2016
DOI: 10.1007/978-3-319-47063-4_17
|View full text |Cite
|
Sign up to set email alerts
|

Feasibility of Signaling Storms in 3G/UMTS Operational Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…The related problems are exacerbate by the fact that most mobile phones offer opportunistic connections [84,85] to WIFI and other wireless networks which are not part of the mobile operators' core infrastructure. This creates vulnerabilities that need to be monitored on the mobile device itself, which is the motivation for the work in [26,81].…”
Section: Improving the Security Of Mobile Telephonymentioning
confidence: 99%
See 1 more Smart Citation
“…The related problems are exacerbate by the fact that most mobile phones offer opportunistic connections [84,85] to WIFI and other wireless networks which are not part of the mobile operators' core infrastructure. This creates vulnerabilities that need to be monitored on the mobile device itself, which is the motivation for the work in [26,81].…”
Section: Improving the Security Of Mobile Telephonymentioning
confidence: 99%
“…It was also applied to mitigate worm attacks and to deviate user traffic so as to avoid insecure nodes [37,104,105]. Related issues include the management of keys [114,115], and the study and mitigation of signalling storms in mobile telephony [26,102].…”
Section: Improving the Security Of Mobile Telephonymentioning
confidence: 99%
“…The related problems are axacerbated by the fact that most mobile phones offer opportunistic connections [49], [50] to WIFI and other wireless networks which are not part of the mobile operators' core infrastructure. This creates vulnerabilities that need to be monitored on the mobile device itself, which is the motivation for the work in [51], [52].…”
Section: Improving the Security Of Mobile Telephonymentioning
confidence: 99%
“…Furthermore, while work in [21,33] focuses on a general defensive approach against DoS attacks in future networks, signalling storm specific research can roughly be categorised in the following groups: problem definition and attacks classification [5,30,31,41]; measurements in real operating networks [11,40]; modelling and simulation [1,27]; impact of attacks on energy consumption [10,12]; attacks detection and mitigation, using counters [19,20,38], change-point detection techniques [32,42], IP packet analysis [28], randomisation in RRC's functions [45], software changes in the mobile terminal [8,34], monitoring terminal's bandwidth usage [39], and detection using techniques from Artificial Intelligence [2]. As we look to the future, such as the Internet of Things (IoT), various forms of attacks will also have to be considered [6,9].…”
Section: Introductionmentioning
confidence: 99%