DocumentCode :
2665495
Title :
Security Techniques for Beyond 3G Wireless Mobile Networks
Author :
Tupakula, Udaya ; Varadharajan, Vijay ; Vuppala, Sunil Kumar
Author_Institution :
Res. Fac., Macquarie Univ., Sydney, NSW, Australia
fYear :
2011
fDate :
24-26 Oct. 2011
Firstpage :
136
Lastpage :
143
Abstract :
Significant developments in the recent times have led to an increasing use of mobile devices such as smart phones in accessing Internet services and applications over wireless networks. In this paper, we propose a security architecture for counteracting denial of service attacks in Beyond 3G (B3G) network architecture with mobile nodes. We describe the system architecture and discuss the different cases of attack scenarios involving the mobility of the attacking and victim nodes. Our proposed solution takes into account practical issues such as limited resources of the mobile nodes. It has distinct advantages such as monitoring of the traffic to the victim node and the attack traffic being dropped before reaching the victim, the ability to trace back the attacking node and prevent the attack at the home agent or foreign agent that is closer to the attacking node, and the ability to deal with dynamic changes in attack traffic patterns. We also present an analysis of our proposed architecture as well as simulation results.
Keywords :
3G mobile communication; mobile handsets; telecommunication security; telecommunication traffic; 3G wireless mobile networks; Internet services; mobile devices; mobile nodes; security techniques; smart phones; Authentication; FAA; IP networks; Mobile communication; Mobile computing; Tunneling; B3G; DDoS; Denial of Service; intrusion detection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Embedded and Ubiquitous Computing (EUC), 2011 IFIP 9th International Conference on
Conference_Location :
Melbourne, VIC
Print_ISBN :
978-1-4577-1822-9
Type :
conf
DOI :
10.1109/EUC.2011.64
Filename :
6104518
Link To Document :
بازگشت