International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document discusses machine-to-machine (M2M) communications in vehicular networks. It begins with an overview of M2M communications and architectures, highlighting areas where M2M is being applied such as smart grids, home networking, and healthcare. The document then explores how M2M principles can enhance vehicular networks by supporting large-scale deployment, cross-platform networking, autonomous monitoring and control, visualization, and security. Several challenges for applying M2M to vehicular networks are also identified, including standardization and data security management.
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
A SURVEY ON AUTHENTICATION AND KEY AGREEMENT PROTOCOLS IN HETEROGENEOUS NETWORKSIJNSA Journal
Unlike current closed systems such as 2nd and 3rd generations where the core network is controlled by a sole network operator, multiple network operators will coexist and manage the core network in Next Generation Networks (NGNs). This open architecture and the collaboration between different network
operators will support ubiquitous connectivity and thus enhances users’ experience. However, this brings to the fore certain security issues which must be addressed, the most important of which is the initial Authentication and Key Agreement (AKA) to identify and authorize mobile nodes on these various networks. This paper looks at how existing research efforts the HOKEY WG, Mobile Ethernet and 3GPP
frameworks respond to this new environment and provide security mechanisms. The analysis shows that most of the research had realized the openness of the core network and tried to deal with it using different methods. These methods will be extensively analysed in order to highlight their strengths and weaknesses.
This document summarizes a research paper that classifies different types of networks and discusses their associated security issues. It categorizes networks based on size (LAN, MAN, WAN), design (peer-to-peer, client-server, standalone), layering (layered, non-layered), and provides examples such as Ethernet, Wi-Fi, VPNs. It also discusses common security threats for different network types like viruses, denial of service attacks, and evaluates security measures including encryption, firewalls, access control. The paper aims to provide a comprehensive classification of networks and analyze how security needs vary depending on the network and software development stages.
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with
wireless communications and networking capability that communicate with each other without the aid of
any centralized administrator also the wireless nodes that can dynamically form a network to exchange
information without using any existing fixed network infrastructure. And it’s an autonomous system in
which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at
the same time, and we discuss in this paper the distinct characteristics of traditional wired networks,
including network configuration may change at any time , there is no direction or limit the movement and
so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these
actions communicate with each other path, An ideal choice way the agreement should not only be able to
find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any
time. and we talk in details in this paper all the information of Mobile Ad Hoc Network which include the
History of ad hoc, wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc networks, and
then we present more than 13 types of the routing Ad Hoc Networks protocols have been proposed. In this
paper, the more representative of routing protocols, analysis of individual characteristics and advantages
and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad
Hoc Networks
This document summarizes a research paper on implementing heterogeneous interface mobile nodes in the NS2 network simulator. The paper discusses adding multiple WiFi and WiMAX interfaces to a mobile node individually, and then a heterogeneous interface combining both WiFi and WiMAX. It reviews related work on 4G networks and multiple interfaces. Implementation details are provided on creating homogeneous WiFi and WiMAX interfaces in NS2, including trace file and network animator outputs. Challenges are noted in implementing a heterogeneous interface on a single node due to NS2 limitations. An alternative approach of using separate nodes for each interface is proposed to simulate a mobile node with multiple heterogeneous interfaces.
This document analyzes routing protocols in wireless mesh networks (WMNs) using certain parameters like delay, throughput, and network load. It discusses security challenges in WMNs and proposes a security model. It also describes WMN protocols and simulation parameters. The paper then simulates three routing protocols (AODV, DSR, OLSR) in OPNET Modeler and displays the results in graphs to analyze protocol performance based on the parameters.
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-lineof-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
In this paper, we utilize the Several interference revelation techniques proposed for mobile ad hoc
networks rely on each node passively monitoring the data forwarding by its next hop. This paper presents
quantitative evaluations of false positives and their impact on monitoring based interference revelation for ad
hoc networks. Experimental results show that, even for a simple three-node configuration, an actual ad-hoc
network suffers from high false positives; these results are validated by Markov and probabilistic models.
However, this false positive problem cannot be observed by simulating the same network using popular ad hoc
network simulators, such as ns-2, OPNET or Glomosim. To remedy this, a probabilistic noise generator model
is implemented in the Glomosim simulator. With this revised noise model, the simulated network exhibits the
aggregate false positive behavior similar to that of the experimental tested. Simulations of larger (50-node) ad
hoc networks indicate that monitoring-based interference revelation has very high false positives. These false
positives can reduce the network performance or increase the overhead. In a simple monitoring-based system
where no secondary and more accurate methods are used, the false positives impact the network performance in
two ways: reduced throughput in normal networks without attackers and inability to mitigate the effect of
attacks in networks with attackers.
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...IRJET Journal
This document summarizes a research paper on Mobile Ad Hoc Networks (MANETs). It discusses MANETs as self-configuring wireless networks without a fixed infrastructure. Key points:
1) MANETs allow nodes to move freely and dynamically change connections. They are useful for applications like military operations and disaster response where infrastructure is not present.
2) Performance issues with MANETs include limited bandwidth, dynamic topology changes, lack of resources at nodes, and security vulnerabilities. Routing protocols must account for these challenges.
3) Global positioning systems (GPS) can utilize MANETs, with nodes sharing location data over wireless links. Accuracy improves with more satellite connections or ground station assistance.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
1) The document discusses security issues in computer networks and proposes contemporary solutions. It covers topics like cryptography, secure data access, intrusion detection, and secure routing.
2) The literature review discusses previous research on wireless sensor network security including common attacks, requirements, and defenses. It also examines security issues that arise from the unique characteristics of wireless networks.
3) The document proposes that more research is still needed on topics like quantifying security costs and benefits, data integrity, survivability, and security for data-centric wireless sensor networks. A holistic security model is needed that integrates solutions at each network layer.
The Abstracted Network for Industrial InternetMeshDynamics
Widespread adoption of TCI/IP protocols over the last two decades appears on the surface to have created a lingua franca for computer networking. And with the emergence of IPv6 removing the addressing restrictions of earlier versions, it would appear that now every device in the world may easily be connected with a common protocol.
But three emerging factors are requiring a fresh look at this worldview. The first is the coming wave of sensors, actuators, and devices making up the Internet of Things (IOT). Although not yet widely recognized, it is beginning to be understood that a majority of these devices will be too small, too cheap, too dumb, and too copious to run the hegemonic IPv6 protocol. Instead, much simpler protocols will predominate (see below), which must somehow be incorporated into the IP networks of Enterprises and the Internet.
At the other end of the scale from these tiny devices are huge Enterprise networks, increasing movingly to the cloud for computing and communication resources. An important requirement of these Enterprises is the capacity to manage, control, and tune their networks using a variety of Software Defined Networking (SDN) technologies and protocols. These depend on computing resource at the edges of the network to manage the interactions.
The third element is a conundrum presented by the first two: Enterprises will be struggling with the need to bring vast numbers of simple IOT devices into their networks. Though many of these devices will lack computing and protocol smarts, the requirement will still remain to manage everything via SDN. Along with this, many legacy Machine-to-Machine (M2M) networks (such as those on the factory floor) present the same challenges as the IOT: simple and/or proprietary protocols operating in operational silos today that Enterprises desire to manage and tune with SDN techniques.
A survey on security threats and detection2013Amina RIYAHI
This document provides an overview of security threats facing cognitive radio networks (CRNs). It discusses how CRNs aim to address spectrum scarcity by opportunistically using licensed spectrum bands when they are not in use. However, CRNs introduce new security vulnerabilities beyond those of traditional wireless networks. Specifically, adversaries can exploit the cognitive and reconfigurable aspects of CRNs to launch attacks like emulating primary users or falsifying spectrum sensing data. The document surveys current research on detecting such attacks and securing CRNs.
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
The underlying fabric for communication among intelligent
agents will in many cases be provided by telecommunication
networks. But telecommunication networks have been seen as
a natural domain for the investigation and application of
intelligent agents’ technology as it emerged from the area of
Distributed Artificial Intelligence (DAI). Telecommunication
network administrations are vast organizations dedicated to
operating and managing networks with broad functional
segmentations: telephone network outside plant, switching and
transmission plants, public network, all supporting different
layers of specialized customer or service networks. These
networks are organized into multiple physical and logical
layers built with large quantities of repeated network elements
and sub network structures. All these elements need to be
configured, monitored, and controlled. In the future, this will
preferably be done by automated operation support systems
and without substantial human intervention.
This document summarizes security attacks on routing protocols in mobile ad hoc wireless networks. It discusses characteristics of ad hoc networks, including dynamic network topology and fluctuating link capacity. It describes problems with routing protocols, such as energy consumption and rapid node movement. It also outlines various security attacks like passive eavesdropping and active attacks that modify or inject false packets. Finally, it examines security solutions for ad hoc networks, including the Security Aware Ad Hoc Routing protocol, Authenticated Routing for Ad Hoc Networks protocol, and Cooperation of Nodes Fairness in Dynamic Ad-hoc NeTworks protocol.
Este documento apresenta uma discussão sobre tecnologias da informação e comunicação (TIC) e seu uso na educação. Resume os principais pontos sobre como as TIC podem ser usadas como ferramentas didático-pedagógicas, incluindo como recursos de informação, comunicação e aprendizagem colaborativa. Também discute a Web 2.0 e sites populares que podem apoiar projetos educacionais.
O documento discute os chats online e mensagens instantâneas, definindo-os como locais para conversas públicas ou privadas entre usuários. Também destaca os potenciais perigos desses ambientes, especialmente para crianças e jovens, como pedofilia ou roubo de identidade. Por fim, fornece dicas de segurança para usuários desses serviços.
Uma carta de amor de um filho para o seu pai, o "Totó", falando sobre memórias da infância e agradecendo o pai por tudo que fez, como cantar na rede, fazer comidas preferidas e estar sempre presente, apesar das inseguranças da vida. A carta expressa o amor, admiração e saudade do filho pelo pai.
Uma amizade entre melhores amigas que começou e permanecerá para sempre, apesar das dificuldades, com música e fotos celebrando seus laços de amor e apoio mútuo.
El documento resume las protestas estudiantiles que ocurrieron en Venezuela en 2014. Comenzaron como protestas pacíficas en San Cristóbal por descontento con la escasez de insumos y malos servicios públicos. Luego se expandieron a otras universidades del país. El gobierno respondió con represión, lo que llevó a la aparición de grupos de respuesta política tanto moderados como radicales en apoyo a los estudiantes. La sociedad civil y partidos políticos de oposición también apoyaron las protestas, aunque con enfoques diferentes. El
In our research work we are improving the performance of mobile ad hoc networks under jamming attack by using an integrated approach. The proposed work includes a network with high mobility, using IEEE Along g standard jamming attacks and countermeasures in wireless sensor networks
This document discusses security challenges for 5G mobile wireless networks. It begins by reviewing the new capabilities and requirements of 5G networks, including higher bandwidth, lower latency, more connected devices, and new use cases. This introduces new security risks from attacks and requires security services like authentication, availability, confidentiality and privacy. The document then examines security issues from technologies enabling 5G like heterogeneous networks, device-to-device communication, and software-defined networks. It proposes a new flexible 5G security architecture and analyzes identity management and authentication approaches within it. The challenges of securing 5G networks into the future are also summarized.
This paper reviews 5G network technologies and security challenges. 5G will provide nearly unlimited wireless access and high data rates. It will face reliability, security, efficiency and energy challenges. 5G networks will use a variety of technologies like small cells and mobile edge computing. Security services like authentication, confidentiality, availability and integrity will be important for 5G. Ongoing standardization is addressing issues like spectrum allocation and receiver design challenges at high frequencies.
Security Models in Cellular Wireless NetworksWilliam Chipman
- Wireless networks and cellular networks are increasingly used for sensitive data transfer, raising security concerns.
- There are four main approaches to cellular network security: authentication, authorization, encryption, and physical security. Newer approaches include sandboxing on smartphones.
- As cellular and wireless networks continue integrating, new security risks emerge that require comprehensive security models across both network types.
Advanced Security Management in Metro Ethernet NetworksIJNSA Journal
With the rapid increase in bandwidth and the introduction of advanced IP services including voice, high-speed internet access, and video/IPTV, consumers are more vulnerable to malicious users than ever. In recent years, roviding safe and sound networks and services have been the zenith priority for service providers and network carriers alike. Users are hesitant to subscribe to new services unless service providers guarantee secure connections. More importantly, government agencies of many countries have introduced legislations requiring service providers to keep track and records of owners of IP and MAC addresses at all time. In this paper, we first present an overview of Metro Ethernet (or Ethernet-To-The-Home/Business (ETTx)) and compare with various IP broadband access technologies including DSL, wireless and cable. We then outline major security concerns for Metro Ethernet networks including network and subscriber/end user security. Next we introduce state-of-the-art algorithms to prevent attackers from stealing any IP or MAC addresses. Our proposal is to use network management in conjunction with hardware features for security management to provide a secure and spoofing-free ETTx network. The key idea behind our proposal is to utilize network management to enforce strict (port, MAC, IP) binding in the access network to provide subscriber security. The paper then proposes an adaptive policy-based security controller to quickly identify suspected malicious users, temporarily isolate them without disconnecting them from the network or validating their contracts, and then carry the required analysis. The proposed controller identifies malicious users without compromising between accurate but lengthy traffic analysis and premature decision. It also provides the ability to make granular corrective actions that are adaptive to any defined network condition.
The fast emerging of internet of things (IoTs) has introduced fog computing as an intermediate layer between end-users and the cloud datacenters. Fog computing layer characterized by its closeness to end users for service provisioning than the cloud. However, security challenges are still a big concern in fog and cloud computing paradigms as well. In fog computing, one of the most destructive attacks is man-in-the-middle (MitM). Moreover, MitM attacks are hard to be detected since they performed passively on the network level. This paper proposes a MitM mitigation scheme in fog computing architecture. The proposal mapped the fog layer on software-defined network (SDN) architecture. The proposal integrated multi-path transmission control protocol (MPTCP), moving target defense (MTD) technique, and reinforcement learning agent (RL) in one framework that contributed significantly to improving the fog layer resources utilization and security. The proposed schema hardens the network reconnaissance and discovery, thus improved the network security against MitM attack. The evaluation framework was tested using a simulation environment on mininet, with the utilization of MPTCP kernel and Ryu SDN controller. The experimental results shows that the proposed schema maintained the network resiliency, improves resource utilization without adding significant overheads compared to the traditional transmission control protocol (TCP).
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLIRJET Journal
The document discusses using machine learning to strengthen 5G infrastructure security. It begins by introducing 5G and its role in enabling IoT technologies by providing faster data transmission and lower latency. However, it notes 5G also faces security challenges like resource management, bandwidth, and latency issues. It then proposes using machine learning algorithms like autoencoders and recurrent neural networks to detect anomalies, optimize resource allocation based on usage predictions, and prioritize traffic to critical applications. This would help secure 5G networks from threats while efficiently managing resources.
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
Revisiting the experiment on detecting of replay and message modificationiaemedu
This document summarizes a research paper that proposes methods for detecting message modification and replay attacks in ad-hoc wireless networks. It begins with background on security issues in wireless networks and types of attacks. It then reviews existing intrusion detection systems and security techniques. Related work that detects attacks using features from the media access control layer or radio frequency fingerprinting is also discussed. The paper aims to present a simple, economical, and platform-independent system for detecting message modification, replay attacks, and unauthorized users in ad-hoc networks.
This document provides a literature review on topological planning of heterogeneous mobile networks in dense areas. It discusses the need for heterogeneous networks using a mix of macro, pico, femtocell and relay base stations. The network architecture is presented, including different types of base stations and their characteristics. Challenges of network planning in dense areas are also addressed, such as mitigating interference between indoor base stations and outdoor macrocells. Pathloss models and different interference scenarios are reviewed to understand their impact on network capacity and coverage optimization.
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachF5 Networks
This white paper discusses the need for mobile network operators to scale their network security as data traffic increases with the rollout of 4G LTE networks. It notes that LTE will drive even higher traffic volumes and new security threats. The current security architectures of most operators have been built in an ad hoc way with various hardware platforms, risking bottlenecks and ineffectiveness. The paper argues for a multi-layer security approach utilizing virtualization to dynamically scale security capabilities and adapt to changing threats. Virtualizing network security functions allows them to be deployed quickly where needed and reduce hardware costs and interoperability issues.
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecurityIRJET Journal
This document discusses security issues and solutions related to 5G cellular networks. It begins by providing background on 5G network capabilities and technologies such as network slicing, device-to-device communications, and software-defined networks. It then examines various security threats to 5G networks, such as vulnerabilities at the physical and MAC layers, risks associated with network slicing and edge computing, and security implications of D2D communication. The document emphasizes that 5G networks require new security approaches due to their unique characteristics like low latency. It stresses the importance of stakeholders working together to strengthen 5G network security through innovative methods and constant adaptation to emerging threats.
Low complexity physical layer security approach for 5G internet of thingsIJECEIAES
Fifth-generation (5G) massive machine-type communication (mMTC) is expected to support the cellular adaptation of internet of things (IoT) applications for massive connectivity. Due to the massive access nature, IoT is prone to high interception probability and the use of conventional cryptographic techniques in these scenarios is not practical considering the limited computational capabilities of the IoT devices and their power budget. This calls for a lightweight physical layer security scheme which will provide security without much computational overhead and/or strengthen the existing security measures. Here a shift based physical layer security approach is proposed which will provide a low complexity security without much changes in baseline orthogonal frequency division multiple access (OFDMA) architecture as per the low power requirements of IoT by systematically rearranging the subcarriers. While the scheme is compatible with most fast Fourier transform (FFT) based waveform contenders which are being proposed in 5G especially in mMTC and ultra-reliable low latency communication (URLLC), it can also add an additional layer of security at physical layer to enhanced mobile broadband (eMBB).
Smart Grid Systems Based Survey on Cyber Security IssuesjournalBEEI
The future power system will be an innovative administration of existing power grids, which is called smart grid. Above all, the application of advanced communication and computing tools is going to significantly improve the productivity and consistency of smart grid systems with renewable energy resources. Together with the topographies of the smart grid, cyber security appears as a serious concern since a huge number of automatic devices are linked through communication networks. Cyber attacks on those devices had a direct influence on the reliability of extensive infrastructure of the power system. In this survey, several published works related to smart grid system vulnerabilities, potential intentional attacks, and suggested countermeasures for these threats have been investigated.
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...EdisonAndresZapataOc
The document summarizes a proposed 5G wireless communication network architecture with an indoor/outdoor segregated design using cloud-based radio access networks (C-RAN). It aims to address challenges of 4G like higher data rates and network capacity by leveraging emerging technologies like massive MIMO, device-to-device communication, visible light communication, ultra-dense networks, and millimeter wave technology, which would be managed by software defined networking/network function virtualization through the C-RAN. The new 5G architecture separates indoor and outdoor networks to avoid penetration losses associated with current designs and allow indoor users to connect to dedicated indoor access points for improved quality of experience.
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
This document provides an overview of contemporary security problems in wireless mesh networks. It discusses security vulnerabilities at different layers of the communication protocol stack for wireless mesh networks, including the physical, link, and network layers. At the physical layer, jamming attacks are a risk. The link layer is vulnerable to passive eavesdropping, spoofing, congestion attacks, and replay attacks. The network layer faces risks from routing attacks like black hole and gray hole attacks, as well as Sybil attacks. Overall, the document analyzes different types of attacks that threaten the security of wireless mesh networks.
Network Security Roadmap have some perception of provided securityslametarrokhim1
The document discusses security considerations for 5G networks. It notes that 5G networks integrate new technologies like SDN, virtualization and service-based architecture that introduce new threat models beyond those of previous generations. Effective 5G security will require measures across multiple layers, including mutual authentication, cloud-based threat analysis, quarantining infected devices, and multi-layered encryption of SDN data planes. The document also proposes studying vulnerabilities emerging from the integration of 5G components and systems, as well as formulating new stream ciphers, security protocols, and analyzing security challenges across application, edge and cloud layers.
Navigating the Unseen Risks: Exploring 5G VulnerabilitiesSecurityGen1
As the world transitions into the era of 5G technology, it brings with it transformative advancements in communication and connectivity. However, this rapid evolution also ushers in a new realm of concerns – 5g vulnerabilities. While 5G promises lightning-fast speeds, ultra-low latency, and the ability to connect a multitude of devices, it also introduces a broader attack surface for cybercriminals. The complex architecture of 5G, including its reliance on virtualization, software-defined networking, and a multitude of interconnected components, presents challenges in ensuring robust security.
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsMydbops
This presentation, delivered at the Postgres Bangalore (PGBLR) Meetup-2 on June 29th, 2024, dives deep into connection pooling for PostgreSQL databases. Aakash M, a PostgreSQL Tech Lead at Mydbops, explores the challenges of managing numerous connections and explains how connection pooling optimizes performance and resource utilization.
Key Takeaways:
* Understand why connection pooling is essential for high-traffic applications
* Explore various connection poolers available for PostgreSQL, including pgbouncer
* Learn the configuration options and functionalities of pgbouncer
* Discover best practices for monitoring and troubleshooting connection pooling setups
* Gain insights into real-world use cases and considerations for production environments
This presentation is ideal for:
* Database administrators (DBAs)
* Developers working with PostgreSQL
* DevOps engineers
* Anyone interested in optimizing PostgreSQL performance
Contact info@mydbops.com for PostgreSQL Managed, Consulting and Remote DBA Services
Implementations of Fused Deposition Modeling in real worldEmerging Tech
The presentation showcases the diverse real-world applications of Fused Deposition Modeling (FDM) across multiple industries:
1. **Manufacturing**: FDM is utilized in manufacturing for rapid prototyping, creating custom tools and fixtures, and producing functional end-use parts. Companies leverage its cost-effectiveness and flexibility to streamline production processes.
2. **Medical**: In the medical field, FDM is used to create patient-specific anatomical models, surgical guides, and prosthetics. Its ability to produce precise and biocompatible parts supports advancements in personalized healthcare solutions.
3. **Education**: FDM plays a crucial role in education by enabling students to learn about design and engineering through hands-on 3D printing projects. It promotes innovation and practical skill development in STEM disciplines.
4. **Science**: Researchers use FDM to prototype equipment for scientific experiments, build custom laboratory tools, and create models for visualization and testing purposes. It facilitates rapid iteration and customization in scientific endeavors.
5. **Automotive**: Automotive manufacturers employ FDM for prototyping vehicle components, tooling for assembly lines, and customized parts. It speeds up the design validation process and enhances efficiency in automotive engineering.
6. **Consumer Electronics**: FDM is utilized in consumer electronics for designing and prototyping product enclosures, casings, and internal components. It enables rapid iteration and customization to meet evolving consumer demands.
7. **Robotics**: Robotics engineers leverage FDM to prototype robot parts, create lightweight and durable components, and customize robot designs for specific applications. It supports innovation and optimization in robotic systems.
8. **Aerospace**: In aerospace, FDM is used to manufacture lightweight parts, complex geometries, and prototypes of aircraft components. It contributes to cost reduction, faster production cycles, and weight savings in aerospace engineering.
9. **Architecture**: Architects utilize FDM for creating detailed architectural models, prototypes of building components, and intricate designs. It aids in visualizing concepts, testing structural integrity, and communicating design ideas effectively.
Each industry example demonstrates how FDM enhances innovation, accelerates product development, and addresses specific challenges through advanced manufacturing capabilities.
Are you interested in dipping your toes in the cloud native observability waters, but as an engineer you are not sure where to get started with tracing problems through your microservices and application landscapes on Kubernetes? Then this is the session for you, where we take you on your first steps in an active open-source project that offers a buffet of languages, challenges, and opportunities for getting started with telemetry data.
The project is called openTelemetry, but before diving into the specifics, we’ll start with de-mystifying key concepts and terms such as observability, telemetry, instrumentation, cardinality, percentile to lay a foundation. After understanding the nuts and bolts of observability and distributed traces, we’ll explore the openTelemetry community; its Special Interest Groups (SIGs), repositories, and how to become not only an end-user, but possibly a contributor.We will wrap up with an overview of the components in this project, such as the Collector, the OpenTelemetry protocol (OTLP), its APIs, and its SDKs.
Attendees will leave with an understanding of key observability concepts, become grounded in distributed tracing terminology, be aware of the components of openTelemetry, and know how to take their first steps to an open-source contribution!
Key Takeaways: Open source, vendor neutral instrumentation is an exciting new reality as the industry standardizes on openTelemetry for observability. OpenTelemetry is on a mission to enable effective observability by making high-quality, portable telemetry ubiquitous. The world of observability and monitoring today has a steep learning curve and in order to achieve ubiquity, the project would benefit from growing our contributor community.
How Social Media Hackers Help You to See Your Wife's Message.pdfHackersList
In the modern digital era, social media platforms have become integral to our daily lives. These platforms, including Facebook, Instagram, WhatsApp, and Snapchat, offer countless ways to connect, share, and communicate.
Comparison Table of DiskWarrior Alternatives.pdfAndrey Yasko
To help you choose the best DiskWarrior alternative, we've compiled a comparison table summarizing the features, pros, cons, and pricing of six alternatives.
YOUR RELIABLE WEB DESIGN & DEVELOPMENT TEAM — FOR LASTING SUCCESS
WPRiders is a web development company specialized in WordPress and WooCommerce websites and plugins for customers around the world. The company is headquartered in Bucharest, Romania, but our team members are located all over the world. Our customers are primarily from the US and Western Europe, but we have clients from Australia, Canada and other areas as well.
Some facts about WPRiders and why we are one of the best firms around:
More than 700 five-star reviews! You can check them here.
1500 WordPress projects delivered.
We respond 80% faster than other firms! Data provided by Freshdesk.
We’ve been in business since 2015.
We are located in 7 countries and have 22 team members.
With so many projects delivered, our team knows what works and what doesn’t when it comes to WordPress and WooCommerce.
Our team members are:
- highly experienced developers (employees & contractors with 5 -10+ years of experience),
- great designers with an eye for UX/UI with 10+ years of experience
- project managers with development background who speak both tech and non-tech
- QA specialists
- Conversion Rate Optimisation - CRO experts
They are all working together to provide you with the best possible service. We are passionate about WordPress, and we love creating custom solutions that help our clients achieve their goals.
At WPRiders, we are committed to building long-term relationships with our clients. We believe in accountability, in doing the right thing, as well as in transparency and open communication. You can read more about WPRiders on the About us page.
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Erasmo Purificato
Slide of the tutorial entitled "Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Emerging Trends" held at UMAP'24: 32nd ACM Conference on User Modeling, Adaptation and Personalization (July 1, 2024 | Cagliari, Italy)
Quality Patents: Patents That Stand the Test of TimeAurora Consulting
Is your patent a vanity piece of paper for your office wall? Or is it a reliable, defendable, assertable, property right? The difference is often quality.
Is your patent simply a transactional cost and a large pile of legal bills for your startup? Or is it a leverageable asset worthy of attracting precious investment dollars, worth its cost in multiples of valuation? The difference is often quality.
Is your patent application only good enough to get through the examination process? Or has it been crafted to stand the tests of time and varied audiences if you later need to assert that document against an infringer, find yourself litigating with it in an Article 3 Court at the hands of a judge and jury, God forbid, end up having to defend its validity at the PTAB, or even needing to use it to block pirated imports at the International Trade Commission? The difference is often quality.
Quality will be our focus for a good chunk of the remainder of this season. What goes into a quality patent, and where possible, how do you get it without breaking the bank?
** Episode Overview **
In this first episode of our quality series, Kristen Hansen and the panel discuss:
⦿ What do we mean when we say patent quality?
⦿ Why is patent quality important?
⦿ How to balance quality and budget
⦿ The importance of searching, continuations, and draftsperson domain expertise
⦿ Very practical tips, tricks, examples, and Kristen’s Musts for drafting quality applications
https://www.aurorapatents.com/patently-strategic-podcast.html
Measuring the Impact of Network Latency at TwitterScyllaDB
Widya Salim and Victor Ma will outline the causal impact analysis, framework, and key learnings used to quantify the impact of reducing Twitter's network latency.
The DealBook is our annual overview of the Ukrainian tech investment industry. This edition comprehensively covers the full year 2023 and the first deals of 2024.
Transcript: Details of description part II: Describing images in practice - T...BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
Support en anglais diffusé lors de l'événement 100% IA organisé dans les locaux parisiens d'Iguane Solutions, le mardi 2 juillet 2024 :
- Présentation de notre plateforme IA plug and play : ses fonctionnalités avancées, telles que son interface utilisateur intuitive, son copilot puissant et des outils de monitoring performants.
- REX client : Cyril Janssens, CTO d’ easybourse, partage son expérience d’utilisation de notre plateforme IA plug & play.
How RPA Help in the Transportation and Logistics Industry.pptxSynapseIndia
Revolutionize your transportation processes with our cutting-edge RPA software. Automate repetitive tasks, reduce costs, and enhance efficiency in the logistics sector with our advanced solutions.
Best Programming Language for Civil EngineersAwais Yaseen
The integration of programming into civil engineering is transforming the industry. We can design complex infrastructure projects and analyse large datasets. Imagine revolutionizing the way we build our cities and infrastructure, all by the power of coding. Programming skills are no longer just a bonus—they’re a game changer in this era.
Technology is revolutionizing civil engineering by integrating advanced tools and techniques. Programming allows for the automation of repetitive tasks, enhancing the accuracy of designs, simulations, and analyses. With the advent of artificial intelligence and machine learning, engineers can now predict structural behaviors under various conditions, optimize material usage, and improve project planning.
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionBert Blevins
Cybersecurity is a major concern in today's connected digital world. Threats to organizations are constantly evolving and have the potential to compromise sensitive information, disrupt operations, and lead to significant financial losses. Traditional cybersecurity techniques often fall short against modern attackers. Therefore, advanced techniques for cyber security analysis and anomaly detection are essential for protecting digital assets. This blog explores these cutting-edge methods, providing a comprehensive overview of their application and importance.
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Fb34942946
1. Shwetha H.K, Prof. D. Jayaramaiah / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.942-946
942 | P a g e
Study and Analysis of Security Issues in Next Generation Mobile
Network
Shwetha H.K1
, Prof. D. Jayaramaiah2
1
PG Student, The Oxford College of Engineering, India
2
Professor, HOD- Information Science & Engg, The Oxford College of Engineering, India
Abstract
NGMN is a standard term describing the
next level of evolution in wireless communication.
Security is one of the important issue in next
generation mobile network. The core infrastructure
of NGMN network is packet based, all IP and
heterogeneous where Long Term Evolution (LTE),
WiMax & Wireless local area networks (WLAN)
are examples of viable access technologies. By
deploy femtocell it increasing demand for data rates
, LTE is the mobile network technology for the next
generation mobile communications as defined by
the 3rd
generation partnership project (3GPP). LTE
has features such as increased data rates, lower
latencies & better spectral efficiency. Goal here is
to raise awareness about security issues in LTE &
femtocell. In this paper we approach significant
threats to security of femtocell enabled cellular
networks (LTE). Approach Distributed Denial of
Service (DDoS) defence scenario dynamics among
service provider and mobile operator that is
effective against malicious attacker. By
considering parameters such as Internet traffic and
femtocell subscriber shares, We propose novel
approach could help service provider and mobile
operators making strategic decisions.
Index Terms—Wireless Security, Cellular Mobile
Networks, LTE, Femtocells
I. Introduction
In wireless communication networks
cellular mobile networks are the most widely used
and heavily deployed in the world. In the advent of
digital technologies such as GSM the use of mobile
devices has changed. Based on the subscriber’s
location users are able to browse the Internet and get
the services such as ebanking, navigation, social
networking and recommendations using modern
smartphone. Femtocells, are low-power and low-
range base stations for cellular networks installed by
users at their own premises, are believed to meet the
surge in data rates that these multimedia and
interactive services require. They offload the
macrocell network and provide backhaul connections
to the cellular operators’ networks through the users’
residential broadband accesses [15].
Long Term Evolution (LTE) is the mobile
network technology for the next generation mobile
communications, as defined by the 3rd Generation
Partnership Project (3GPP). The features such as
increased data-rates, lower latencies and better
spectral efficiency, and the IP core network
architecture, known as Evolved Packet Core (EPC).
The essential component of the Evolved Packet
System (EPS, which includes the radio access, the
core network and the handset) is give a importance
for supporting the high-speed connections and a
smooth handovers among LTE and other
technologies such as GSM and WCDMA. LTE is
expected to make extensive use of user-installed
femtocells, very low-power and low-range base
stations (femtocells), in order to achieve its goals of
spectral efficiency and high-speed for a greater
number of users.
Security in these networks is achieved by
several levels. They concerns about the messages
that are communicated over-the-air, the traffic routed
by a mobile operator on its own internal network and
the inter operator traffic. The main assumption
underlying the security of the mobile networks cited
so far is a high trust that each operator has in its own
infrastructure and in other operators with whom it
has a roaming contract. The main reasons behind
such positive attitude are the following: (i) direct
ownership and control of the network equipment, (ii)
dedicated connections and protocols among network
components and (iii) the highly hierarchical decision
making process for providing network resources to
mobile devices. Clearly, in case of a substantial
change in the network architecture, such as evolving
to a flat all-ip network, the trust relationships would
need to be revisited.
The combination of LTE, all-ip network
architecture and femtocells is stimulating the new
security threats. A malicious user easily tamper with
the femtocell, as it resides directly at the user’s
premises, or to disrupt the legitimate
communications both at the femtocell and at the core
network level, due to the openness of the IP
networks. Moreover, as LTE is an evolution of the
existing 2G-3G standards and is backward-
compatible with them, it also inherits different
vulnerabilities at the protocol level. Specifically, the
privacy of the user’s permanent identity and his/her
geographic location is at risk both at the air interface
(use of identifiers) and at the application layer
(location based services).
2. Shwetha H.K, Prof. D. Jayaramaiah / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.942-946
943 | P a g e
In this report, we analyze security threat related to
the all-ip and femtocell LTE network architectures.
We analyze a scenario involving distributed denial of
service (DDoS) attacks on the femtocell core
network components, , and we present a novel game
theoretic model to represent scenario between a
mobile operator and different service provider.
II. RELATED WORK
On the security front, DDoS attacks are a
well known phenomena for large companies hosting
a multitude of web servers sparse around the globe,
such as eBay, Amazon or Yahoo [6]. In order to deal
with such attacks in a systematic way, Mirkovic [18]
proposes a general classification of attacks and
defense mechanisms, such that system developers
and researchers can better observe and react to the
inherently different attacks by exploiting their
common traits. If the detection of ongoing DDoS
attacks is best performed at the victim site, the
suppression mechanisms are most effective near the
source, as it is possible to filter the malicious traffic
from the genuine connections and avoid the former
to even reach and saturate the final link with the
target. This idea has been investigated in several
studies ([17], [5], [19], [16]) suggesting that a
distributed solution is better suited against large-
scale DDoS attacks than one localized only at the
final link with the target. The requirement is that
different ISPs are able and willing to cooperate in
order to provide protection, and the authors agree
that a failure to reach an agreement could jeopardize
the effectiveness of their solutions. Only in more
than one ISP is strictly required to implement the
solution, otherwise even a single ISP would be able
to ensure a partial level of protection.
One work that specifically aims at
femtocells and mobile operators is [15], where
femtocell gateways are the targets of DDoS attacks
perpetrated with the intent to extort money from
mobile operators. The authors manage to obtain real
prices for such attacks but fail to illustrate any
countermeasures that make use of the specific
features of femtocell networks, such as the need for
femtocells to be located in geographic regions where
the mobile operator has the right to use the spectrum.
Our DDoS defense scheme presents a model that
leverages on incentives that cooperation among ISPs
could bring both to them and to mobile operators.
III. LTE NETWORK
ARCHITECTURES
In this section, we describe the network
architecture of LTE (radio access and core network)
that are related to the security issues discussed in this
report. Figure 1 shows a basic network architecture
for LTE[7], with a clear separation between the core
network (CN) components and the radio access
network (RAN). More information about the
architecture and security of LTE RAN/CN can be
found in following paper [13], [14], [21].
3.1 Radio Access Network
The RAN is responsible for all the radio
interface related features of the network, and it is the
point of entry to the mobile network for any
compatible wireless device. In addition to
encapsulating or decapsulating data, it performs
radio channel and power management controls,
handover procedures and over-the-air
encryption/integrity for data and signalling traffic to
and from the wireless devices (User Equipment, UE).
Due to the broadcast nature of the wireless medium,
the air interface is the most vulnerable to
eavesdropping and traffic injection, and thus several
measures have been taken in order to mitigate those
risks. Eventhough it might be non trivial to break the
algorithm and obtain the secret key, the user privacy
is still at risk due to protocol flaws enabling a
malicious user with a femtocell to track the where
abouts of a subscriber.
In LTE and UMTS, all user and signaling
traffic is encrypted and integrity protected against
misuse by malicious entities on the air interface. The
use of a shared secret key between the Universal
Subscriber Identity Module (USIM) in the mobile
device and the home network ensures that only
authorized users and legitimate network operators
can communicate and exchange information. There
are, however, major differences in the way
encryption and trust is managed in LTE and UMTS.
The UMTS the air interface encryption is
terminated at the RNC, while in LTE it is terminated
in the eNodeB (similar to GSM). UMTS uses
encryption/integrity key pairs that are independent of
the network that is currently serving the UE.
Moreover, these keys must not be changed during a
handover, if the UE is still served by the same
SGSN. In LTE, on the contrary, the keys are not
transfered as such from the home network to the
eNodeBs but they are derived from layer to layer,
depending on the particular serving network and the
specific eNodeB that is used by the mobile device.
As a consequence, LTE has already been developed
with limited trust in network components and
external partners from the beginning.
3.2. Femtocells
As defined by the Femto Forum [15]
femtocells are low-power wireless access points that
operate in licensed spectrum to connect standard
mobile devices to a mobile operators network using
residential DSL or cable broadband connections. The
main differences with respect to traditional base
stations, such as (e)NodeBs, are the following.
Femtocells are installed by users at their own
premises, without the involvement of authorized
operator’s technicians,
3. Shwetha H.K, Prof. D. Jayaramaiah / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.942-946
944 | P a g e
_ user-friendly and low-cost devices, connected to
the operator’s network through a public (insecure)
connection, provided by a potentially different
service provider.
Figure 1. Basic architecture of LTE network
From a mobile device’s point of view, being
connected to a (e)NodeB or a femtocell is both are
same, because the protocols and security standards
used at the air interface are exactly the same. From a
malicious user’s point of view, it makes a substantial
difference because for a malicious user it is much
easier to tamper with a small and low-cost (£160
[15]) femtocell than it could be with a bigger device
located on a rooftop. Moreover, as the traffic
between the femtocell and core network goes
through the Internet, so the attacker can easily attack
through femtocell.
3.3 Core Network
The core network components of LTE,
shown in Figure 1 (middle), are responsible for the
storage of subscriber information, billing, mobility
management, authentication /authorization and
routing of user data to hits destination. Without this
infrastructure, the calls and data services cannot be
successfully established. Usually, the core network is
protected from external access by firewalls located at
its edges, and LTE have security measures in place
to the malicious attacks on core components. Inside
the core network, encryption is not specified for
UMTS and not mandatory for LTE, although the IP
interfaces in LTE can be protected by using IPSec
secure connections among the RAN and CN
components. As LTE supports interconnections with
non-3GPP networks such as WiMax and WiFi, IPSec
tunnels are used inside the core network to protect
the confidentiality of information. Integrity, on the
contrary, is not protected for performance reasons.
IV. SECURITY CHALLENGES
Figure 1 shows the threat model for a
femtocell-enabled mobile network. The three
vulnerable elements are indicated by arrows: (i) the
air interface between the mobile device (User
Equipment) and the femtocell (Home(e)NodeB), (ii)
the femtocell itself and (iii) the public link between
the femtocell and the security gateway (SecGW).
Our intent is to focus on certain attacks on the
aforementioned elements, which are achievable
without breaking the cryptosystems or the protocols.
A more exhaustive list of all possible attacks and
countermeasures can be found in.
4.1 Attacks on the Femtocell
A mobile device, being connected to a
regular base station, i.e., (e)NodeB, or a femtocell is
both are same, because the protocols and security
standards used at the air interface. From a malicious
user’s point of view, it makes a substantial difference
because it is much easier for a malicious user to
tamper with a small and inexpensive (£120 [15])
femtocell than it could be with a large and
complicated device located on a rooftop. The
physical size, material quality, lower cost
components and the IP interface of the femtocell
make it more suited for reverse engineering and
tampering than a traditional, more expensive and
business-grade (e)NodeB base station.
As the over-the-air user data encryption is
terminated at the femtocell, hardware tampering with
the device could expose the private information of
the unsuspecting user. Moreover, attacks such as
device impersonation, Internet protocol attacks on
the network services, false location reporting or
simply unauthorized reconfiguration of the onboard
radio equipment could hinder the network operator
from controlling interference and power management
features. This could have severe consequences on the
quality of service. To this end, femtocells should be
equipped with trusted execution environments that
render malicious manipulation of the onboard
software and the on-the-wire sniffing very hard to
achieve.
we develop a game-theoretic model to
represent a possible security scenario for the
femtocells and their core network components, the
femtocell gateways. ISPs and mobile operators make
decisions on the security demand/offer for the
femtocell infrastructure by considering distributed
denial of service (DDoS) attacks on femtocell
gateways.
External network
Core network
Radio Access
Network(RAN
)
4. Shwetha H.K, Prof. D. Jayaramaiah / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.942-946
945 | P a g e
V. FEMTOCELL DDOS DEFENSE
One important security issue of current and
next generation cellular networks will be related to
the use of femtocells in order to provide better signal
quality, service availability and data-rates to the
subscribers. If, on one hand, this seems to be a very
palatable solution for mobile operators as it avoids
investments on the backbone connection, on the
other hand the exposure to the public Internet has
severe drawbacks. One of them is the public IP
address that each femtocell gateway would be
assigned, and to which tenths of thousands
femtocells would connect to. DoS attacks are usually
carried out against a service running on a specific IP
address in order to deny access to legitimate users
and cause damage to the service owner. A distributed
DoS (DDoS) attack has the same goal but it is
usually much more difficult to prevent, as it exploits
a great number of zombie computers to generate
apparently legitimate connections to the given IP
address. It is clear that if the gateways were to suffer
intense DDoS attacks, customers would not be able
to connect to them anymore and would not get the
service they are paying for. Ultimately, they could
also change their mobile operator.
In this section, we develop a game theoretic
model for the defense against DDoS attacks. The
idea is based on the fact that femtocells are low
power base station so attacker easily attack through
the femtocell. In DDoS attack, attacker send many
number of packets to the operate. As a consequence,
The packet send from the attacker will not send to
the SGW, ISP itself block all the packets which is
received from the attacker. This way, the mobile
operator can continue to serve legitimate users while
avoiding to provide resources to malicious attackers.
We assume that an Service provider could
either provide protection by cooperating with other
service provider, on its own or not protect at all. If an
service provider cooperates with others in order to
provide protection, then it can lower its costs by
sharing them with the other parties. In this case, it
also gets only a share of the benefits (provided by the
mobile operator) to compensate for the extra costs of
setting up the protection mechanisms. If a service
provider protects the mobile operator on its own, it
gets all the benefits but has a greater cost as well,
depending on its current Internet traffic share. If an
service provider does not provide protection, it does
not get any benefits but, at the same time, it does not
bear any additional cost.
In game theoretic model We model the
DDoS defense. The leader (mobile operator) chooses
its strategy first and then the followers (ISPs),
knowing the strategy of the leader, select their own
strategies in order to maximize their payoffs. Once
the leader has chosen its strategy, the followers play
the game in a simultaneous fashion, i.e. all ISP select
their strategies at the same time. Figure 2 illustrates
the graph for the time to detect the attack and load on
SGW.
Figure 2a. Time to detect attack, x-axis is rate of
packet in kilo bits and y-axis time in milisecond.
Figure 2b, Load on SGW, x-axis is time in second
and y-axis is load on SGW. In this graph it shows the
result of normal flow of data and the result of after
lunch attack. Once the attack is lunch it drop out the
load on SGW and constant for the next flow.
VI. CONCLUSION
The control over security in the next
generation of mobile networks, such as LTE, is held
by the core network. LTE and femtocells are
combined together with an all-IP core architecture,
they provide better service levels and data-rates than
current 2G and 3G networks. In order to attach more
users and to increase security, the research people
(3GPP) has put more intelligence in the next
generation base stations, enabling them to decide
autonomously the radio channel characteristics
(handover, power, channel assignment) for each user.
In this paper, we have approach some
significant threats to security in femtocell-enabled
5. Shwetha H.K, Prof. D. Jayaramaiah / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.942-946
946 | P a g e
mobile networks. we suggested a novel approach
towards the protection of the mobile network against
internet-based DDoS attacks successful stimulating.
REFERENCES
[1] 3GPP LTE. Visited on 25.11.2009.
[Online]. Available:
http://www.3gpp.org/LTE
[2] Y. De Mulder, G. Danezis, L. Batina, and
B. Preneel, “Identification via location-
profiling in GSM networks,” in Proceedings
of the 7th AC workshop on Privacy in the
electronic society. ACM New York, NY,
USA, 2008, pp. 23–32.
[3] G. Koien and V. Oleshchuk, “Location
Privacy for Cellular Systems; Analysis and
Solution,” Lecture Notes in Computer
Science, vol. 3856, p. 40, 2006.
[4] L. Garber, “Denial-of-service attacks rip the
Internet,” Computer, vol. 33, no. 4, pp. 12–
17, 2000.
[5] J. Mirkovic, “A taxonomy of DDoS attack
and DDoS defense mechanisms,” ACM
SIGCOMM Computer Communication
Review, vol. 34, no. 2, pp. 39–53, 2004
[6] Lee Garber, “Denial-of-Service Attacks Rip
the Internet”.
[7] Long Term Evolution (LTE) overview.
[8] LTE Simulator Documentation.
[9] Next Generation Mobile Network Beyond
HSPA & EVDO, by the NGMN Alliance.
[10] Securing Next Generation Mobile
Networks.
[11] Spectrum Requirements for the Next
Generation of Mobile Networks.
[12] Anand R. Prasad, “3GPP SAE/LTE
Security”.
[13] 3GPP TS 23.401 v8.7.0. “ General Packet
Radio Service (GPRS) enhancements for
Evolved Universal Terrestrial Radio
Acceess Network access”.
[14] 3GPP TS 33.401 v8.5.0, “3GPP System
Architecture Evolution (SAE) Security
Architecture”.
[15] Femto Forum.
http://www.femtoforum.org/femto/aboutfe
mtocells.php..
[16] T. Peng, C. Leckie, and K.
Ramamohanarao, “Survey of network-based
defense mechanisms countering the DoS
and DDoS problems,” ACM Computing
Surveys (CSUR), vol. 39, no. 1, p. 3, 2007.
[17] S. Chen and Q. Song, “Perimeter-based
defense against high bandwidth DDoS
attacks,” IEEE Transactions on Parallel and
Distributed Systems, vol. 16, no. 6, pp.
526–537, 2005.
[18] J. Mirkovic, M. Robinson, P. Reiher, and G.
Oikonomou, “Distributed Defense Against
DDOS Attacks,” University of Delaware
CIS Department Technical Report CIS-TR-
2005, vol. 2, 2005.
[19] C. Papadopoulos, R. Lindell, J. Mehringer,
A. Hussain, and R. Govindan, “Cossack:
Coordinated suppression of simultaneous
attacks,” in Proceedings of DISCEX III.
Citeseer, 2003, pp. 2–13.
[20] GSM Association Market Data Summary
Q2 2009. Visited on 24.11.2009. [Online].
Available:
http://www.gsmworld.com/newsroom/mark
et-data/ market data summary.html.
[21] 3GPP TS 33.401 v8.5.0, “3GPP System
Architecture Evolution (SAE): Security
architecture,” . [Online]. Available:
http://www.3gpp.org/ftp/Specs/Archive/33
series/33.401/33401-850.zip
[22] 3GPP TS 23.002 v4.8.0, “Network
architecture,” . [Online]. Available:
http://www.3gpp.org/ftp/Specs/archive/23
series/23.002/23002-480.zip