Journal of Cyber Security and Mobility 3-2, Special Issue on Next Generation Mobility Network Security

Journal of Cyber Security and Mobility 3-2, Special Issue on Next Generation Mobility Network Security
Author :
Publisher :
Total Pages : 148
Release :
ISBN-10 : 8793237057
ISBN-13 : 9788793237056
Rating : 4/5 (57 Downloads)

Book Synopsis Journal of Cyber Security and Mobility 3-2, Special Issue on Next Generation Mobility Network Security by : Roger Piqueras Jover

Download or read book Journal of Cyber Security and Mobility 3-2, Special Issue on Next Generation Mobility Network Security written by Roger Piqueras Jover and published by . This book was released on 2014-04-30 with total page 148 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Long Term Evolution (LTE) is the newly adopted standard technology to offer enhanced capacity and coverage for mobility networks, providing advanced multimedia services beyond traditional voice and short messaging traffic for billions of users. This new cellular communication system is the natural evolution of 3rd Generation Partnership Project (3GPP)-based access networks, enhancing the Universal Mobile Telecommunications System (UMTS). LTE introduces a substantial redesign of the network architecture resulting in the new eUTRAN (Enhanced Universal Terrestrial Radio Access Network) and the EPC (Enhanced Packet Core). In this context, the LTE Radio Access Network (RAN) is built upon a redesigned physical layer and based on an Orthogonal Frequency Division Multiple Access (OFDMA) modulation, which features robust performance in challenging multipath environments and substantially improves spectrum efficiency and capacity. Moreover, the new all-IP core architecture is designed to be more flexible and flatter, with a logical separation of the traffic related functions and the control and signaling functions. Over the last few years, researchers have published and presented potential vulnerabilities and attacks against the second generation of mobile networks, the Global System for Mobile Communications (GSM). Although technology, encryption schemes and security in general have drastically improved in LTE with respect of legacy GSM networks, security research should continue proactively working towards secure and resilient mobile communication systems. In this context, the cyber-security landscape has changed drastically over the last few years. It is now characterized by large scale security threats and the advent of sophisticated intrusions. These new threats illustrate the importance of strengthening the resiliency of mobility networks against security attacks, ensuring this way full mobility network availability. This special issue of the Journal of Cyber Security and Mobility addresses research advances in mobility security for LTE next generation mobility networks and other wireless communication systems. Two of the papers in this special issue analyze the threat of radio jamming. Lichtman et al. introduce a sophisticated reinforcement learning anti-jamming technique aimed at protecting frequency hopping wireless systems from jamming attacks while maximizing link throughput. Similarly, Kornemann et al. introduce a jamming detection mechanism for Wireless Sensor Networks (WSN), which are known to be substantially vulnerable to this type of attack. Focusing specifically on LTE mobile networks, Jermyn et al. perform a thorough simulation analysis of potential Denial of Service attacks against the eUTRAN by means of a botnet of malware-infected mobile terminals saturating the radio interface with large amounts of traffic. This type of malware infections and the connections of such a botnet to the malicious command and control servers could be detected with the system introduced by Bickford et al. This advanced detection scheme is capable to detect malicious activity in mobile terminals and proceed to mitigate and block the malicious applications. Finally, Alzahrani et al. present a very detailed and thorough analysis of the security research published over the last few years on mobile malware analysis, detection and mitigation. The valuable insights in this paper set a common ground and framework to facilitate research in this area, as well as to share results and easily replicate experiments.


Journal of Cyber Security and Mobility 3-2, Special Issue on Next Generation Mobility Network Security Related Books

Journal of Cyber Security and Mobility 3-2, Special Issue on Next Generation Mobility Network Security
Language: en
Pages: 148
Authors: Roger Piqueras Jover
Categories: Technology & Engineering
Type: BOOK - Published: 2014-04-30 - Publisher:

DOWNLOAD EBOOK

The Long Term Evolution (LTE) is the newly adopted standard technology to offer enhanced capacity and coverage for mobility networks, providing advanced multime
Breakthrough Perspectives in Network and Data Communications Security, Design and Applications
Language: en
Pages: 356
Authors: Bose, Indranil
Categories: Computers
Type: BOOK - Published: 2008-12-31 - Publisher: IGI Global

DOWNLOAD EBOOK

Addresses key issues and offers expert viewpoints into the field of network and data communications. Presents research articles that investigate the most signif
Journal of Cyber Security and Mobility 1-4
Language: en
Pages: 126
Authors: Rajarshi Sanyal
Categories: Technology & Engineering
Type: BOOK - Published: 2012-10 - Publisher:

DOWNLOAD EBOOK

Special issue on Next Generation Roaming Applications: Implementation Challenges for Rich Communication Suite Applications, Locations & Presence Based Services
Ambient Networks
Language: en
Pages: 286
Authors: Norbert Niebert
Categories: Technology & Engineering
Type: BOOK - Published: 2007-04-30 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Ambient Networks defines a new kind of network architecture, which embeds support for co operation and competition between diverse network types within a common
Journal of Cyber Security and Mobility 3-3, Special Issue on Big Data Theory and Practice
Language: en
Pages: 134
Authors: Jiang Bian
Categories: Computers
Type: BOOK - Published: 2014-07-31 - Publisher:

DOWNLOAD EBOOK

We are now in the era of the Big Data revolution where nearly every aspect of computing engineering is driven by increasingly large, complex, and diverse datase