{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:16:42Z","timestamp":1761401802463},"reference-count":48,"publisher":"Wiley","issue":"10","license":[{"start":{"date-parts":[[2016,1,11]],"date-time":"2016-01-11T00:00:00Z","timestamp":1452470400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"},{"start":{"date-parts":[[2016,1,11]],"date-time":"2016-01-11T00:00:00Z","timestamp":1452470400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm. Networks"],"published-print":{"date-parts":[[2016,7,10]]},"DOI":"10.1002\/sec.1411","type":"journal-article","created":{"date-parts":[[2016,1,11]],"date-time":"2016-01-11T05:35:39Z","timestamp":1452490539000},"page":"1198-1215","source":"Crossref","is-referenced-by-count":9,"title":["Novel secure VPN architectures for LTE backhaul networks"],"prefix":"10.1002","volume":"9","author":[{"given":"Madhusanka","family":"Liyanage","sequence":"first","affiliation":[{"name":"Centre for Wireless Communications; University of Oulu; Oulu Finland"}]},{"given":"Pardeep","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science; UiT The Arctic University of Norway; Tromso Norway"}]},{"given":"Mika","family":"Ylianttila","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communications; University of Oulu; Oulu Finland"}]},{"given":"Andrei","family":"Gurtov","sequence":"additional","affiliation":[{"name":"Helsinki Institute for Information Technology HIIT; Aalto University, Espoo, Finland and ITMO University; Saint Petersburg Russia"}]}],"member":"311","published-online":{"date-parts":[[2016,1,11]]},"reference":[{"key":"10.1002\/sec.1411-BIB0001|sec1411-cit-0001","unstructured":"3GPP system architecture evolution (SAE); security architecture-3GPP TS 33.401 release 12 2013 http:\/\/www.3gpp.org\/ftp\/Specs\/html-info\/33401.htm"},{"key":"10.1002\/sec.1411-BIB0002|sec1411-cit-0002","unstructured":"3G security; network domain security (NDS); IP network layer security-3GPP TS 33.210 release 12 2014 http:\/\/www.3gpp.org\/DynaReport\/33210.htm"},{"key":"10.1002\/sec.1411-BIB0003|sec1411-cit-0003","unstructured":"Network domain security (NDS); authentication framework (AF)-3GPP TS 33.310 release 12 2014 http:\/\/www.3gpp.org\/DynaReport\/33310.htm"},{"issue":"2","key":"10.1002\/sec.1411-BIB0004|sec1411-cit-0004","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MSP.2012.136","article-title":"LTE\/SAE security issues on 4G wireless networks","volume":"11","author":"Bikos","year":"2013","journal-title":"IEEE Magazine on Security & Privacy"},{"issue":"1","key":"10.1002\/sec.1411-BIB0005|sec1411-cit-0005","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1109\/SURV.2013.041513.00174","article-title":"A survey on security aspects for LTE and LTE-A networks","volume":"16","author":"Cao","year":"2014","journal-title":"Communications Surveys & Tutorials, IEEE"},{"key":"10.1002\/sec.1411-BIB0006|sec1411-cit-0006","unstructured":"Alvarez MA Jounay F Volpato P Security in LTE backhauling 2012"},{"key":"10.1002\/sec.1411-BIB0007|sec1411-cit-0007","unstructured":"Alvarez MA Jounay F Major T Volpato P LTE backhauling deployment scenarios 2011"},{"key":"10.1002\/sec.1411-BIB0008|sec1411-cit-0008","unstructured":"Architectural considerations for backhaul of 2G\/3G and long term evolution networks 2010"},{"key":"10.1002\/sec.1411-BIB0009|sec1411-cit-0009","unstructured":"3G\/LTE mobile backhaul network MPLS-TP based solution 2009"},{"key":"10.1002\/sec.1411-BIB0010|sec1411-cit-0010","doi-asserted-by":"crossref","first-page":"44","DOI":"10.4018\/978-1-4666-5170-8.ch003","article-title":"IP-based virtual private network implementations in future cellular networks","volume":"1","author":"Liyanage","year":"2014","journal-title":"Handbook of Research on Progressive Trends in Wireless Communications and Networking"},{"key":"10.1002\/sec.1411-BIB0011|sec1411-cit-0011","doi-asserted-by":"crossref","unstructured":"Liyanage M Gurtov A Secured VPN models for LTE backhaul networks Vehicular Technology Conference (VTC fall), 2012 IEEE IEEE Quebec City, Canada 2012 1 5","DOI":"10.1109\/VTCFall.2012.6399037"},{"key":"10.1002\/sec.1411-BIB0012|sec1411-cit-0012","unstructured":"LTE backhaul-security imperative 2013"},{"key":"10.1002\/sec.1411-BIB0013|sec1411-cit-0013","doi-asserted-by":"crossref","DOI":"10.1002\/9781118380642","volume-title":"LTE Security","author":"Forsberg","year":"2012"},{"key":"10.1002\/sec.1411-BIB0014|sec1411-cit-0014","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1201\/b17352-10","article-title":"A case study on security issues in LTE backhaul and core networks","volume":"1","author":"Liyanage","year":"2014","journal-title":"Case Studies in Secure Computing: Achievements and Trends"},{"key":"10.1002\/sec.1411-BIB0015|sec1411-cit-0015","volume-title":"4G: LTE\/LTE-Advanced for Mobile Broadband","author":"Dahlman","year":"2013"},{"issue":"3","key":"10.1002\/sec.1411-BIB0016|sec1411-cit-0016","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1007\/s11277-010-0088-3","article-title":"3GPP LTE: the future of mobile broadband","volume":"62","author":"Kumar","year":"2012","journal-title":"Wireless Personal Communications"},{"key":"10.1002\/sec.1411-BIB0017|sec1411-cit-0017","doi-asserted-by":"crossref","unstructured":"Bassil R Elhajj IH Chehab A Kayssi A Effects of signaling attacks on LTE networks. 2013 27th International Conference on Advanced Information Networking And Applications Workshops (WAINA) IEEE Catalonia, Spain 2013 499 504","DOI":"10.1109\/WAINA.2013.136"},{"key":"10.1002\/sec.1411-BIB0018|sec1411-cit-0018","unstructured":"Jover RP Security attacks against the availability of LTE mobility networks: overview and research directions. 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC) IEEE New Jersey, USA 2013 1 9"},{"key":"10.1002\/sec.1411-BIB0019|sec1411-cit-0019","article-title":"The android IM app that brought T-mobiles network to its knees","author":"Dano","year":"2010","journal-title":"Fierce Wireless"},{"key":"10.1002\/sec.1411-BIB0020|sec1411-cit-0020","doi-asserted-by":"crossref","unstructured":"Bassil R Chehab A Elhajj I Kayssi A Signaling oriented denial of service on LTE networks. Proceedings of the 10th ACM International Symposium on Mobility Management and Wireless Access ACM Paphos, Cyprus Island 2012 153 158","DOI":"10.1145\/2386995.2387024"},{"key":"10.1002\/sec.1411-BIB0021|sec1411-cit-0021","doi-asserted-by":"crossref","unstructured":"Piper D The Internet IP security domain of interpretation for ISAKMP 1998","DOI":"10.17487\/rfc2407"},{"key":"10.1002\/sec.1411-BIB0022|sec1411-cit-0022","doi-asserted-by":"crossref","unstructured":"Maughan D Schertler M Schneider M Turner J Internet Security Association and Key Management Protocol (ISAKMP) November 1998","DOI":"10.17487\/rfc2408"},{"key":"10.1002\/sec.1411-BIB0023|sec1411-cit-0023","doi-asserted-by":"crossref","unstructured":"Harkins D Carrel D The Internet key exchange (IKE) 1998","DOI":"10.17487\/rfc2409"},{"key":"10.1002\/sec.1411-BIB0024|sec1411-cit-0024","doi-asserted-by":"crossref","unstructured":"Kaufman C Internet key exchange (IKEv2) protocol 2005","DOI":"10.17487\/rfc4306"},{"key":"10.1002\/sec.1411-BIB0025|sec1411-cit-0025","doi-asserted-by":"crossref","unstructured":"Eronen P IKEv2 mobility and multihoming protocol (MOBIKE) June 2006","DOI":"10.17487\/rfc4555"},{"issue":"1","key":"10.1002\/sec.1411-BIB0026|sec1411-cit-0026","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/s11277-012-0818-9","article-title":"Realization of mobile femtocells: operational and protocol requirements","volume":"71","author":"Namal","year":"2013","journal-title":"Wireless Personal Communications"},{"key":"10.1002\/sec.1411-BIB0027|sec1411-cit-0027","doi-asserted-by":"crossref","unstructured":"Moskowitz R Nikander P Jokela P Host identity protocol April 2008","DOI":"10.17487\/rfc5201"},{"key":"10.1002\/sec.1411-BIB0028|sec1411-cit-0028","doi-asserted-by":"crossref","DOI":"10.1002\/9780470772898","volume-title":"Host Identity Protocol (HIP): Towards the Secure Mobile Internet","author":"Gurtov","year":"2008"},{"key":"10.1002\/sec.1411-BIB0029|sec1411-cit-0029","unstructured":"Mobile backhaul solutions for LTE-advanced 2013"},{"key":"10.1002\/sec.1411-BIB0030|sec1411-cit-0030","unstructured":"A new era of mobile backhaul 2013 http:\/\/www.alcatel-lucent.com\/solutions\/ mobile-backhaul"},{"key":"10.1002\/sec.1411-BIB0031|sec1411-cit-0031","doi-asserted-by":"crossref","unstructured":"Eddy WM TCP SYN flooding attacks and common mitigations. RFC 4987 August 2007","DOI":"10.17487\/rfc4987"},{"key":"10.1002\/sec.1411-BIB0032|sec1411-cit-0032","unstructured":"Watson PA Slipping in the window: TCP reset attacks 2004"},{"key":"10.1002\/sec.1411-BIB0033|sec1411-cit-0033","unstructured":"CA CERT Advisory 01 IP spoofing attacks and hijacked terminal connections 2001"},{"key":"10.1002\/sec.1411-BIB0034|sec1411-cit-0034","doi-asserted-by":"crossref","unstructured":"Dierks T Rescorla E The transport layer security (TLS) protocol version 1.2 2008","DOI":"10.17487\/rfc5246"},{"key":"10.1002\/sec.1411-BIB0035|sec1411-cit-0035","doi-asserted-by":"crossref","unstructured":"Freier A Karlton P Kocher P The secure sockets layer (SSL) protocol version 3.0 2011","DOI":"10.17487\/rfc6101"},{"key":"10.1002\/sec.1411-BIB0036|sec1411-cit-0036","first-page":"49","article-title":"Lessons learned from previous SSL\/TLS attacks-a brief chronology of attacks and weaknesses","volume":"2013","author":"Meyer","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"key":"10.1002\/sec.1411-BIB0037|sec1411-cit-0037","unstructured":"Mersh R Shah N Mobile backhaul networks-the next generation 2012"},{"key":"10.1002\/sec.1411-BIB0038|sec1411-cit-0038","unstructured":"Li Z Li L Morillo L Yang T Seamless MPLS for mobile backhaul 2014"},{"key":"10.1002\/sec.1411-BIB0039|sec1411-cit-0039","doi-asserted-by":"crossref","unstructured":"Lasserre M Kompella V Virtual private LAN service (VPLS) using label distribution protocol (LDP) signaling 2007","DOI":"10.17487\/rfc4762"},{"key":"10.1002\/sec.1411-BIB0040|sec1411-cit-0040","doi-asserted-by":"crossref","unstructured":"Kompella K Rekhter Y Virtual private LAN service (VPLS) using BGP for auto-discovery and signaling 2007","DOI":"10.17487\/rfc4761"},{"key":"10.1002\/sec.1411-BIB0041|sec1411-cit-0041","doi-asserted-by":"crossref","unstructured":"Peng J Zhang W Huang K A novel key derivation method for eavesdropper in LTE system In Proceeding of International Conference on Information Science and Technology (ICIST), IEEE Tangier, Morocco 2013 1535 1539","DOI":"10.1109\/ICIST.2013.6747829"},{"key":"10.1002\/sec.1411-BIB0042|sec1411-cit-0042","doi-asserted-by":"crossref","unstructured":"Lai C Li H Lu R Shen XS Cao J A unified end-to-end security scheme for machine-type communication in LTE networks IEEE\/CIC International Conference on Communications in China (ICCC '13), IEEE Xi'an, China 2013 698 703","DOI":"10.1109\/ICCChina.2013.6671201"},{"issue":"2","key":"10.1002\/sec.1411-BIB0043|sec1411-cit-0043","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1109\/TMC.2012.242","article-title":"Security analysis of handover key management in 4G LTE\/SAE networks","volume":"13","author":"Han","year":"2014","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"10.1002\/sec.1411-BIB0044|sec1411-cit-0044","unstructured":"Keller GU Beylot AL Improving flow level fairness and interactivity in WLANs using size-based scheduling policies. The 11th International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile System Vancouver, Canada 2008"},{"issue":"2","key":"10.1002\/sec.1411-BIB0045|sec1411-cit-0045","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/997150.997156","article-title":"A taxonomy of DDoS attack and DDoS defense mechanisms","volume":"34","author":"Mirkovic","year":"2004","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"10","key":"10.1002\/sec.1411-BIB0046|sec1411-cit-0046","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MCOM.2002.1039856","article-title":"Defending against flooding-based distributed denial-of-service attacks: a tutorial","volume":"40","author":"Chang","year":"2002","journal-title":"Communications Magazine, IEEE"},{"key":"10.1002\/sec.1411-BIB0047|sec1411-cit-0047","unstructured":"Protecting the network from denial of service floods 2008"},{"key":"10.1002\/sec.1411-BIB0048|sec1411-cit-0048","unstructured":"Henderson T Venema S Mattes D HIP-based virtual private LAN service (HIPLS) September 2011"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1411","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1411","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/onlinelibrary.wiley.com\/wol1\/doi\/10.1002\/sec.1411\/fullpdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,4]],"date-time":"2021-07-04T05:38:59Z","timestamp":1625377139000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.1411"}},"subtitle":["Novel secure VPN architectures for LTE backhaul networks"],"short-title":[],"issued":{"date-parts":[[2016,1,11]]},"references-count":48,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2016,7,10]]}},"URL":"https:\/\/doi.org\/10.1002\/sec.1411","archive":["Portico"],"relation":{},"ISSN":["1939-0114"],"issn-type":[{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2016,1,11]]}}}