Signaling Attacks in Mobile Telephony

Mihajlo Pavloski, Erol Gelenbe


Mobile telephony based on UMTS uses finite-state control schemes for wireless channels and for signaling across the network. These schemes are used systematically in various phases of the communication and are vulnerable to attacks that can bring down the network through unjustified bandwidth allocation and excessive signaling across the control plane. In this paper we identify those system parameters which are critical to the success of such attacks, and propose changes that can limit the effect of the attack. The approach is based on establishing a mathematical model of a UMTS system that is undergoing attacks, and on showing how parameters can be optimally modified to minimise the effect of the attack as experienced by the mobile device and the network.


  1. 3GPP (June 2002). Utran functions, examples on signaling procedures (release 1999). TR 25.931 v3.7.0.
  2. Abdelrahman, O. H. and Gelenbe, E. (2014). Signalling storms in 3G mobile networks. In IEEE International Conference on Communications (ICC'14), Communication and Information Systems Security Symposium, Sydney, Australia. Accepted for publication.
  3. Cao, Y. and Gelenbe, E. (1998). Autonomous search for mines. European Journal of Operational Research, 108(2):319-333.
  4. Choi, Y., Yoon, C.-h., Kim, Y.-s., Heo, S., and Silvester, J. (2014). The impact of application signaling traffic on public land mobile networks. Communications Magazine, IEEE, 52(1):166-172.
  5. Dimakis, N., Filippoupolitis, A., and Gelenbe, E. (2010). Distributed building evacuation simulator for smart emergency management. Comput. J., 53(9):1384- 1400.
  6. Filippoupolitis, A. and Gelenbe, E. (2009). A distributed decision support system for building evacuation. In Human System Interactions, 2009. HSI'09. 2nd Conference on, pages 323-330.
  7. Gelenbe, E. (1979). Probabilistic models of computer systems. Acta Inf., 12:285-303.
  8. Gelenbe, E., Gorbil, G., Tzovaras, D., Liebergeld, S., Garcia, D., Baltatu, M., and Lyberopoulos, G. (2013a). Security for smart mobile networks: The NEMESYS approach. In Proceedings of the 2013 IEEE Global High Tech Congress on Electronics (GHTCE'13).
  9. Gelenbe, E., Görbil, G., Tzovaras, D., Liebergeld, S., Garcia, D., Baltatu, M., and Lyberopoulos, G. L. (2013b). Nemesys: Enhanced network security for seamless service provisioning in the smart mobile ecosystem. In Gelenbe, E. and Lent, R., editors, ISCIS, volume 264 of Lecture Notes in Electrical Engineering, pages 369-378. Springer.
  10. Gelenbe, E. and Loukas, G. (2007). A self-aware approach to denial of service defence. Computer Networks, 51(5):1299-1314.
  11. Gelenbe, E., Schmajuk, N., Staddon, J., and Reif, J. (1997). Autonomous search by robots and animals: A survey. Robotics and Autonomous Systems, 22(1):23-34.
  12. Gelenbe, E. and Wu, F.-J. (2012). Large scale simulation for human evacuation and rescue. Computers & Mathematics with Applications, 64(12):3869-3880.
  13. Görbil, G. and Gelenbe, E. (2013). Disruption tolerant communications for large scale emergency evacuation. In PerCom Workshops, pages 540-546. IEEE.
  14. GSMA, S. A. P. (Apr 2012). Smart apps for smarter phones.
  15. Gupta, M., Jha, S., Koc, A., and Vannithamby, R. (2013). Energy impact of emerging mobile internet applications on lte networks: issues and solutions. Communications Magazine, IEEE, 51(2):90-97.
  16. Inc., S. (2013). Charting the signaling storms.
  17. Kambourakis, G., Kolias, C., Gritzalis, S., and Park, J. H. (2011). Dos attacks exploiting signaling in umts and ims. Comput. Commun., 34(3):226-235.
  18. Korhonen, J. (2003). Introduction to 3g mobile communications.
  19. Lee, P., Bu, T., and Woo, T. (2007). On the detection of signaling dos attacks on 3g wireless networks. In INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, pages 1289-1297.
  20. Marck, P. (2013). Iab - focus on mobile.
  21. Ramachandran, S. (2010). Web metrics: Size and number of resources.
  22. Ricciato, F., Coluccia, A., and DAlconzo, A. (2010). A review of dos attack models for 3g cellular networks from a system-design perspective. Computer Communications, 33(5):551 - 558.
  23. Wang, H., Zhang, D., and Shin, K. (2004). Change-point monitoring for the detection of dos attacks. Dependable and Secure Computing, IEEE Transactions on, 1(4):193-208.
  24. Wireless, R. (2012). Docomo demands google's help with signalling storm.
  25. Wu, Z., Zhou, X., and Yang, F. (2010). Defending against dos attacks on 3g cellular networks via randomization method. In Educational and Information Technology (ICEIT), 2010 International Conference on, volume 1, pages V1-504-V1-508.
  26. Yu, C.-M., Ni, G.-K., Chen, I.-Y., Gelenbe, E., and Kuo, S.-Y. (2014). Top-k query result completeness verification in tiered sensor networks. IEEE Transactions on Information Forensics and Security, 9(1):109-124.

Paper Citation

in Harvard Style

Pavloski M. and Gelenbe E. (2014). Signaling Attacks in Mobile Telephony . In Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014) ISBN 978-989-758-045-1, pages 206-212. DOI: 10.5220/0005019802060212

in Bibtex Style

author={Mihajlo Pavloski and Erol Gelenbe},
title={Signaling Attacks in Mobile Telephony},
booktitle={Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)},

in EndNote Style

JO - Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)
TI - Signaling Attacks in Mobile Telephony
SN - 978-989-758-045-1
AU - Pavloski M.
AU - Gelenbe E.
PY - 2014
SP - 206
EP - 212
DO - 10.5220/0005019802060212