PROTOCOL ANALYSIS TO PREVENT STORM ATTACKS IN 3G MOBILE NETWORKS
Journal: International Journal for Scientific Research and Development | IJSRD (Vol.3, No. 10)Publication Date: 2016-01-01
Authors : B.RADHIKA; V.VETRISELVI; J.SENGOTTUVELU;
Page : 90-92
Keywords : 3G Storm Attacks; Mobile Computing; Signal Storms;
Abstract
The advent of mobile smart phones has led to a surge in numerous applications with a lot of network traffic. This in turn leads to signal storm attacks from malicious users, who disrupt the system by creating signaling storms. Malware attacks are quickly becoming a major security concern due to the advent of smart mobile devices and the increasing capacity and use of mobile networks for Internet access. The increasing number of host mobile malware adds to the problem. The infected devices cause a cascading effect creating signaling and network disruptions both deliberately and also due to malicious attacks. A signaling storm is one where the users are denied service by making huge attacks on the resources of the system either directly or indirectly taking control of other nodes in the network and sending huge amounts of request signals. This causes flooding, identity problems, injection attacks etc. The purpose is to detect such signaling storms in the first place. Next using the proposed hybrid Radio Resource protocol such attacks should be blocked and the malicious node should be removed from the network. The revocation will show sufficient congestion relief in the network traffic.
Other Latest Articles
- Portable ECG Monitoring System using Lilypad And Mobile Platform-PandaBoard
- State-of-the-art review of FRP strengthened RC slabs
- Efficient Channel Assignment Schemes In 802.11 WLAN
- Application of Hydrogen as Fuel Supplement in Internal Combustion Engines-A Brief Review
- Classification of Satellite broadcasting Image and Validation Exhausting Geometric Interpretation
Last modified: 2016-01-06 20:41:10