1AndréEgners.Threat and Risk Analysis for Mobile Communication Networks and Mobile Terminals[R].Nokia Siemens Networks Research,2013:23-28.
2Li Zhu,Hang Qin,Huaqing Maoet al.Research on 3GPP LTE Security Architecture C∥2012 8th International Conference on Wireless Communications,Networking and Mobile Computing(Wi COM),2012:1-4.
3Woung J,Se K K,Joo H O et al..Session-Based Detection of Signaling Do S on LTE Mobile Networks[J].Advances in Computer Networks,2014,2(3):159-162.
43GPP TS 23.843.3rd Generation Partnership Project;Technical Specification Group Services and System Aspects;Study on Core Network Overload(CNO)solutions(Release 12)[S].
5Jover R P.Security Attacks Against the Availability of LTE Mobility Networks:Overview and Research Directions[C]∥IEEE 2013 16th International Symposium on Wireless Personal Multimedia Communications(WPMC),2013:1-9.
63GPP TS 29.274.3rd Generation Partnership Project;3GPP Evolved Packet System(EPS);Evolved General Packet Radio System(GPRS)Tunnelling Protocol for Control Plane(GTPv2-C)(Release 12)[S].
73GPP TS29.281.3rd Generation Partnership Project;Technical Specification Group Core Network and Terminals;General Packet Radio System(GPRS)Tunnelling Protocol User Plane(GTPv1-U)(Release 12)[S].
8汪辰良.LTE安全接入机制研究[D].西安:西安电子科技大学,2012.
9Cao J,Li H,Ma M,et al.A Simple and Robust Handover Authentication between He NB and e NB in LTE Networks[J].Computer Networks,2012,56(8):2119-2130.
10Zheng J.Research on the Security of 4G Mobile System in the IPv6 Network[C]∥Recent Advances in Computer Science and Information Engineering,2012:829-834.