Recent communications environment significantly
expands the mobile environment. The popularization of smartphones
with various mobile services has emerged, and smartphone users are
rapidly increasing. Because of these symptoms, existing wired
environment in a variety of mobile traffic entering to mobile network
has threatened the stability of the mobile network. Unlike traditional
wired infrastructure, mobile networks has limited radio resources and
signaling procedures for complex radio resource management. So
these traffic is not a problem in wired networks but mobile networks, it
can be a threat. In this paper, we analyze the security threats in mobile
networks and provide direction to solve it.
[1] F. Ricciato, E. Hasenleithner, P. Svoboda, W. Fleischer, "On the impact
of unwanted traffic onto a 3G network," in Proc. Security, Privacy and
Trust in Pervasive and Ubiquitous Computing(SecPerU), June, 2006.
[2] H. Holma, A. Toskala, WCDMA for UMTS - Radio Access for Third
Generation Mobile Communications 3rd. Willey, pp.95-96, 2004..
[3] 3GPP, "GPRS Tunnelling Protocol (GTP) across the Gn and Gp interface
(Release 10)," TS 29.060 V10.2.0, June, 2011.
[4] S. Jeremy, Z. Hui, B. Jean C, "Impact of paging channel overloads or
attacks on a cellular network," in Proc. WiSe '06 Proceedings of the 5th
ACM workshop on Wireless security, New York, Sept, 2006.
[5] DARWIN project. http://www.ftw.at/ftw/research/projects.
[6] F. Ricciato, "Traffic monitoring and analysis for the optimization of a 3G
network," IEEE Wireless Comm. vol. 13, pp. 42-49, Dec, 2006.
[7] F. Ricciato, E. Hasenleithner, P. Romirer-Maierhofer, "Traffic Analysis
at Short Time-Scales An Empirical Case Study From a 3G Cellular
Network," IEEE Trans. Network and Service Management, vol. 5, .No. 1,
pp. 11-21, March, 2008.
[8] V. Falletta, F Ricciato, F. T. Wien "Detecting Scanners: Empirical
Assessment on a 3G Network," International Journal of Network
Security, Vol.9, No.2, pp.143-155, Sept, 2009.
[1] F. Ricciato, E. Hasenleithner, P. Svoboda, W. Fleischer, "On the impact
of unwanted traffic onto a 3G network," in Proc. Security, Privacy and
Trust in Pervasive and Ubiquitous Computing(SecPerU), June, 2006.
[2] H. Holma, A. Toskala, WCDMA for UMTS - Radio Access for Third
Generation Mobile Communications 3rd. Willey, pp.95-96, 2004..
[3] 3GPP, "GPRS Tunnelling Protocol (GTP) across the Gn and Gp interface
(Release 10)," TS 29.060 V10.2.0, June, 2011.
[4] S. Jeremy, Z. Hui, B. Jean C, "Impact of paging channel overloads or
attacks on a cellular network," in Proc. WiSe '06 Proceedings of the 5th
ACM workshop on Wireless security, New York, Sept, 2006.
[5] DARWIN project. http://www.ftw.at/ftw/research/projects.
[6] F. Ricciato, "Traffic monitoring and analysis for the optimization of a 3G
network," IEEE Wireless Comm. vol. 13, pp. 42-49, Dec, 2006.
[7] F. Ricciato, E. Hasenleithner, P. Romirer-Maierhofer, "Traffic Analysis
at Short Time-Scales An Empirical Case Study From a 3G Cellular
Network," IEEE Trans. Network and Service Management, vol. 5, .No. 1,
pp. 11-21, March, 2008.
[8] V. Falletta, F Ricciato, F. T. Wien "Detecting Scanners: Empirical
Assessment on a 3G Network," International Journal of Network
Security, Vol.9, No.2, pp.143-155, Sept, 2009.
@article{"International Journal of Electrical, Electronic and Communication Sciences:62054", author = "Dongwan Kang and Joohyung Oh and Chaetae Im", title = "Security Threat and Countermeasure on 3G Network", abstract = "Recent communications environment significantly
expands the mobile environment. The popularization of smartphones
with various mobile services has emerged, and smartphone users are
rapidly increasing. Because of these symptoms, existing wired
environment in a variety of mobile traffic entering to mobile network
has threatened the stability of the mobile network. Unlike traditional
wired infrastructure, mobile networks has limited radio resources and
signaling procedures for complex radio resource management. So
these traffic is not a problem in wired networks but mobile networks, it
can be a threat. In this paper, we analyze the security threats in mobile
networks and provide direction to solve it.", keywords = "3G, Core Network Security, GTP, Mobile NetworkSecurity", volume = "5", number = "11", pages = "1572-4", }