Survey on Threats and Attacks on Mobile Networks
Autor: | Georges Kaddoum, Silvere Mavoungou, Mostafa Taha, Georges Matar |
---|---|
Rok vydání: | 2016 |
Předmět: |
General Computer Science
Network security Computer science Mobile computing Core network 02 engineering and technology Computer security computer.software_genre availability attacks 0202 electrical engineering electronic engineering information engineering General Materials Science Mobile technology Mobile network security Wi-Fi Protected Setup Network architecture Access network Wireless network business.industry Network packet General Engineering confidentiality attacks 020206 networking & telecommunications impersonation attacks integrity attacks Network Access Control Cellular network authentication attacks 020201 artificial intelligence & image processing lcsh:Electrical engineering. Electronics. Nuclear engineering Mobile telephony business lcsh:TK1-9971 computer Computer network |
Zdroj: | IEEE Access, Vol 4, Pp 4543-4572 (2016) |
ISSN: | 2169-3536 |
DOI: | 10.1109/access.2016.2601009 |
Popis: | Since the 1G of mobile technology, mobile wireless communication systems have continued to evolve, bringing into the network architecture new interfaces and protocols, as well as unified services, high data capacity of data transmission, and packet-based transmission (4G). This evolution has also introduced new vulnerabilities and threats, which can be used to launch attacks on different network components, such as the access network and the core network. These drawbacks stand as a major concern for the security and the performance of mobile networks, since various types of attacks can take down the whole network and cause a denial of service, or perform malicious activities. In this survey, we review the main security issues in the access and core network (vulnerabilities and threats) and provide a classification and categorization of attacks in mobile network. In addition, we analyze major attacks on 4G mobile networks and corresponding countermeasures and current mitigation solutions, discuss limits of current solutions, and highlight open research areas. |
Databáze: | OpenAIRE |
Externí odkaz: |