1. Wey, .J.K., Chang, H.T., Sun, L.F., Yang, W.P.: Clone terminator: an authentication service for advanced mobile phone system. In: 1995 IEEE 45th Vehicular Technology Conference. Countdown to the Wireless Twenty-First Century, vol. 1, pp. 175–179 (1995)
2. Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., Gurtov, A.: 5G security: Analysis of threats and solutions. In: 2017 IEEE Conference on Standards for Communications and Networking, pp. 193–199
3. Arfaoui, P., Bisson, P., Blom, R., Borgaonkar, R., Englund, H., Flix, E., Klaedtke, F., Nakarmi, P.K., Nslund, M., et al.: A security architecture for 5G networks. IEEE Access 6 22466–22479
4. Alliance, N.: NGMN 5G White Paper, Next Generation Mobile Networks, White paper (2015)
5. IMT-2020, P.G. 5G Concept. IMT-2020 (5G) Promotional Group, China. Volume 2, 2015. Available online: http://www.imt-2020.org.cn/en/documents/download/3. Accessed on 11 Oct 2018