Study on the Femtocell Vulnerability Analysis Using Threat Modeling


KIPS Transactions on Computer and Communication Systems, Vol. 5, No. 8, pp. 197-210, Aug. 2016
10.3745/KTCCS.2016.5.8.197,   PDF Download:
Keywords: Threat modeling, Femtocell, Vulnerability Analysis
Abstract

Lately smartphone uasage is increasing and many Internet of Things (IoT) devices support wireless communications. Accordingly, small base stations which called femtocells are supplied to prevent saturation of existing base stations. However, unlike the original purpose of the femtocell with the advanced hacking technologies, Vulnerability such as gaining the administrator authority was discovered and this can cause serious problems such as the leakage of personal information of femtocell user. Therefore, identify security threats that may occur in the femtocell and it is necessary to ways for systematic vulnerability analysis. In this paper, We analyzed the security threats that can be generated in the femtocell and constructed a checklist for vulnerability analysis using the Threat Modeling method. Then, using the constructed checklist provides a scheme that can improve the safety of the femto cell through the actual analysis and taken the results of the femtocell vulnerabilities analysis.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. Kim, J. Shin, S. Kim, "Study on the Femtocell Vulnerability Analysis Using Threat Modeling," KIPS Transactions on Computer and Communication Systems, vol. 5, no. 8, pp. 197-210, 2016. DOI: 10.3745/KTCCS.2016.5.8.197.

[ACM Style]
Jae-ki Kim, Jeong-Hoon Shin, and Seung-joo Kim. 2016. Study on the Femtocell Vulnerability Analysis Using Threat Modeling. KIPS Transactions on Computer and Communication Systems, 5, 8, (2016), 197-210. DOI: 10.3745/KTCCS.2016.5.8.197.