Attacks on mobile networks: An overview of new security challenge

In this paper, the authors address issues regarding the attacks on mobile networks. Firstly, the mobile network security is described as well as the risk to be faced with mobile network. Then it follows with the some issues in mobile network security and attack. The authors then reviewed previous work in understanding mobile network attacks and the popular attacks on mobile network namely the bluetooth and mobile ad-hoc.

[1]  Herbert W. Hethcote,et al.  The Mathematics of Infectious Diseases , 2000, SIAM Rev..

[2]  L. Tamilselvan,et al.  Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[3]  Helen J. Wang,et al.  Smartphone attacks and defenses , 2004 .

[4]  Hyunsoo Yoon,et al.  Dynamic Simulation on Network Security Simulator Using SSFNET , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[5]  Bernhard Plattner,et al.  Experiences with worm propagation simulations , 2003, WORM '03.

[6]  Donald F. Towsley,et al.  Monitoring and early warning for internet worms , 2003, CCS '03.

[7]  Matthew M. Williamson,et al.  Implementing and Testing a Virus Throttle , 2003, USENIX Security Symposium.

[8]  William H. Sanders,et al.  Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).

[9]  Wenke Lee,et al.  Simulating Internet worms , 2004, The IEEE Computer Society's 12th Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, 2004. (MASCOTS 2004). Proceedings..

[10]  Thomas F. La Porta,et al.  Exploiting open functionality in SMS-capable cellular networks , 2008, J. Comput. Secur..

[11]  Kang G. Shin,et al.  On Mobile Viruses Exploiting Messaging and Bluetooth Services , 2006, 2006 Securecomm and Workshops.

[12]  George F. Riley,et al.  The Georgia Tech Network Simulator , 2003, MoMeTools '03.

[13]  Tom Martin,et al.  Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.

[14]  David M. Nicol,et al.  Simulating realistic network worm traffic for worm warning system design and testing , 2003, WORM '03.

[15]  Mikko Hypponen,et al.  Malware goes mobile. , 2006, Scientific American.

[16]  Geoffrey M. Voelker,et al.  Can you infect me now?: malware propagation in mobile phone networks , 2007, WORM '07.

[17]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[18]  S. Viveros The economic impact of malicious code in wireless mobile networks , 2003 .

[19]  Jianping Pan,et al.  Wireless network security , 2006, Wirel. Commun. Mob. Comput..

[20]  Michalis Faloutsos,et al.  Overcoming the challenge of security in a mobile environment , 2006, 2006 IEEE International Performance Computing and Communications Conference.

[21]  Brian D. Noble,et al.  Modeling epidemic spreading in mobile environments , 2005, WiSe '05.

[22]  Hongkyun Jung,et al.  The Development of SoC Platform for Embedded System Applications , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[23]  Shane Coursen Mobile Malware: The future of mobile malware , 2007 .

[24]  David Moore,et al.  Internet quarantine: requirements for containing self-propagating code , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[25]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[26]  Michalis Faloutsos,et al.  Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.

[27]  Vern Paxson,et al.  How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.

[28]  Giovanni Vigna,et al.  Using Labeling to Prevent Cross-Service Attacks Against Smart Phones , 2006, DIMVA.

[29]  Guanhua Yan,et al.  Bluetooth Worms: Models, Dynamics, and Defense Implications , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[30]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[31]  George F. Riley,et al.  Modeling and simulations of worms and mitigation techniques , 2007 .

[32]  James P. McDermott,et al.  Attack net penetration testing , 2001, NSPW '00.