Security techniques for beyond 3G wireless mobile networks

Udaya Tupakula*, Vijay Varadharajan, Sunil Kumar Vuppala

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

6 Citations (Scopus)

Abstract

Significant developments in the recent times have led to an increasing use of mobile devices such as smart phones in accessing Internet services and applications over wireless networks. In this paper, we propose a security architecture for counteracting denial of service attacks in Beyond 3G (B3G) network architecture with mobile nodes. We describe the system architecture and discuss the different cases of attack scenarios involving the mobility of the attacking and victim nodes. Our proposed solution takes into account practical issues such as limited resources of the mobile nodes. It has distinct advantages such as monitoring of the traffic to the victim node and the attack traffic being dropped before reaching the victim; the ability to traceback the attacking node and prevent the attack at the home agent or foreign agent that is closer to the attacking node; and the ability to deal with dynamic changes in attack traffic patterns. We also present an analysis of our proposed architecture as well as simulation results.

Original languageEnglish
Title of host publicationProceedings - 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing, EUC 2011
Place of PublicationLos Alamitos, Calif.
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages136-143
Number of pages8
ISBN (Print)9780769545523
DOIs
Publication statusPublished - 2011
Event2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing, EUC 2011 - Melbourne, VIC, Australia
Duration: 24 Oct 201126 Oct 2011

Other

Other2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing, EUC 2011
Country/TerritoryAustralia
CityMelbourne, VIC
Period24/10/1126/10/11

Fingerprint

Dive into the research topics of 'Security techniques for beyond 3G wireless mobile networks'. Together they form a unique fingerprint.

Cite this