Advertisement

A Taxonomy of Cyber Attacks on 3G Networks

  • Kameswari Kotapati
  • Peng Liu
  • Yan Sun
  • Thomas F. LaPorta
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3495)

Abstract

Early first and second generation (1G and 2G, respectively) wireless telecommunication networks were isolated in the sense that their signaling and control infrastructure was not directly accessible to end subscribers. The vision of the next generation 3G wireless telecommunication network is to use IP technologies for control and transport. The introduction of IP technologies has opened up a new generation of IP-based services that must interwork with traditional 3G wireless telecommunication networks. Cross Network Services will use a combination of Internet-based data and data from the wireless telecommunication network to provide services to the wireless subscriber. They will be multi-vendor, multi-domain, and will cater to a wide variety of needs. An example of such a Cross Network Service is the Email Based Call Forwarding Service (CFS), where the status of the subscriber’s email inbox is used to trigger call forwarding in the wireless telecommunication network.

Keywords

Service Logic Network Entity Wireless Telecommunication Voice Mail Control Infrastructure 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Kameswari Kotapati
    • 1
  • Peng Liu
    • 1
  • Yan Sun
    • 1
  • Thomas F. LaPorta
    • 1
  1. 1.The Pennsylvania State UniversityUniversity Park

Personalised recommendations