Skip to main content

A Review of Security Risks in the Mobile Telecommunication Packet Core Network

  • Conference paper
Advances in Information Technology (IAIT 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 409))

Included in the following conference series:

  • 1048 Accesses

Abstract

Advances in information technology depend on the availability of telecommunication, network and mobile technologies. With the rapid increasing number of mobile devices being used as essential terminals or platforms for communication, security threats now target the whole telecommunication infrastructure that includes mobile devices, radio access network, and the core network operated by the mobile operators. In particular, the mobile core network is the most important part of the mobile communication system because different access networks are consolidated at the core network. Therefore, any risks associated with the core network would have a significant impact on the mobile network regardless of technologies of access networks are in use. This paper reviews the security risks in the mobile core network for data services by considering the confidentiality, integrity and availability (CIA) aspects, and then relates them to the ITU-T X.805 reference framework. Finally, this paper provides a recommendation on how to address these risks using the ITU-T X.805 reference framework. This paper will benefit mobile operators and network designers looking to secure the mobile packet core system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Harmantzis, F., Malek, M.: Security Risk Analysis and Evaluation. In: IEEE International Conference on Communications, vol. 4, pp. 1897–1901 (2004)

    Google Scholar 

  2. Chouhan, S., Gaikwad, R.B., Sharma, N.: A Study on 4G Network and Its Security. International Journal of Computer Architecture and Mobility 1(9) (2013)

    Google Scholar 

  3. ITU-T Recommendation X.805: Security Architect for Systems Providing End-to-End Communication (2003)

    Google Scholar 

  4. Ahmadian, Z., Salimi, S., Salahi, A.: Security Enhancement against UMTS-GSM Internetworking Attacks. Elsevier Computer Network Journal 54, 2256–2270 (2010)

    Article  MATH  Google Scholar 

  5. Xenakis, C., Merakos, L.: Security in third Generation Mobile Network. Elsevier Computer Communication Journal 27, 638–650 (2004)

    Article  Google Scholar 

  6. Vriendt, J.D., Laine, P., Lerouge, C., Xu, X.: Alcatel: Mobile Network Evolution: A Revolution on the Move. IEEE Communication Magazine, 104–111 (April 2002)

    Google Scholar 

  7. Prasad, A., Wang, H., Schoo, P.: Infrastructure Security for Future Mobile Communication System. In: WPMC 2003, Yokosuka, Japan (2003)

    Google Scholar 

  8. Peng, X., Wen, Y., Zhao, H.: Security Issues and Solutions in 3G Core Net-work. Journal of Networks 6(5), 823–830 (2011)

    Article  Google Scholar 

  9. Dimitriadis, C.K.: Improving Mobile Core Network Security with Honeynets. IEEE Security & Privacy 5(4), 40–47 (2007)

    Article  Google Scholar 

  10. Xenakis, C.: Security Measures and Weaknesses of the GPRS Security Architecture. International Journal of Network Security 6(2), 158–169 (2008)

    Google Scholar 

  11. Bilogrevic, I., Jadliwala, M., Hubaux, J.-P.: Security Issues in Next Generation Mobile Networks: LTE and Femtocells. In: 2nd International Femtocell Workshop, Luton, UK (2010)

    Google Scholar 

  12. Astely, D., Dahlman, E., Furuskar, A., Jading, Y., Lindstrom, M., Parkvall, S.: LTE: The Evolution of Mobile Broadband. IEEE Communications Magazine 47(4), 44–51 (2009)

    Article  Google Scholar 

  13. Ricciatoa, F., Colucciaa, A., D’Alconzo, A.: A Review of DoS Attack Models for 3G Cellular Networks from a System-design Perspective. Elsevier Computer Communications Journal 33, 551–558 (2010)

    Article  Google Scholar 

  14. Meyer, U., Wetzel, S.: A Man-in-the-Middle Attack on UMTS. In: Proceedings of the 3rd ACM Workshop on Wireless Security (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Khera, V., Fung, C.C., Chaisiri, S. (2013). A Review of Security Risks in the Mobile Telecommunication Packet Core Network. In: Papasratorn, B., Charoenkitkarn, N., Vanijja, V., Chongsuphajaisiddhi, V. (eds) Advances in Information Technology. IAIT 2013. Communications in Computer and Information Science, vol 409. Springer, Cham. https://doi.org/10.1007/978-3-319-03783-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03783-7_9

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03782-0

  • Online ISBN: 978-3-319-03783-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics