DocumentCode
2665495
Title
Security Techniques for Beyond 3G Wireless Mobile Networks
Author
Tupakula, Udaya ; Varadharajan, Vijay ; Vuppala, Sunil Kumar
Author_Institution
Res. Fac., Macquarie Univ., Sydney, NSW, Australia
fYear
2011
fDate
24-26 Oct. 2011
Firstpage
136
Lastpage
143
Abstract
Significant developments in the recent times have led to an increasing use of mobile devices such as smart phones in accessing Internet services and applications over wireless networks. In this paper, we propose a security architecture for counteracting denial of service attacks in Beyond 3G (B3G) network architecture with mobile nodes. We describe the system architecture and discuss the different cases of attack scenarios involving the mobility of the attacking and victim nodes. Our proposed solution takes into account practical issues such as limited resources of the mobile nodes. It has distinct advantages such as monitoring of the traffic to the victim node and the attack traffic being dropped before reaching the victim, the ability to trace back the attacking node and prevent the attack at the home agent or foreign agent that is closer to the attacking node, and the ability to deal with dynamic changes in attack traffic patterns. We also present an analysis of our proposed architecture as well as simulation results.
Keywords
3G mobile communication; mobile handsets; telecommunication security; telecommunication traffic; 3G wireless mobile networks; Internet services; mobile devices; mobile nodes; security techniques; smart phones; Authentication; FAA; IP networks; Mobile communication; Mobile computing; Tunneling; B3G; DDoS; Denial of Service; intrusion detection;
fLanguage
English
Publisher
ieee
Conference_Titel
Embedded and Ubiquitous Computing (EUC), 2011 IFIP 9th International Conference on
Conference_Location
Melbourne, VIC
Print_ISBN
978-1-4577-1822-9
Type
conf
DOI
10.1109/EUC.2011.64
Filename
6104518
Link To Document