While it is often convenient for mobile cellular devices to have a public IP address, we show that such devices are vulnerable to stealthy malicious attacks. In particular, we show with experiments on three 4G/LTE cellular data networks in Singapore that it is easy for an attacker to initiate three different types of attacks on such mobile devices: (i) data quota drain, (ii) DoS flooding, and (iii) battery drain. Our experiments show that a potential attacker can completely exhaust the monthly data quota within a few minutes, completely choke the data connection of a mobile subscriber with a data stream of just 3 Mb/s, and increase the battery drain rate by up to 24 times. Finally, we argue that a simple proxy-based firewall with a secret I...
In this paper, we present a comprehensive characterization of malicious traffic generated by mobile ...
Cellular networks are fundamental infrastructures nowadays, so that any communication problem could ...
3G/4G cellular networks adopt usage-based charging. Mobile users are billed based on the traffic vol...
Mobile communication systems are now an essential part of life throughout the world. Fourth generati...
Abstract — As cellular data services and applications are being widely deployed, they become attract...
Abstract—To support voice calls vital to mobile users and carriers, 4G LTE cellular networks adopt t...
Today 4G mobile networked systems provide anywhere and anytime Internet access to billions of mobile...
This paper focuses on protecting the cellular paging protocol — which balances between the quality-o...
Due to widespread adoption of mobile communications devices and increasingly high throughput capacit...
Cellular devices support various technical features and services for 2G, 3G, 4G and upcoming 5G netw...
Smartphone carrier companies rely on mobile networks for keeping an accurate record of customer data...
The emergence of connections between telecommunications networks and the Internet creates significan...
Mobile telephony device is widely used these days. Protecting subscribers privacy is crucial and can...
Abstract4 G mobile networks have evolved to meet the ever-increasing demand and requirements of user...
The vast expansion of interconnectivity with the Internet and the rapid evolution of highly-capable ...
In this paper, we present a comprehensive characterization of malicious traffic generated by mobile ...
Cellular networks are fundamental infrastructures nowadays, so that any communication problem could ...
3G/4G cellular networks adopt usage-based charging. Mobile users are billed based on the traffic vol...
Mobile communication systems are now an essential part of life throughout the world. Fourth generati...
Abstract — As cellular data services and applications are being widely deployed, they become attract...
Abstract—To support voice calls vital to mobile users and carriers, 4G LTE cellular networks adopt t...
Today 4G mobile networked systems provide anywhere and anytime Internet access to billions of mobile...
This paper focuses on protecting the cellular paging protocol — which balances between the quality-o...
Due to widespread adoption of mobile communications devices and increasingly high throughput capacit...
Cellular devices support various technical features and services for 2G, 3G, 4G and upcoming 5G netw...
Smartphone carrier companies rely on mobile networks for keeping an accurate record of customer data...
The emergence of connections between telecommunications networks and the Internet creates significan...
Mobile telephony device is widely used these days. Protecting subscribers privacy is crucial and can...
Abstract4 G mobile networks have evolved to meet the ever-increasing demand and requirements of user...
The vast expansion of interconnectivity with the Internet and the rapid evolution of highly-capable ...
In this paper, we present a comprehensive characterization of malicious traffic generated by mobile ...
Cellular networks are fundamental infrastructures nowadays, so that any communication problem could ...
3G/4G cellular networks adopt usage-based charging. Mobile users are billed based on the traffic vol...