2018 19th IEEE Mediterranean Electrotechnical Conference (MELECON) 2018
DOI: 10.1109/melcon.2018.8379069
|View full text |Cite
|
Sign up to set email alerts
|

Robust detection of signaling DDoS threats for more secure machine type communications in next generation mobile networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Some studies analyzed in this extensive survey propose or verify strategies to prevent general threats such as eavesdropping [107,[123][124][125][126], DoS [127][128][129], EDoS [130], scanning attacks [131], IMSI catchers [113,132], spoofing attacks [133,134,[134][135][136], resource depletion attacks (e.g., botnet attacks [108,137]), jamming [138][139][140], localization attack [112], pilot contamination [141,142], pollution attacks [143][144][145], false data injection [117], DDoS [105,[146][147][148][149][150], and DRDoS [151,152]. Other proposed solutions address secure handover (e.g., for heterogeneous IoT networks [153]), enabling devices to join domains with trust (e.g., using authentication frameworks [88,154,155] and protocols [156]).…”
Section: Discussion and Future Research Directionsmentioning
confidence: 99%
“…Some studies analyzed in this extensive survey propose or verify strategies to prevent general threats such as eavesdropping [107,[123][124][125][126], DoS [127][128][129], EDoS [130], scanning attacks [131], IMSI catchers [113,132], spoofing attacks [133,134,[134][135][136], resource depletion attacks (e.g., botnet attacks [108,137]), jamming [138][139][140], localization attack [112], pilot contamination [141,142], pollution attacks [143][144][145], false data injection [117], DDoS [105,[146][147][148][149][150], and DRDoS [151,152]. Other proposed solutions address secure handover (e.g., for heterogeneous IoT networks [153]), enabling devices to join domains with trust (e.g., using authentication frameworks [88,154,155] and protocols [156]).…”
Section: Discussion and Future Research Directionsmentioning
confidence: 99%
“…For instance, a logjam attack allows an attacker to downgrade vulnerable transport layer security connections to 512-bit export-level encryption [Schinianakis, 2017]. A downgrade attack can also force a UE to use a legacy network, vulnerable to many threats addressed by the newest generation [Angelogianni et al, 2020;NSA, 2021;Ghosh et al, 2019;Sheoran et al, 2019;Peltonen et al, 2021;Shaik et al, 2018Shaik et al, , 2019 et al, 2018;Baraković et al, 2016;Wu et al, 2021;Lučić and Mišević, 2021;Chlosta et al, 2019].…”
Section: Item Description Item Descriptionmentioning
confidence: 99%
“…Some studies also propose or analyze strategies to prevent eavesdropping [Bhuyan et al, 2021;Abdalla et al, 2020;Chen et al, 2016;Benzid et al, 2019;Lin et al, 2020a;Nirupama et al, 2019;Zhang et al, 2020a;Komeylian and Komeylian, 2020], DoS [Barik et al, 2020;Fang et al, 2020;Tan et al, 2021], EDoS [Vidal et al, 2018], scanning attacks [Cabaj et al, 2018], IMSI catchers [van den Broek et al, 2015;Norrman et al, 2016], spoofing attacks [Chopra et al, 2018;Li et al, 2021b;Wang et al, 2021a;Dang et al, 2020;Li et al, 2021b], resource depletion attacks (e.g., botnet attacks [Gokul and Sankaran, 2021;Pérez et al, 2017]) jamming [Jagannath et al, 2020;Hachimi et al, 2020;, localization attack [Roth et al, 2021], pilot contamination [Wang et al, 2020a[Wang et al, , 2021b, pollution attacks [Adat et al, 2019;Adat Vasudevan et al, 2020;Vasudevan et al, 2021], false data injection [Moudoud et al, 2021], DDoS [Mamolar et al, 2019;Hakiri and Dezfouli, 2021;Sattar and Matrawy, 2019;Li and Wang, 2018;Ettiane et al, 2018;Tan et al, 2019;Moudoud et al, 2021;…”
Section: Smart Agriculturementioning
confidence: 99%