<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>High-Band Related Threats in 5G Network</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Giorgi Akhalaia</string-name>
          <email>akhalaia.g@gtu.ge</email>
          <email>gakhalaia@cu.edu.ge</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maksim Iavich</string-name>
          <email>miavich@cu.edu.ge</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Caucasus University, Scientific Cyber Security Association.</institution>
          <addr-line>Tbilisi</addr-line>
          ,
          <country country="GE">Georgia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Georgian Technical University</institution>
          ,
          <addr-line>Tbilisi</addr-line>
          ,
          <country country="GE">Georgia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>LBS threats</institution>
          ,
          <addr-line>5G Network Threats, Device Tracking, User Privacy in 5G</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>The deployment of 5G networks, which has been prompted by the development of IoT, mobile devices, and AI, is expected to create a new ecosystem that incorporates various industries, including emergency services, security, and healthcare. Introduction of a new standard always brings new threats. As mobile devices are frequently used by end-users for everyday activities, the risk of sensitive data and personally identifiable information (PII) leakage is significantly increased. In this context, the research focuses on evaluating the privacy of end-users in relation to location-based services (LBS) threats in 5G networks. The study involved conducting various experimental works to determine the best method of locating a device without requiring additional permissions from the end-user. The results showed that using celltowers for device location was more effective than the standard approach using the Global Navigation Satellite System (GNSS) method. The study also found that high-band operating spectrum could be used to determine device location with just one cell tower, rather than relying on information from a minimum of three visible cell-towers. The only limitation to this process is the switch function, which is responsible for ensuring smooth roaming between towers. The research aimed to determine how 5G network architecture affects end-user location privacy, identify which operating spectrum of 5G network is more vulnerable, and assess the extent of this vulnerability.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The world top tech manufacturers are facing challenges in making their products more portable and mobile to
increase their usage. This trend is being driven by the extensive development of portable devices such as
smartphones, IoT, and microcomputers like the Raspberry Pi and Arduino, which have become increasingly
important in our daily lives. The development of these mobile devices has served as a catalyst for the improvement
of telecom standards, prompting engineers to work on the 5th generation network (5G). The upcoming 5th
generation network is a new telecom standard that will be more diverse by integrating various industries into a
single network, which also increases the risk of cyber threats to the network. The focus of our research is to
evaluate the location-based vulnerabilities of User Equipment (UE) within the 5G ecosystem. The 5G standard is
designed to meet three key performance indicators: enhanced
mobile broadband, massive machine type
communications, and ultra-reliable low latency communication, which will surpass the limitations of traditional
telecom communication and usher in a new era in mobile communication. However, this will require network
engineers to make some software and technical changes to meet the requirements set forth by 3GPP. Therefore,
our study aims to examine these modifications and assess how software/technical improvements affect the security
level of devices in terms of location tracking. Our research objectives are:</p>
      <p>2023 Copyright for this paper by its authors.
CEUR</p>
      <p>ceur-ws.org
•
•
•</p>
      <p>Dows a new architecture of 5G network effect on UE LBS privacy?</p>
      <sec id="sec-1-1">
        <title>Which of the 3 operating spectrum represents more vulnerable?</title>
      </sec>
      <sec id="sec-1-2">
        <title>To assess scale of this vulnerability.</title>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Literature Overview</title>
      <p>
        This paper presents ideas that have been thoroughly researched and developed, drawing on the latest
scientific literature, technical documents, official reports, standard analyses, and overviews from
worldleading companies and mobile network operators[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Experts were consulted to discuss major
improvements, technical and design changes in 5G networks, as well as the various threats associated
with them. To conduct experimental work during the research, the authors used a combination of
various self-written tools and open-source projects that were readily available online[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Our research
methodology combined both theoretical analysis and practical experiments to ensure its validity. While
most similar research focuses on the standard methods of device tracking, such as triangulation or
trilateration, our study aimed to enhance the efficiency of these methods. In this article, the authors are
exploring the signal strength parameter as a means of approximating the location of a device. While
some researchers believe that this method can achieve high levels of accuracy, others argue that the
complexity of the system makes it difficult to determine whether signal strength is diminished by
distance or other limiting factors. The key difference between our study and other articles is that we
locate devices by predicting the frequencies they are operating on and intercepting their attachment
requests to cell towers. Manipulating frequencies has been successfully demonstrated by other
researchers, but the use of operating spectrum for device tracking has not yet been documented in
scientific or practical journals. The concept of manipulating radio frequencies is related to research on
mitigating RF pollution, which explores ways to reduce RF exposure indoors by employing various
building materials. Our study builds upon this research by demonstrating that high frequencies can be
utilized to track devices, a notion that was validated through our experimental work.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Methods of Locating Devices</title>
      <p>
        There are various techniques of tracking the devices. Tracking involves determining the precise
location of a device and its variations during a specific time frame. The fundamental concept for
determining the location of a device using various methods is the same: a reference system is required,
against which the User Equipment (UE) can calculate its coordinates. GNSS satellites or cell-towers
are frequently used as reference systems. UE calculates its coordinates by processing data and
measuring signals obtained from GNSS satellites or cell-towers. Arrival time, frequencies, signal
strength, and angle are commonly used to determine device location. The accuracy of the mobile
celltowers depends mainly on the accuracy with which the telecom service providers configure them. In
some regions, for emergency services like 9-1-1 or 1-1-2, the government regulates and mandates a
specific level of cell-tower accuracy. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]
      </p>
      <p>Mobile positioning is a commonly utilized technology that serves a variety of purposes in daily life,
such as checking in on social media, navigation, emergency and critical services, and advertising.
Unfortunately, there are instances where hackers or unauthorized individuals attempt to track devices
and end-users without permission. Our analysis focused on examining the GNSS techniques and
celltower method for locating and tracking devices.</p>
      <p>
        The Geodetic technique, which involves utilizing the Global Navigation Satellite System (GNSS),
is the most precise and accurate method for determining a device's location on the earth. GNSS satellites
emit signals from space, which GPS-enabled devices receive and process to ascertain their actual
location (as shown in Figure 1). Only scientific, geodetic-level GNSS systems are capable of achieving
millimeter-level accuracy and high precision, as they can use multiple signal types to overcome
ionospheric effects and various types of noise. User-friendly devices, on the other hand, are generally
only compatible with the L1 band, which provides accuracy within a range of 3-5 meters, but is still
adequate for tracking purposes. However, GNSS has some limitations, particularly for indoor use,
where devices must have direct line of sight with satellites, which must also be in good geometric
positions. The GNSS method is also commonly referred to as Global Positioning System (GPS) in some
articles, with GPS being operated by the United States as the first satellite provider. Assisted-GPS
(AGPS) is a method where cell-towers are used for locating device. That is the best solution for in-door
use, like in building or for underground use. But it has a lower accuracy than standard GPS method.
(Figure 1, 2)
GSM network operators aim to establish a strong network coverage by strategically installing
celltowers with specific geometries. By determining the x and y coordinates of these cell-towers, a device
can calculate its own location by relying on the coordinates of at least three visible cell-towers. Two
commonly used techniques are triangulation and trilateration. In triangulation, two lines from the
celltowers to the UE and a third line between the cell-towers are used to create a triangle (as shown in
Figure 4). The sides of the cell-towers and angles, such as Alfa and Beta, are already known. On the
other hand, in trilateration, the distances are recalculated from each tower and the common area between
them represents the estimated coordinates of the device (as shown in Figure 3). Some papers may refer
to trilateration as distance measuring.
techniques. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. In the trilateration method (as illustrated in Figure 3), the possible locations of the
device are represented by green circles, which denote the maximum coverage area of the tower for a
specific radius. To determine the device's location, we must compute the intersection of these circles.
This involves solving equations that take into account the distance between the device and each tower,
which enables the calculation of the device's estimated location within the overlapping area of the
circles.
      </p>
      <p>By using a 2D model, the equations for determining the device's location can be simplified and the
calculations can be performed more efficiently.</p>
      <p>equations per circle:
( −  1)2 + ( −  1)2 =  12
( −  2)2 + ( −  2)2 =  22
( −  3)2 + ( −  3)2 =  32</p>
      <p>
        Open parentheses for each eq.:
 2 − 2 1 +  12 +  2 − 2 1 +  12 =  12
 2 − 2 2 +  22 +  2 − 2 2 +  22 =  22
 2 − 2 3 +  32 +  2 − 2 3 +  32 =  32
3. Rewrite the system using A,B,C,D,E,F
4. Solution for the system will be:
  +   = 
  +   = 
 =
 =
− 
− 
− 
− 
This is the simplified two-dimensional version of the trilateration [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Experimental Work</title>
      <p>
        4.1. Collect GNSS data from the devices
We have conducted simulations for different scenarios to determine the most efficient method of
tracking devices. With the abundance of software designed to steal data from devices on the market, we
utilized storm-braker in our study. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] Storm-Braker is a Linux-based open-source software that
produces a malicious link to obtain the latitude and longitude coordinates of the targeted device.
Nevertheless, this method has its limitations as it requires the GPS module to be enabled and the user's
permission. When attempting to extract GNSS data, end-users are repeatedly prompted with alerts such
as "software/Link/Webpage wants to use device's location" (as shown in figure 9). It's worth noting that
activating the GPS module is not obligatory for all devices, and many users disable the GNSS module
to conserve battery life.
Second important note is that, usually device does not track GNSS signals in background. Hence, when
we need to track them using satellites, we have to enable GPS module and startup measurements process
on device. Because of the security aspects, operating systems (like Android, Windows, iOS)
automatically draws sign of “location”, alerting user that GNSS measurement has been started. Therefor
this method is very noisy. Also, because of the GNSS method limitations, if the victim is in building or
at any other location, where they do not have “open sky”, hacker cannot locate using satellites. Hence,
according to the research this method is not the best solution for device tracking without user
permission.
      </p>
      <sec id="sec-4-1">
        <title>4.2 Gathering Cell-Towers using Smartphones</title>
        <p>We leveraged the default transmission of information by cell-towers, which includes their Lat/Long
coordinates and IDs, to gather and map the locations of all towers within the city.</p>
        <p>
          During our experimental work, we utilized an application called "Tower Collector", which can be found
on the "Play Store" market. Figure 10 provides details on a particular tower, including its network type,
which indicates that it is an LTE network tower. The RNC (Radio Network Controller) manages and
controls the connected NODE BS and is responsible for encryption at this level. The LAC/TAC (for
UMTS/LTE networks) serves as a unique identifier for the current location area, while the Mobile
Network Code (MNC) identifies the network operator and the Mobile Country Code (MCC) identifies
the country. Lastly, the Cell-ID represents a unique identification for the Base Transceiver Station
(BTS) or sector for the specific LAC. [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]
        </p>
        <p>The signal strength parameter is highly debated as a factor in determining device location due to its
complexity. Various articles have explored its value in solving device location, but it can be influenced
by a multitude of factors, making it difficult to interpret. Low signal strength may not always represent
a long distance from towers and could be caused by external factors such as buildings interfering with
radio waves. Figure 10 displays the results of our mapping of device location and towers, while Figure
10 presents the corresponding statistical information. Attackers can exploit the detailed information
provided by telecom towers to map the entire network and attempt to track devices by collecting visible
tower data from victims. It is worth noting that devices constantly search for cell-towers and switch to
the tower with the strongest signal, and attackers can calculate approximate coordinates of the device
by intercepting that information. The process of tracking cell-towers occurs in the background on
devices, meaning that hackers do not need to initiate any additional software or hardware module (as
required for the GNSS method) to track the device.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.3 Locating device using mmWave (High-band)</title>
        <p>
          The 5G standard requires significant changes to fulfill the requirements of 3GPP. with one of the
most important changes being to the operating spectrum. The spectrum is divided into three categories,
including the Low-Band, which operates below 1 GHz and is less affected by buildings, making it ideal
for use in urban areas. However, this range has a bandwidth limitation of up to 100 Mbps. The
MidBand, which operates from 1 GHz to 6 GHz, offers better bandwidth of up to 1 Gbps, but the signal
from this range is more susceptible to interference from buildings. Lastly, the High-Band/mmWave
operates between 6 GHz to 100 GHz and provides the best bandwidth in the 5G network at 10Gbps.
However, this range is highly susceptible to interference from buildings. [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]
        </p>
        <p>Based on our research, we have found that the limitations of the High-Band in the 5G network can
be leveraged to locate devices using only one visible tower, as opposed to three visible towers. By
combining two factors - firstly, that the High-Band range is greatly impacted by buildings and secondly,
that devices constantly scan for cell-towers to find the strongest signal - we can assume that a device
must be in close proximity to a mmWave tower to connect to it. Otherwise, the device will connect to
a tower from a different category. As such, by extracting information from a device when it is connected
or in range of a mmWave tower, we can estimate its location without needing data from three visible
towers or a minimum of three visible GNSS satellites.</p>
        <p>Our research team assumed that devices will generally not be connected to high-band due to their
limitation with buildings and building materials. So, to test our assumption we simulated different cases
when attacker controls victim’s device Switch Function, which manages smooth roaming between
celltowers. We forced devices to keep them connected on mmWave towers. We created a simulated map
of cell-towers and found that when the device could not connect to a high-band tower, it was likely
outside the coverage area and not in a populated area. With further processing, this information could
be used to estimate possible device locations. We used Raspberry PIs with GPS and 5G antennas, Kali
OS, and simulation software for their experiments. (Table 1).</p>
        <p>Device</p>
        <p>Quantity</p>
        <p>Usage
Raspberry Pi with LTE and</p>
        <p>GPS Modules
Smartphone with GPS support</p>
        <p>Laptop
Results
Algorithm Type
GPS (Catch data from UE)
A-GPS (Catch data from UE)
MITM by Fake towers
Success
Success</p>
        <p>
          Success
It should be mentioned the LBS in 5G Network is not safe from MITM type of attack. [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] [18] This
means that the possibility of fake towers exists, as discussed earlier. During emergency situations,
telecom towers are used to determine the location of user equipment (UE), and the accuracy of the
results depends on the quality of input data. The latitude and longitude coordinates of towers are a
crucial factor in this equation. Therefore, if the network is compromised by fake towers that transmit
falsified coordinates, the calculated location for the device will not be precise.
        </p>
        <p>As experimental studies, we have conducted cyber-attack with the following conditions/case studies:
 We conducted an analysis of High-Band, mmWave frequencies and how they are impacted by
various obstacles, including buildings and building materials
 Our analysis involved intercepting the attach request that the user device sent, which provided
us with all the critical parameters for both the device and the cell-towers.
 Our actions resulted in the device being forced to always connect to High-Band frequencies in
the 5G network
 Through our understanding of the tower locations, which cell-tower was serving the target
device, and the limitations imposed by high-frequency radio waves, we managed to track the
user using only a single tower.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>The 5G Network's advancement is critical for the progression of existing services and future innovations.
Successfully implementing secure networks will overcome existing limitations and unlock new opportunities.
With the vast target market for 5G, hackers are bound to take an interest, making it crucial to prioritize working
on security protocols, policies, and network design. Our analysis, both theoretical and practical, highlighted the
vulnerabilities associated with location-based identification in 5G networks. Consequently, we conducted an
experimental cyber-attack to supplement our theoretical findings.</p>
      <p>According to our studies, the most accurate method of locating a device, the GNSS technique, is also the noisiest,
as operating systems alert users when third parties attempt to steal GPS data. Moreover, this technique is
ineffective when the GPS module is disabled. The second experiment revealed that stealing A-GPS information
from the device is less noisy but requires information from at least three visible towers to solve the trilateration
equation. The most fascinating experiment involved using the limitations of the 5G network's third category of
operating spectrum to determine the device's location using only one tower instead of three. However, this
approach may be disrupted by the Switch Function of the device, which connects to the tower with the strongest
signal. To overcome this issue, we manually controlled the switching function and left the device on the third
operating spectrum despite signal strength. Our experimental, successful cyber-attack confirmed the
locationbased vulnerabilities in 5G networks that must be addressed before widespread deployment.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Recommendations</title>
      <p>As the recommendations, according to our studies, user devices should not connect to high-band 5G network the
very first time. It should be redirected from middle or low-band operating spectrum. Which has coverage in longer
distances, that will harden determining the device location. Security solution can be deployed in software of
highband network. They should not broadcast their lat/long in high precision, it should be done in a way to be protected
from wardriving or any other techniques that are used to plot cell-towers.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Acknowledgment</title>
    </sec>
    <sec id="sec-8">
      <title>8. References</title>
      <p>The work was conducted as a part of PHDF-21-088 financed by Shota Rustaveli National Science
Foundation of Georgia.</p>
      <p>https://www.forbes.com/sites/forbestechcouncil/2019/09/23/why-5g-can-be-more-secure-than-4g/?sh=2ffcdf1657b2
11. Qualcomm Technologies inc. “What is 5G”, in online article.</p>
      <p>https://www.qualcomm.com/5g/what-is-5g
12. SK Telecom, in “5G architecture design and implementation guideline”, 2015.
13. M. Hanif, “5G Phones Will Drain Your Battery Faster Than You Think”, in online
journal, 2020.</p>
      <p>https://www.rumblerum.com/5g-phones-drain-battery-life/
14. Samsung in online report “Samsung Phone Battery Drains Quickly on 5G Service”</p>
      <p>https://www.samsung.com/us/support/troubleshooting/TSG01201462/
15. Yusof, R., Khairuddin, U., and Khalid, M., ‘A New Mutation Operation for Faster</p>
      <p>Convergence in Genetic Algorithm Feature Selection’,In International Journal of Innovative Computing, Information and Control, Vol.
18, No. 10, 2012, pp 7363-7380.
16. The EU Space Programme (Last Access: 10.12.2021)</p>
      <p>https://www.euspa.europa.eu/european-space/eu-space-programme
18. Akhalaia, G., Iavich, M., Gnatyuk, S. (2022). “Location-Based Threats for User Equipment in 5G Network”. Advances in Computer
Science for Engineering and Education. ICCSEEA 2022. Lecture Notes on Data Engineering and Communications Technologies, vol
134. Springer, Cham. https://doi.org/10.1007/978-3-031-04812-8_11</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Huawei</given-names>
            <surname>Technologies</surname>
          </string-name>
          <string-name>
            <surname>CO</surname>
          </string-name>
          ,.
          <article-title>LTD in “5G Network Architecture - A high Level Perspective”, 2016</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>S.</given-names>
            <surname>Asad Hussain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          , M. Emran, “
          <article-title>Positioning a Mobile Subscriber in a Cellular Network System based on Signal Strength”</article-title>
          ,
          <source>IAENG International Journal of Computer Science</source>
          ,
          <volume>34</volume>
          :2, IJCS_
          <volume>34</volume>
          _2_
          <fpage>13</fpage>
          ,
          <year>2007</year>
          . https://www.researchgate.net/publication/26492533
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Cell</given-names>
            <surname>Phone Trilateration Algorithm</surname>
          </string-name>
          ,
          <source>Online Journal “Computer Science”</source>
          ,
          <year>2019</year>
          . (Last access:
          <volume>10</volume>
          .
          <fpage>12</fpage>
          .
          <year>2021</year>
          ) https://www.101computing.
          <article-title>net/cell-phone-trilateration-algorithm/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4. Ultrasecurity, “
          <string-name>
            <surname>Strom-Breaked” (Software</surname>
            <given-names>Package)</given-names>
          </string-name>
          ,
          <source>(Last access: 8</source>
          .
          <fpage>12</fpage>
          .
          <year>2021</year>
          ) https://github.com/ultrasecurity/Storm-Breaker
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5. Johhny, “
          <article-title>How to find the Cell Id location with MCC, MNC, LAC and CellID (CID)”</article-title>
          ,
          <year>2015</year>
          https://cellidfinder.com/articles/how-to
          <article-title>-find-cellid-location-with-mcc-mnc-lac-i-cellid-cid</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>M.</given-names>
            <surname>Iavich</surname>
          </string-name>
          , G. Akhalaia,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          .
          <article-title>Method of Improving the Security of 5G Network Architecture Concept for Energy and Other Sectors of the Critical Infrastructure</article-title>
          , In: Zaporozhets A. (
          <article-title>eds) Systems, Decision and Control in Energy III</article-title>
          .
          <article-title>Studies in Systems, Decision and Control</article-title>
          , vol
          <volume>399</volume>
          . Springer, Cham. https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -87675-3_
          <fpage>14</fpage>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>M. K. Maheshwari</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Agiwal</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Saxena</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Abhishek</surname>
          </string-name>
          .
          <article-title>"Flexible Beamforming in 5G Wireless for Internet of Things”</article-title>
          ,
          <source>in IETE Technical Review</source>
          ,
          <volume>36</volume>
          :
          <issue>1</issue>
          ,
          <fpage>3</fpage>
          -
          <lpage>16</lpage>
          , DOI: 10.1080/02564602.
          <year>2017</year>
          .
          <volume>1381048</volume>
          ,
          <year>2017</year>
          . https://doi.org/10.1080/02564602.
          <year>2017</year>
          .1381048
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>M.</given-names>
            <surname>Ivezic</surname>
          </string-name>
          , L. Ivezic, “5G Security &amp;
          <article-title>Privacy Challenges” in 5G</article-title>
          .
          <source>Security Personal Blog</source>
          ,
          <year>2019</year>
          . https://5g.security
          <article-title>/cyber-kinetic/5g-security-privacy-challenges/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>A.</given-names>
            <surname>Shaik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Borgaonkar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Park</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.P.</given-names>
            <surname>Selfert</surname>
          </string-name>
          . ”
          <article-title>New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities</article-title>
          ” in
          <source>WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks</source>
          , DOI: 10.1145/3317549, ISBN:
          <volume>9781450367264</volume>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. A. Purdy, “
          <article-title>Why 5G Can Be More Secure Than 4G” in Forbes online journal</article-title>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>