Abstract
Advances in information technology depend on the availability of telecommunication, network and mobile technologies. With the rapid increasing number of mobile devices being used as essential terminals or platforms for communication, security threats now target the whole telecommunication infrastructure that includes mobile devices, radio access network, and the core network operated by the mobile operators. In particular, the mobile core network is the most important part of the mobile communication system because different access networks are consolidated at the core network. Therefore, any risks associated with the core network would have a significant impact on the mobile network regardless of technologies of access networks are in use. This paper reviews the security risks in the mobile core network for data services by considering the confidentiality, integrity and availability (CIA) aspects, and then relates them to the ITU-T X.805 reference framework. Finally, this paper provides a recommendation on how to address these risks using the ITU-T X.805 reference framework. This paper will benefit mobile operators and network designers looking to secure the mobile packet core system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Harmantzis, F., Malek, M.: Security Risk Analysis and Evaluation. In: IEEE International Conference on Communications, vol. 4, pp. 1897–1901 (2004)
Chouhan, S., Gaikwad, R.B., Sharma, N.: A Study on 4G Network and Its Security. International Journal of Computer Architecture and Mobility 1(9) (2013)
ITU-T Recommendation X.805: Security Architect for Systems Providing End-to-End Communication (2003)
Ahmadian, Z., Salimi, S., Salahi, A.: Security Enhancement against UMTS-GSM Internetworking Attacks. Elsevier Computer Network Journal 54, 2256–2270 (2010)
Xenakis, C., Merakos, L.: Security in third Generation Mobile Network. Elsevier Computer Communication Journal 27, 638–650 (2004)
Vriendt, J.D., Laine, P., Lerouge, C., Xu, X.: Alcatel: Mobile Network Evolution: A Revolution on the Move. IEEE Communication Magazine, 104–111 (April 2002)
Prasad, A., Wang, H., Schoo, P.: Infrastructure Security for Future Mobile Communication System. In: WPMC 2003, Yokosuka, Japan (2003)
Peng, X., Wen, Y., Zhao, H.: Security Issues and Solutions in 3G Core Net-work. Journal of Networks 6(5), 823–830 (2011)
Dimitriadis, C.K.: Improving Mobile Core Network Security with Honeynets. IEEE Security & Privacy 5(4), 40–47 (2007)
Xenakis, C.: Security Measures and Weaknesses of the GPRS Security Architecture. International Journal of Network Security 6(2), 158–169 (2008)
Bilogrevic, I., Jadliwala, M., Hubaux, J.-P.: Security Issues in Next Generation Mobile Networks: LTE and Femtocells. In: 2nd International Femtocell Workshop, Luton, UK (2010)
Astely, D., Dahlman, E., Furuskar, A., Jading, Y., Lindstrom, M., Parkvall, S.: LTE: The Evolution of Mobile Broadband. IEEE Communications Magazine 47(4), 44–51 (2009)
Ricciatoa, F., Colucciaa, A., D’Alconzo, A.: A Review of DoS Attack Models for 3G Cellular Networks from a System-design Perspective. Elsevier Computer Communications Journal 33, 551–558 (2010)
Meyer, U., Wetzel, S.: A Man-in-the-Middle Attack on UMTS. In: Proceedings of the 3rd ACM Workshop on Wireless Security (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Khera, V., Fung, C.C., Chaisiri, S. (2013). A Review of Security Risks in the Mobile Telecommunication Packet Core Network. In: Papasratorn, B., Charoenkitkarn, N., Vanijja, V., Chongsuphajaisiddhi, V. (eds) Advances in Information Technology. IAIT 2013. Communications in Computer and Information Science, vol 409. Springer, Cham. https://doi.org/10.1007/978-3-319-03783-7_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-03783-7_9
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-03782-0
Online ISBN: 978-3-319-03783-7
eBook Packages: Computer ScienceComputer Science (R0)