12 research outputs found

    Storms in mobile networks

    Get PDF
    Mobile networks are vulnerable to signalling attacks and storms caused by traffic that overloads the control plane through excessive signalling, which can be introduced via malware and mobile botnets. With the advent of machine-to-machine (M2M) communications over mobile networks, the potential for signalling storms increases due to the normally periodic nature of M2M traffic and the sheer number of communicating nodes. Several mobile network operators have also experienced signalling storms due to poorly designed applications that result in service outage. The radio resource control (RRC) protocol is particularly susceptible to such attacks, motivating this work within the EU FP7 NEMESYS project which presents simulations that clarify the temporal dynamics of user behavior and signalling, allowing us to suggest how such attacks can be detected and mitigated

    Detection and mitigation of signaling storms in mobile networks

    Get PDF
    Mobile Networks are subject to "signaling storms" launched by malware or apps, which overload the the bandwidth at the cell, the backbone signaling servers, and Cloud servers, and may also deplete the battery power of mobile devices. This paper reviews the subject and discusses a novel technique to detect and mitigate such signaling storms. Through a mathematical analysis we introduce a technique based on tracking time-out transitions in the signaling system that can substantially reduce both the number of misbehaving mobiles and the signaling overload in the backbone

    Supporting QoS traffic at the network layer in multi-hop wireless mobile networks

    Get PDF
    Supporting real-time and quality-of-service (QoS) traffic in multi-hop wireless mobile networks is challenging due to the high level of dynamism involved. In this paper, we propose a network layer solution in the form of a hybrid routing protocol to enable QoS traffic support in this class of networks. Our proposed protocol combines link state topology updates, source routing and on demand link cost dissemination to concurrently support multiple classes of QoS and normal flows. Our protocol provides for QoS traffic by intelligent path selection at the source nodes based on the required QoS parameters/levels and dynamically adapting the paths as network topology and conditions change. This solution does not require any other layers/components in the network stack to be QoS-aware and is therefore readily deployable over existing networks. We present experimental results from a simulation study on the performance of our protocol. Our results show that the proposed solution can provide efficient QoS traffic support in small-to-medium sized mobile networks, where up to 90% improvement in QoS metrics are observed in certain experiments. © 2011 IEEE

    Security for smart mobile networks: The NEMESYS approach

    Get PDF
    The growing popularity of smart mobile devices such as smartphones and tablets has made them an attractive target for cyber-criminals, resulting in a rapidly growing and evolving mobile threat as attackers experiment with new business models by targeting mobile users. With the emergence of the first large-scale mobile botnets, the core network has also become vulnerable to distributed denial-of-service attacks such as the signaling attack. Furthermore, complementary access methods such as Wi-Fi and femtocells introduce additional vulnerabilities for the mobile users as well as the core network. In this paper, we present the NEMESYS approach to smart mobile network security, to develop novel security technologies for seamless service provisioning in the smart mobile ecosystem, and to improve mobile network security through a better understanding of the threat landscape

    Modeling and analysis of RRC-based signalling storms in 3G networks

    No full text
    Mobile networks are vulnerable to signaling attacks and storms that are caused by traffic patterns that overload the control plane, and differ from distributed denial of service attacks in the Internet since they directly affect the control plane, and also reserve wireless bandwidth and network resources without actually using them. Such storms can result from malware and mobile botnets, as well as from poorly designed applications, and can cause service outages in 3G and 4G networks, which have been experienced by mobile operators. Since the radio resource control (RRC) protocol in the 3G and 4G networks is particularly susceptible to such storms, we analyze their effect with a mathematical model that helps to predict the congestion that is caused by a storm. A detailed simulation model of a mobile network is used to better understand the temporal dynamics of user behavior and signaling in the network and to show how RRC-based signaling attacks and storms cause significant problems in both the control and user planes of the network. Our analysis also serves to identify how storms can be detected, and to propose how system parameters can be chosen to mitigate their effect

    Resilient Emergency Evacuation Using Opportunistic Communications

    No full text
    Abstract We describe an emergency evacuation support system (ESS) that employs short-range wireless communications among mobile devices carried by civilians. Emergency information is disseminated via opportunistic contacts between communication nodes (CNs), and each CN provides adaptive step-by-step navigation directions for its user during evacuation. Using mobile devices and opportunistic communications (oppcomms) allow ESS to operate when other means of communication are destroyed or overloaded. In this paper, we evaluate the resilience of oppcomms as used to enable evacuation support in ESS; we specifically consider the effect of CN failures on evacuation and communication performance. Our simulation experiments of evacuation of a three-floor office building show that ESS is highly resilient to node failures, and failure ratios up to 20 % are well-tolerated.

    The Emergency Direct Mobile App: Safety Message Dissemination over a Multi-Group Network of Smartphones using Wi-Fi Direct

    No full text
    Nowadays, the Wi-Fi Direct technology is supported by most of smartphones on the market, and provides a viable solution to guarantee opportunistic communication among group of devices in a 1-hop range. However, the current specifications of the standard do not support the inter-group communication, which constitutes a key requirement for content-delivery applications like the public safety ones. In this paper, we provide an in-depth analysis of the utilization of the Wi-Fi Direct technology for safety message dissemination over emergency and post-disaster scenarios. Three main contributions are provided. First, we show the experimental results of the Wi-Fi Direct technology on a test-bed composed of multiple heterogeneous smartphones, and we analyze the main factors affecting the system performance, like the network setup overhead, the communication range and the network throughput. Second, we investigate how to create multi-group Peer-to-Peer (P2P) networks by leveraging on the presence of P2P relay devices, which are in charge of offloading the data among different P2P groups, although being connected to only one P2P group at a time. An analytical model is proposed in order to derive the optimal group switching time which provides the best trade-off between the multihop delay and the delivery rate, by taking into account the buffer size of the P2P Group Owners (GO) devices. Finally, we describe the implementation of the network formation algorithm within the Emergency Direct mobile application, which allows the multi-hop dissemination of instantaneous and geo-localized alert messages among the smartphones located in the scenario of the emergency
    corecore