5G mobile networks: reviewing security control correctness for mischievous activity
Article highlights Propose Control-Risk-Correctness (CRC) method for mobile telecommunications networks. Use CRC for simplified risk analysis in mobile networks and apply it on various trust boundaries. Identify elevated risk rating for trust boundaries.
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Springer
2022-10-01
|
Series: | SN Applied Sciences |
Subjects: | |
Online Access: | https://doi.org/10.1007/s42452-022-05193-8 |
_version_ | 1797986065691181056 |
---|---|
author | Eric Yocam Amjad Gawanmeh Ahmad Alomari Wathiq Mansoor |
author_facet | Eric Yocam Amjad Gawanmeh Ahmad Alomari Wathiq Mansoor |
author_sort | Eric Yocam |
collection | DOAJ |
description | Article highlights Propose Control-Risk-Correctness (CRC) method for mobile telecommunications networks. Use CRC for simplified risk analysis in mobile networks and apply it on various trust boundaries. Identify elevated risk rating for trust boundaries. |
first_indexed | 2024-04-11T07:27:04Z |
format | Article |
id | doaj.art-fa69399175d9486e9a692ca27919daec |
institution | Directory Open Access Journal |
issn | 2523-3963 2523-3971 |
language | English |
last_indexed | 2024-04-11T07:27:04Z |
publishDate | 2022-10-01 |
publisher | Springer |
record_format | Article |
series | SN Applied Sciences |
spelling | doaj.art-fa69399175d9486e9a692ca27919daec2022-12-22T04:37:02ZengSpringerSN Applied Sciences2523-39632523-39712022-10-0141111710.1007/s42452-022-05193-85G mobile networks: reviewing security control correctness for mischievous activityEric Yocam0Amjad Gawanmeh1Ahmad Alomari2Wathiq Mansoor3Department of Computer and Cyber Sciences, The Beacom College, Dakota State UniversityElectrical Engineering Department, College of Engineering and IT, University of DubaiDepartment of Software Engineering and Information Technology, Ecole de Technologie Superieure (ETS)Electrical Engineering Department, College of Engineering and IT, University of DubaiArticle highlights Propose Control-Risk-Correctness (CRC) method for mobile telecommunications networks. Use CRC for simplified risk analysis in mobile networks and apply it on various trust boundaries. Identify elevated risk rating for trust boundaries.https://doi.org/10.1007/s42452-022-05193-8Fake cell towerThreat modelingRisk control correctnessSimplified risk rating |
spellingShingle | Eric Yocam Amjad Gawanmeh Ahmad Alomari Wathiq Mansoor 5G mobile networks: reviewing security control correctness for mischievous activity SN Applied Sciences Fake cell tower Threat modeling Risk control correctness Simplified risk rating |
title | 5G mobile networks: reviewing security control correctness for mischievous activity |
title_full | 5G mobile networks: reviewing security control correctness for mischievous activity |
title_fullStr | 5G mobile networks: reviewing security control correctness for mischievous activity |
title_full_unstemmed | 5G mobile networks: reviewing security control correctness for mischievous activity |
title_short | 5G mobile networks: reviewing security control correctness for mischievous activity |
title_sort | 5g mobile networks reviewing security control correctness for mischievous activity |
topic | Fake cell tower Threat modeling Risk control correctness Simplified risk rating |
url | https://doi.org/10.1007/s42452-022-05193-8 |
work_keys_str_mv | AT ericyocam 5gmobilenetworksreviewingsecuritycontrolcorrectnessformischievousactivity AT amjadgawanmeh 5gmobilenetworksreviewingsecuritycontrolcorrectnessformischievousactivity AT ahmadalomari 5gmobilenetworksreviewingsecuritycontrolcorrectnessformischievousactivity AT wathiqmansoor 5gmobilenetworksreviewingsecuritycontrolcorrectnessformischievousactivity |