Open AccessThis article is
- freely available
Practical Attacks on Mobile Cellular Networks and Possible Countermeasures
Department of Computer Engineering, Bahçeşehir University, Çırağan Caddesi, No: 4, Beşiktaş 34353, İstanbul, Turkey
* Author to whom correspondence should be addressed.
Received: 29 July 2013; in revised form: 11 September 2013 / Accepted: 11 September 2013 / Published: 30 September 2013
Abstract: Due to widespread adoption of mobile communications devices and increasingly high throughput capacity of cellular networks, Third-Generation (3G) and Long Term Evolution (LTE) are becoming ever more popular. Millions of smart phones with 3G capabilities are sold every year and used for mostly browsing the Internet. Hence, mobile operators have been heavily investing in their packet switched networks to meet customer demand and stay ahead in the market. The widespread use of broadband mobile Internet bring along also some IP based threats such as the Denial of Service (DoS) attacks, botnets and malwares. In this paper, we performed DoS and flooding attacks on 3G mobile networks and measured their effect on the most critical elements of a network such as the Radio Network Controller (RNC) and the Serving GPRS Support Node (SGSN) devices. We carried out our experiments on a real mobile network, not just a simulation environment, and hence our findings depict a realistic picture of the vulnerabilities existent in 3G mobile networks. We propose alternative solutions to avoid these vulnerabilities and mitigate the issues raised.
Keywords: mobile networks; 3G; security; DoS; denial of service attack; paging
Citations to this Article
Cite This Article
MDPI and ACS Style
Oğul, M.; Baktır, S. Practical Attacks on Mobile Cellular Networks and Possible Countermeasures. Future Internet 2013, 5, 474-489.
Oğul M, Baktır S. Practical Attacks on Mobile Cellular Networks and Possible Countermeasures. Future Internet. 2013; 5(4):474-489.
Oğul, Murat; Baktır, Selçuk. 2013. "Practical Attacks on Mobile Cellular Networks and Possible Countermeasures." Future Internet 5, no. 4: 474-489.