Journal
IEEE ACCESS
Volume 4, Issue -, Pages 4543-4572Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2016.2601009
Keywords
Mobile network security; availability attacks; confidentiality attacks; integrity attacks; authentication attacks; impersonation attacks; trusted Computing; Intrusion Detection; signaling attacks; spoofing attacks; flooding attacks
Categories
Funding
- ETS' Research Chair of Physical Layer Security in Wireless Networks
Ask authors/readers for more resources
Since the 1G of mobile technology, mobile wireless communication systems have continued to evolve, bringing into the network architecture new interfaces and protocols, as well as unified services, high data capacity of data transmission, and packet-based transmission (4G). This evolution has also introduced new vulnerabilities and threats, which can be used to launch attacks on different network components, such as the access network and the core network. These drawbacks stand as a major concern for the security and the performance of mobile networks, since various types of attacks can take down the whole network and cause a denial of service, or perform malicious activities. In this survey, we review the main security issues in the access and core network (vulnerabilities and threats) and provide a classification and categorization of attacks in mobile network. In addition, we analyze major attacks on 4G mobile networks and corresponding countermeasures and current mitigation solutions, discuss limits of current solutions, and highlight open research areas.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available