Commenced in January 2007
Paper Count: 30855
Security Threat and Countermeasure on 3G Network
Abstract:Recent communications environment significantly expands the mobile environment. The popularization of smartphones with various mobile services has emerged, and smartphone users are rapidly increasing. Because of these symptoms, existing wired environment in a variety of mobile traffic entering to mobile network has threatened the stability of the mobile network. Unlike traditional wired infrastructure, mobile networks has limited radio resources and signaling procedures for complex radio resource management. So these traffic is not a problem in wired networks but mobile networks, it can be a threat. In this paper, we analyze the security threats in mobile networks and provide direction to solve it.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1080362Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1725
 F. Ricciato, E. Hasenleithner, P. Svoboda, W. Fleischer, "On the impact of unwanted traffic onto a 3G network," in Proc. Security, Privacy and Trust in Pervasive and Ubiquitous Computing(SecPerU), June, 2006.
 H. Holma, A. Toskala, WCDMA for UMTS - Radio Access for Third Generation Mobile Communications 3rd. Willey, pp.95-96, 2004..
 3GPP, "GPRS Tunnelling Protocol (GTP) across the Gn and Gp interface (Release 10)," TS 29.060 V10.2.0, June, 2011.
 S. Jeremy, Z. Hui, B. Jean C, "Impact of paging channel overloads or attacks on a cellular network," in Proc. WiSe '06 Proceedings of the 5th ACM workshop on Wireless security, New York, Sept, 2006.
 DARWIN project. http://www.ftw.at/ftw/research/projects.
 F. Ricciato, "Traffic monitoring and analysis for the optimization of a 3G network," IEEE Wireless Comm. vol. 13, pp. 42-49, Dec, 2006.
 F. Ricciato, E. Hasenleithner, P. Romirer-Maierhofer, "Traffic Analysis at Short Time-Scales An Empirical Case Study From a 3G Cellular Network," IEEE Trans. Network and Service Management, vol. 5, .No. 1, pp. 11-21, March, 2008.
 V. Falletta, F Ricciato, F. T. Wien "Detecting Scanners: Empirical Assessment on a 3G Network," International Journal of Network Security, Vol.9, No.2, pp.143-155, Sept, 2009.