networking Research department in Murray Hill, New Jersey"],"affiliations":[{"raw_affiliation_string":"Bell Labs End to End Wireless Networking Research department in Murray Hill, New Jersey","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":2,"citation_normalized_percentile":{"value":0.725777,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":71,"max":75},"biblio":{"volume":"13","issue":"4","first_page":"227","last_page":"243"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptanalysis of Block Ciphers and Hash Functions","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptanalysis of Block Ciphers and Hash Functions","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Fault Tolerance in Electronic Systems","score":0.9978,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Hardware Security and Authentication Techniques","score":0.9971,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/machine-learning-attacks","display_name":"Machine Learning Attacks","score":0.474815}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7203842},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.6808353},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6201953},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.5547852},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46943498},{"id":"https://openalex.org/C177782964","wikidata":"https://www.wikidata.org/wiki/Q229785","display_name":"3rd Generation Partnership Project 2","level":3,"score":0.4685458},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.43381327},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.28746903},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13736275},{"id":"https://openalex.org/C138660444","wikidata":"https://www.wikidata.org/wiki/Q5607897","display_name":"Telecommunications link","level":2,"score":0.08755851}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/bltj.20346","pdf_url":null,"source":{"id":"https://openalex.org/S177220781","display_name":"Bell Labs Technical Journal","issn_l":"1089-7089","issn":["1089-7089","1538-7035","1538-7305"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://ris.utwente.nl/ws/files/6781243/SecureBaseStations.pdf","pdf_url":"https://ris.utwente.nl/ws/files/6781243/SecureBaseStations.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://ris.utwente.nl/ws/files/6781243/SecureBaseStations.pdf","pdf_url":"https://ris.utwente.nl/ws/files/6781243/SecureBaseStations.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.6,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":8,"referenced_works":["https://openalex.org/W1980073965","https://openalex.org/W2089187712","https://openalex.org/W2093833539","https://openalex.org/W2096927458","https://openalex.org/W2111820029","https://openalex.org/W2114281938","https://openalex.org/W3044736293","https://openalex.org/W4298921906"],"related_works":["https://openalex.org/W4386698331","https://openalex.org/W3033750547","https://openalex.org/W2322468729","https://openalex.org/W2168356777","https://openalex.org/W2142989636","https://openalex.org/W2138314731","https://openalex.org/W2093207996","https://openalex.org/W2047225036","https://openalex.org/W2029216794","https://openalex.org/W1579876584"],"abstract_inverted_index":{"With":[0],"the":[1,4,25,78,84,116,120,124,153,184,188,196,214,222,228,243,267],"introduction":[2],"of":[3,77,103,123,187,195,198,216],"third":[5],"generation":[6,19,54,69],"(3G)":[7],"Universal":[8],"Mobile":[9],"Telecommunications":[10],"System":[11],"(UMTS)":[12],"base":[13,21,45,55,71,96,122,125,207,273,282,304],"station":[14,274],"router":[15],"(BSR)":[16],"and":[17,62,80,129,132,150,170,191,237,318],"fourth":[18],"(4G)":[20],"stations,":[22,97,126],"such":[23,106,148,262],"as":[24,107,263,310],"3rd":[26],"Generation":[27],"Partnership":[28],"Project":[29],"(3GPP)":[30],"Long":[31],"Term":[32],"Evolution":[33],"(LTE)":[34],"Evolved":[35],"Node":[36],"B":[37],"(eNB),":[38],"it":[39,256,311],"has":[40],"become":[41],"important":[42,258],"to":[43,74,146,151,202,231,234,246,259,278,314],"secure":[44,142,236,317],"stations":[46,56,72,208,283],"from":[47],"break-in":[48],"attempts":[49],"by":[50,287],"adversaries.":[51,288],"While":[52],"previous":[53],"could":[57],"be":[58,203,232,247],"considered":[59],"simple":[60],"voice":[61],"Internet":[63],"Protocol":[64],"(IP)":[65],"packet":[66],"transceivers,":[67],"newer":[68,95],"cellular":[70,85,135,158,210],"need":[73,201],"perform":[75,100],"more":[76],"user-":[79],"signaling":[81],"functions":[82,155,172,199,261],"for":[83,209,249,301],"radio":[86],"access":[87],"network.":[88],"If":[89],"adversaries":[90],"can":[91,99,173],"physically":[92,285],"break":[93],"into":[94],"they":[98],"a":[101,141,218,297,302,322],"range":[102],"undesirable":[104],"operations":[105],"snooping":[108],"on":[109,115,296],"conversations,":[110],"carrying":[111],"out":[112],"denial-of-service":[113],"attacks":[114,279],"serving":[117],"area,":[118],"changing":[119],"software":[121],"stealing":[127],"authentication":[128],"encryption":[130],"keys,":[131],"disrupting":[133],"legitimate":[134],"operations.":[136],"The":[137],"cell-site":[138,189,223,298],"vault":[139,190,229,244,299],"is":[140,257,275,312],"processing":[143,320],"environment":[144,164],"designed":[145],"resist":[147],"tampering":[149],"protect":[152],"sensitive":[154,177],"associated":[156,171],"with":[157],"processing.":[159],"It":[160],"provides":[161],"an":[162,193],"execution":[163],"where":[165],"ciphering":[166],"functions,":[167],"key":[168],"management,":[169],"execute":[174,260],"without":[175],"leaking":[176],"information.":[178],"In":[179,289],"this":[180,290],"paper,":[181,291],"we":[182,225,253,292],"present":[183,192,226,254],"basic":[185],"principles":[186],"overview":[194],"types":[197],"that":[200],"protected":[204],"in":[205,294],"future":[206],"networks.":[211],"We":[212],"address":[213],"importance":[215],"providing":[217],"trust":[219],"hierarchy":[220],"within":[221],"vault,":[224],"why":[227,242,255],"needs":[230,245],"used":[233,248],"establish":[235],"authenticated":[238],"communication":[239],"channels\u2014in":[240],"fact,":[241],"most":[250],"external":[251],"communications\u2014and":[252],"data":[264],"re-encryption":[265],"inside":[266,321],"vault.":[268],"A":[269],"femtocell":[270],"or":[271],"home":[272],"particularly":[276],"vulnerable":[277],"since":[280],"these":[281],"are":[284],"accessible":[286],"focus":[293],"particular":[295],"design":[300],"femto-class":[303],"station,":[305],"including":[306],"its":[307],"standardization":[308],"efforts,":[309],"challenging":[313],"include":[315],"both":[316],"non-secure":[319],"single":[323],"\u201csystem-on-a-chip.\u201d":[324]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4241097879","counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2024-09-26T08:53:52.465300","created_date":"2022-05-12"}