Abstract
The setup of connections in mobile UMTS network will trigger signalling messages between the mobile and the core network. Malicious mobile phone or defective applications can therefore trigger Signalling Attacks which result in excessive wireless bandwidth utilisation and workload for the control plane and core network. We overview the cause of these attacks and identify the parameters which play a role.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
P. Marck, IAB—Focus on mobile (2013), http://www.iab-community.be/iab-belgium-whitepaper-focus-on-mobile-jan-2013/
Rethink Wireless: DoCoMo demands Google’s help with signalling storm (2012), http://www.rethink-wireless.com/2012/01/30/docomo-demands-googles-signalling-storm.htm
E. Gelenbe, F.J. Wu, Comput. Math. Appl. 64(12), 3869 (2012)
E. Gelenbe, G. Görbil, D. Tzovaras, S. Liebergeld, D. Garcia, M. Baltatu, G.L. Lyberopoulos, in ISCIS. Lecture Notes in Electrical Engineering, vol. 264, ed. by E. Gelenbe, R. Lent (Springer, 2013), Lecture Notes in Electrical Engineering, vol. 264, pp. 369–378
Y. Cao, E. Gelenbe, in Proceedings of the SPIE 3079, Detection and Remediation Technologies for Mines and Minelike Targets II, p. 691, (1997). doi:10.1117/12.280898
E. Gelenbe, N. Schmajuk, J. Staddon, J. Reif, Robot. Auton. Syst. 22(1), 23 (1997)
C.M. Yu, G.K. Ni, I.Y. Chen, E. Gelenbe, S.Y. Kuo, IEEE Trans. Inf. Forensics Secur. 9(1), 109 (2014)
E. Gelenbe, G. Gorbil, D. Tzovaras, S. Liebergeld, D. Garcia, M. Baltatu, G. Lyberopoulos, in Proceedings of the 2013 IEEE Global High Tech Congress on Electronics (GHTCE’13) (2013)
E. Gelenbe, G. Loukas, Comput. Netw. 51(5), 1299 (2007), http://dblp.uni-trier.de/db/journals/cn/cn51.html #GelenbeL07
G. Kambourakis, C. Kolias, S. Gritzalis, J.H. Park, Comput. Commun. 34(3), 226 (2011). doi:10.1016/j.comcom.2010.02.010, http://dx.doi.org/10.1016/j.comcom.2010.02.010
O.H. Abdelrahman, E. Gelenbe, in IEEE International Conference on Communications (ICC’14), Communication and Information Systems Security Symposium (Sydney, Australia, 2014). Accepted for publication
H. Wang, D. Zhang, K. Shin, IEEE Trans. Dependable Secure Comput. 1(4), 193 (2004). doi:10.1109/TDSC.2004.34
P. Lee, T. Bu, T. Woo, in INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, pp. 1289–1297, (2007). doi:10.1109/INFCOM.2007.153
Z. Wu, X. Zhou, F. Yang, in 2010 International Conference on Educational and Information Technology (ICEIT), vol. 1, pp. V1–504-V1-508, (2010). doi:10.1109/ICEIT.2010.5607650
Y. Choi, Ch. Yoon, Ys Kim, S. Heo, J. Silvester, IEEE Commun. Mag. 52(1), 166 (2014). doi:10.1109/MCOM.2014.6710079
M. Gupta, S. Jha, A. Koc, R. Vannithamby, IEEE Commun. Mag. 51(2), 90 (2013). doi:10.1109/MCOM.2013.6461191
F. Ricciato, A. Coluccia, A. DAlconzo, Comput. Commun. 33(5), 551 (2010), http://dx.doi.org/10.1016/j.comcom.2009.11.015, http://www.sciencedirect.com/science/article/pii/S0140366409003168
3GPP: UTRAN functions, examples on signaling procedures (Release 1999) (June 2002). TR 25.931 v3.7.0
J. Korhonen, Introduction to 3G Mobile Communications (Artech House Inc, Norwood, 2001)
E. Gelenbe, Acta Inf. 12, 285 (1979)
A. Filippoupolitis, E. Gelenbe, in 2nd Conference on Human System Interactions, 2009. HSI’09, pp. 323–330, (2009)
N. Dimakis, A. Filippoupolitis, E. Gelenbe, Comput. J. 53(9), 1384 (2010)
G. Görbil, E. Gelenbe, in PerCom Workshops, pp. 540–546, (IEEE, 2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Pavloski, M., Gelenbe, E. (2014). Mitigating for Signalling Attacks in UMTS Networks. In: Czachórski, T., Gelenbe, E., Lent, R. (eds) Information Sciences and Systems 2014. Springer, Cham. https://doi.org/10.1007/978-3-319-09465-6_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-09465-6_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09464-9
Online ISBN: 978-3-319-09465-6
eBook Packages: Computer ScienceComputer Science (R0)