Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
A framework for classifying denial of service attacks
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
A man-in-the-middle attack on UMTS
Proceedings of the 3rd ACM workshop on Wireless security
Characteristics of internet background radiation
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Exploiting open functionality in SMS-capable cellular networks
Proceedings of the 12th ACM conference on Computer and communications security
Unwanted traffic in 3G networks
ACM SIGCOMM Computer Communication Review
HSDPA/HSUPA for UMTS: High Speed Radio Access for Mobile Communications
HSDPA/HSUPA for UMTS: High Speed Radio Access for Mobile Communications
Impact of paging channel overloads or attacks on a cellular network
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Mining call and mobility data to improve paging efficiency in cellular networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
On attack causality in internet-connected cellular networks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
A measurement study of scheduler-based attacks in 3G wireless networks
PAM'07 Proceedings of the 8th international conference on Passive and active network measurement
A taxonomy of cyber attacks on 3g networks
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Traffic analysis at short time-scales: an empirical case study from a 3G cellular network
IEEE Transactions on Network and Service Management
Taxonomies of attacks and vulnerabilities in computer systems
IEEE Communications Surveys & Tutorials
Security in third Generation Mobile Networks
Computer Communications
Distribution-based anomaly detection in 3G mobile networks: from theory to practice
International Journal of Network Management
Signaling oriented denial of service on LTE networks
Proceedings of the 10th ACM international symposium on Mobility management and wireless access
A DCH starvation DoS attack in UMTS
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Preempting state promotions to improve application performance in mobilebroadband networks
Proceedings of the eighth ACM international workshop on Mobility in the evolving internet architecture
Computer Networks: The International Journal of Computer and Telecommunications Networking
A methodological overview on anomaly detection
DataTraffic Monitoring and Analysis
Unveiling the hidden dangers of public IP addresses in 4G/LTE cellular data networks
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications
Hi-index | 0.24 |
Third-generation cellular networks are exposed to novel forms of denial-of-service attacks that only recently have started to be recognized and documented by the scientific community. In this contribution, we review some recently published attack models specific for cellular networks. We review them collectively in order to identify the main system-design aspects that are ultimately responsible for the exposure to the attack. The goal of this contribution is to build awareness about the intrinsic weaknesses of 3G networks from a system-design perspective. In doing that we hope to inform the design practice of future generation networks, motivating the adoption of randomization, adaptation and prioritization as central ingredients of robust system design.