Figure 1 - uploaded by Qiang Cheng
Content may be subject to copyright.
UMTS 3G Network [13] 

UMTS 3G Network [13] 

Source publication
Article
Full-text available
A wireless network is more vulnerable to denial of service (DoS) attacks than a wired one. In this paper we propose a new DoS defense scheme toward actively resisting DoS attacks. A mobile terminal generates an authorized anonymous ID (AAI) using its true ID, and assigns its true ID with the produced AAI. Using an AAI, a legitimate mobile terminal...

Contexts in source publication

Context 1
... works in a frequency division duplex (FDD) mode, and uplink and downlink transmissions use different frequency bands with a transmission rate of 384 kbps [12] in a wide coverage area. Figure 1 shows a typical UMTS 3G network. Basically, it is comprised of three parts: User Equipment (UE), the UMTS Terrestrial Radio Access Network (UTRAN), and the Core Network (CN). ...
Context 2
... shows that the packet delivery delay of wireless_sensor_1 will decrease to less than 1 second in the situation of DoS attack if wireless_sensor_1 use the AAI method we proposed. Figure 10 shows the comparison of throughput in the three scenarios. We can see that the throughput of wireless_sensor_1 in scenario 1 is almost the same as in scenario 3. ...
Context 3
... malicious user launches the same DoS attack in all three scenarios. Figure 11 shows the comparison of average packets delivery delay. The number of MTs will affect the efficiency of our AAI method. ...
Context 4
... when the number of MTs increases, the average backoff slots [14] of wireless_sensor_1 also increase, which may affect the performance of wireless_sensor_1. Figure 12 shows the comparison of average backoff slots. ...

Similar publications

Article
Full-text available
Along with the development of WLAN (Wireless Local Area Network) network technology, many services that used cable networks began to migrate to wireless networks. VoIP (Voice over Internet Protocol) is one service implemented in wireless local area networks. However, VoIP that uses wireless technology as a data stream media Video Call service has a...

Citations

... This makes it very difficult for an attacker to unleash a large scale attack and cause overloading of the servers by acting as a legitimate user of the network. The authors in [24] consider a hybrid UMTS/WLAN network architecture and propose a generic protection scheme to resist DoS attacks by utilizing the Authorized Anonymous ID (AAI) method. ...
Article
The Universal Mobile Telecommunication Standard (UMTS) is continuously evolving to meet the growing demand of modern mobile and Internet applications for high capacity and advanced features in security and quality of service. Although admittedly enhanced in terms of security when compared to 2G systems, UMTS still has weaknesses that can lead to security incidents. In this paper, we investigate the vulnerabilities of the UMTS security architecture that can be exploited by a malicious individual to mount Denial of Service (DoS) attacks. Our focus is on signaling-oriented attacks above the physical layer. We describe and analyze several novel attacks that can be triggered against both core UMTS architecture as well as hybrid UMTS/WLAN realms. An additional contribution of this paper is the presentation of an extensive survey of similar attacks in UMTS and related protocol infrastructures such as IP Multimedia Subsystem (IMS). Finally, we offer some suggestions that would provide greater tolerance to the system against DoS attacks.