Mobile Communication Systems: Evolution and Security

  • Teresa GuardaEmail author
  • Maria Fernanda Augusto
  • Isabel Lopes
  • José Avelino Victor
  • Álvaro Rocha
  • Lilian Molina
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 152)


With the evolution and popularization of mobile communication systems, especially for access to data services, it becomes increasingly important to have a closer look at security systems. From analog systems to the fourth generation, many changes and evolutions occurred. This makes possible to question whether mobile networks have sufficiently secure systems, and what vulnerabilities we should be aware of. Due to the widespread risk of attacks on mobile communications, telecommunication companies are increasingly emphasizing telecommunication security technologies specifically in fourth generation (4G) technology, in order to ensure the main security functions to provide an efficient service to its customers.


Telecommunications Security G technologies Mobile communications 


  1. 1.
    Dahlman, E., Parkvall, S., Skold, J., Beming, P.: 3G evolution: HSPA and LTE for mobile broadband. Academic Press (2010)Google Scholar
  2. 2.
    Rupprecht, D., Kohls, K., Holz, T., Pöpper, C.: Breaking LTE on layer two. In: IEEE Symposium on Security & Privacy, pp. 2–16 (2019)Google Scholar
  3. 3.
    Rost, P., Banchs, A., Berberana, I., Breitbach, M., Doll, M., Droste, H., Sayadi, B.: Mobile network architecture evolution toward 5G. IEEE Commun. Mag. 54(5), 84–91 (2016)CrossRefGoogle Scholar
  4. 4.
    Gupta, P.: Evolvement of mobile generations: 1G to 5G. Int. J. Technol. Res. Eng. 1, 152–157 (2013)Google Scholar
  5. 5.
    Ratasuk, R., Prasad, A., Li, Z., Ghosh, A., Uusitalo, M.A.: Recent advancements in M2M communications in 4G networks and evolution towards 5G. In: 18th International Conference on Intelligence in Next Generation Networks (ICIN) (2015)Google Scholar
  6. 6.
    Dahlman, E., Parkvall, S., Skold, J.: 4G, LTE-advanced Pro and the road to 5G. Academic Press (2016)Google Scholar
  7. 7.
    Sun, K., Kim, Y.: Gap analysis for adapting the distributed mobility management model in 4G/5G mobile networks. In: IEEE Conference on Network Softwarization (NetSoft) (2017)Google Scholar
  8. 8.
    Garba, A.B., Armarego, J., Murray, D., Kenworthy, W.: Review of the information security and privacy challenges in bring your own device (BYOD) environments. J. Inf. Priv. Secur. 11(1), 38–54 (2015)Google Scholar
  9. 9.
    Li, S., Tryfonas, T., Li, H.: The internet of things: a security point of view. Internet Res. 26(2), 337–359 (2016)CrossRefGoogle Scholar
  10. 10.
    Maxim, M., Pollino, D.: Wireless Security. McGraw-Hill/Osborne (2002)Google Scholar
  11. 11.
    Yang, H., Ricciato, F., Lu, S., Zhang, L.: Securing a wireless world. Proc. IEEE 94(2), 442–454 (2006)CrossRefGoogle Scholar
  12. 12.
    Welch, D., Lathrop, S.: Wireless security threat taxonomy. In: Information Assurance Workshop, pp. 78–83 (2003)Google Scholar
  13. 13.
    Liyanage, M., Abro, A.B., Ylianttila, M., Gurtov, A.: Opportunities and challenges of software-defined mobile networks in network security. IEEE Secur. Priv. 14(4), 34–44 (2016)CrossRefGoogle Scholar
  14. 14.
    Mavoungou, S., Kaddoum, G., Taha, M., Matar, G.: Survey on threats and attacks on mo-bile networks. IEEE Access 4, 4543–4572 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Teresa Guarda
    • 1
    • 2
    • 3
    Email author
  • Maria Fernanda Augusto
    • 1
    • 4
  • Isabel Lopes
    • 5
    • 3
  • José Avelino Victor
    • 6
    • 7
  • Álvaro Rocha
    • 8
  • Lilian Molina
    • 1
  1. 1.Universidad Estatal Península de Santa Elena—UPSELa LibertadEcuador
  2. 2.Universidad de Las Fuerzas Armadas-ESPESangolquiEcuador
  3. 3.Algoritmi Centre, Minho UniversityGuimarãesPortugal
  4. 4.BITrum-Research GroupLeónSpain
  5. 5.UNIAG (Applied Management Research Unit)Polytechnic Institute of BragançaBragançaPortugal
  6. 6.Instituto Politécnico da MaiaMaiaPortugal
  7. 7.Instituto Universitário da MaiaMaiaPortugal
  8. 8.Universidade de CoimbraCoimbraPortugal

Personalised recommendations