Research Article

Towards 5G Security Analysis against Null Security Algorithms Used in Normal Communication

Figure 6

IP spoofing attack.