Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks

B Bhushan, G Sahoo - Wireless Personal Communications, 2018 - Springer
Advances in hardware manufacturing technology, wireless communications, micro electro-
mechanical devices and information processing technologies enabled the development of …

Survey on threats and attacks on mobile networks

S Mavoungou, G Kaddoum, M Taha, G Matar - IEEE Access, 2016 - ieeexplore.ieee.org
Since the 1G of mobile technology, mobile wireless communication systems have continued
to evolve, bringing into the network architecture new interfaces and protocols, as well as …

[HTML][HTML] Threat modeling framework for mobile communication systems

SP Rao, HY Chen, T Aura - Computers & Security, 2023 - Elsevier
This paper presents a domain-specific threat-modeling framework for the cellular mobile
networks. We survey known attacks against mobile communication and organize them into …

[BOK][B] A methodological overview on anomaly detection

C Callegari, A Coluccia, A D'Alconzo, W Ellens… - 2013 - Springer
In this Chapter we give an overview of statistical methods for anomaly detection (AD),
thereby targeting an audience of practitioners with general knowledge of statistics. We focus …

Modeling and analysis of RRC-based signalling storms in 3G networks

G Gorbil, OH Abdelrahman, M Pavloski… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Mobile networks are vulnerable to signaling attacks and storms that are caused by traffic
patterns that overload the control plane, and differ from distributed denial of service attacks …

T-Fuzz: Model-based fuzzing for robustness testing of telecommunication protocols

W Johansson, M Svensson, UE Larson… - 2014 IEEE Seventh …, 2014 - ieeexplore.ieee.org
Telecommunication networks are crucial in today's society since critical socio-economical
and governmental functions depend upon them. High availability requirements, such as the" …

Signalling storms in 3G mobile networks

OH Abdelrahman, E Gelenbe - 2014 IEEE international …, 2014 - ieeexplore.ieee.org
We review the characteristics of signalling storms that have been caused by certain common
apps and recently observed in cellular networks, leading to system outages. We then …

Mobile network anomaly detection and mitigation: The NEMESYS approach

OH Abdelrahman, E Gelenbe, G Görbil… - Information sciences and …, 2013 - Springer
Mobile malware and mobile network attacks are becoming a significant threat that
accompanies the increasing popularity of smart phones and tablets. Thus in this paper we …

The best bang for the byte: Characterizing the potential of DNS amplification attacks

DC MacFarland, CA Shue, AJ Kalafut - Computer Networks, 2017 - Elsevier
DNS amplification has been instrumental in over 34% of high-volume network DDoS attacks,
with some floods exceeding 300 Gbps. Today's best practices require Internet-wide …

Signaling oriented denial of service on LTE networks

R Bassil, A Chehab, I Elhajj, A Kayssi - Proceedings of the 10th ACM …, 2012 - dl.acm.org
Long Term Evolution (LTE) is seen as the key enabler for delivering the fourth generation of
mobile broadband and is the first cellular network primarily designed based on IP. Thus …