5G mobile networks: reviewing security control correctness for mischievous activity

Article highlights Propose Control-Risk-Correctness (CRC) method for mobile telecommunications networks. Use CRC for simplified risk analysis in mobile networks and apply it on various trust boundaries. Identify elevated risk rating for trust boundaries.

Bibliographic Details
Main Authors: Eric Yocam, Amjad Gawanmeh, Ahmad Alomari, Wathiq Mansoor
Format: Article
Language:English
Published: Springer 2022-10-01
Series:SN Applied Sciences
Subjects:
Online Access:https://doi.org/10.1007/s42452-022-05193-8
_version_ 1797986065691181056
author Eric Yocam
Amjad Gawanmeh
Ahmad Alomari
Wathiq Mansoor
author_facet Eric Yocam
Amjad Gawanmeh
Ahmad Alomari
Wathiq Mansoor
author_sort Eric Yocam
collection DOAJ
description Article highlights Propose Control-Risk-Correctness (CRC) method for mobile telecommunications networks. Use CRC for simplified risk analysis in mobile networks and apply it on various trust boundaries. Identify elevated risk rating for trust boundaries.
first_indexed 2024-04-11T07:27:04Z
format Article
id doaj.art-fa69399175d9486e9a692ca27919daec
institution Directory Open Access Journal
issn 2523-3963
2523-3971
language English
last_indexed 2024-04-11T07:27:04Z
publishDate 2022-10-01
publisher Springer
record_format Article
series SN Applied Sciences
spelling doaj.art-fa69399175d9486e9a692ca27919daec2022-12-22T04:37:02ZengSpringerSN Applied Sciences2523-39632523-39712022-10-0141111710.1007/s42452-022-05193-85G mobile networks: reviewing security control correctness for mischievous activityEric Yocam0Amjad Gawanmeh1Ahmad Alomari2Wathiq Mansoor3Department of Computer and Cyber Sciences, The Beacom College, Dakota State UniversityElectrical Engineering Department, College of Engineering and IT, University of DubaiDepartment of Software Engineering and Information Technology, Ecole de Technologie Superieure (ETS)Electrical Engineering Department, College of Engineering and IT, University of DubaiArticle highlights Propose Control-Risk-Correctness (CRC) method for mobile telecommunications networks. Use CRC for simplified risk analysis in mobile networks and apply it on various trust boundaries. Identify elevated risk rating for trust boundaries.https://doi.org/10.1007/s42452-022-05193-8Fake cell towerThreat modelingRisk control correctnessSimplified risk rating
spellingShingle Eric Yocam
Amjad Gawanmeh
Ahmad Alomari
Wathiq Mansoor
5G mobile networks: reviewing security control correctness for mischievous activity
SN Applied Sciences
Fake cell tower
Threat modeling
Risk control correctness
Simplified risk rating
title 5G mobile networks: reviewing security control correctness for mischievous activity
title_full 5G mobile networks: reviewing security control correctness for mischievous activity
title_fullStr 5G mobile networks: reviewing security control correctness for mischievous activity
title_full_unstemmed 5G mobile networks: reviewing security control correctness for mischievous activity
title_short 5G mobile networks: reviewing security control correctness for mischievous activity
title_sort 5g mobile networks reviewing security control correctness for mischievous activity
topic Fake cell tower
Threat modeling
Risk control correctness
Simplified risk rating
url https://doi.org/10.1007/s42452-022-05193-8
work_keys_str_mv AT ericyocam 5gmobilenetworksreviewingsecuritycontrolcorrectnessformischievousactivity
AT amjadgawanmeh 5gmobilenetworksreviewingsecuritycontrolcorrectnessformischievousactivity
AT ahmadalomari 5gmobilenetworksreviewingsecuritycontrolcorrectnessformischievousactivity
AT wathiqmansoor 5gmobilenetworksreviewingsecuritycontrolcorrectnessformischievousactivity