Skip to main content

Mitigating for Signalling Attacks in UMTS Networks

  • Conference paper
  • First Online:

Abstract

The setup of connections in mobile UMTS network will trigger signalling messages between the mobile and the core network. Malicious mobile phone or defective applications can therefore trigger Signalling Attacks which result in excessive wireless bandwidth utilisation and workload for the control plane and core network. We overview the cause of these attacks and identify the parameters which play a role.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. P. Marck, IAB—Focus on mobile (2013), http://www.iab-community.be/iab-belgium-whitepaper-focus-on-mobile-jan-2013/

  2. Rethink Wireless: DoCoMo demands Google’s help with signalling storm (2012), http://www.rethink-wireless.com/2012/01/30/docomo-demands-googles-signalling-storm.htm

  3. E. Gelenbe, F.J. Wu, Comput. Math. Appl. 64(12), 3869 (2012)

    Article  Google Scholar 

  4. E. Gelenbe, G. Görbil, D. Tzovaras, S. Liebergeld, D. Garcia, M. Baltatu, G.L. Lyberopoulos, in ISCIS. Lecture Notes in Electrical Engineering, vol. 264, ed. by E. Gelenbe, R. Lent (Springer, 2013), Lecture Notes in Electrical Engineering, vol. 264, pp. 369–378

    Google Scholar 

  5. Y. Cao, E. Gelenbe, in Proceedings of the SPIE 3079, Detection and Remediation Technologies for Mines and Minelike Targets II, p. 691, (1997). doi:10.1117/12.280898

  6. E. Gelenbe, N. Schmajuk, J. Staddon, J. Reif, Robot. Auton. Syst. 22(1), 23 (1997)

    Article  Google Scholar 

  7. C.M. Yu, G.K. Ni, I.Y. Chen, E. Gelenbe, S.Y. Kuo, IEEE Trans. Inf. Forensics Secur. 9(1), 109 (2014)

    Article  Google Scholar 

  8. E. Gelenbe, G. Gorbil, D. Tzovaras, S. Liebergeld, D. Garcia, M. Baltatu, G. Lyberopoulos, in Proceedings of the 2013 IEEE Global High Tech Congress on Electronics (GHTCE’13) (2013)

    Google Scholar 

  9. E. Gelenbe, G. Loukas, Comput. Netw. 51(5), 1299 (2007), http://dblp.uni-trier.de/db/journals/cn/cn51.html #GelenbeL07

  10. G. Kambourakis, C. Kolias, S. Gritzalis, J.H. Park, Comput. Commun. 34(3), 226 (2011). doi:10.1016/j.comcom.2010.02.010, http://dx.doi.org/10.1016/j.comcom.2010.02.010

  11. O.H. Abdelrahman, E. Gelenbe, in IEEE International Conference on Communications (ICC’14), Communication and Information Systems Security Symposium (Sydney, Australia, 2014). Accepted for publication

    Google Scholar 

  12. H. Wang, D. Zhang, K. Shin, IEEE Trans. Dependable Secure Comput. 1(4), 193 (2004). doi:10.1109/TDSC.2004.34

    Article  Google Scholar 

  13. P. Lee, T. Bu, T. Woo, in INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, pp. 1289–1297, (2007). doi:10.1109/INFCOM.2007.153

  14. Z. Wu, X. Zhou, F. Yang, in 2010 International Conference on Educational and Information Technology (ICEIT), vol. 1, pp. V1–504-V1-508, (2010). doi:10.1109/ICEIT.2010.5607650

  15. Y. Choi, Ch. Yoon, Ys Kim, S. Heo, J. Silvester, IEEE Commun. Mag. 52(1), 166 (2014). doi:10.1109/MCOM.2014.6710079

    Article  Google Scholar 

  16. M. Gupta, S. Jha, A. Koc, R. Vannithamby, IEEE Commun. Mag. 51(2), 90 (2013). doi:10.1109/MCOM.2013.6461191

    Article  Google Scholar 

  17. F. Ricciato, A. Coluccia, A. DAlconzo, Comput. Commun. 33(5), 551 (2010), http://dx.doi.org/10.1016/j.comcom.2009.11.015, http://www.sciencedirect.com/science/article/pii/S0140366409003168

  18. 3GPP: UTRAN functions, examples on signaling procedures (Release 1999) (June 2002). TR 25.931 v3.7.0

    Google Scholar 

  19. J. Korhonen, Introduction to 3G Mobile Communications (Artech House Inc, Norwood, 2001)

    Google Scholar 

  20. E. Gelenbe, Acta Inf. 12, 285 (1979)

    Article  MathSciNet  Google Scholar 

  21. A. Filippoupolitis, E. Gelenbe, in 2nd Conference on Human System Interactions, 2009. HSI’09, pp. 323–330, (2009)

    Google Scholar 

  22. N. Dimakis, A. Filippoupolitis, E. Gelenbe, Comput. J. 53(9), 1384 (2010)

    Article  Google Scholar 

  23. G. Görbil, E. Gelenbe, in PerCom Workshops, pp. 540–546, (IEEE, 2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mihajlo Pavloski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Pavloski, M., Gelenbe, E. (2014). Mitigating for Signalling Attacks in UMTS Networks. In: Czachórski, T., Gelenbe, E., Lent, R. (eds) Information Sciences and Systems 2014. Springer, Cham. https://doi.org/10.1007/978-3-319-09465-6_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09465-6_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09464-9

  • Online ISBN: 978-3-319-09465-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics