Countering mobile signaling storms with counters

File Description SizeFormat 
Countering.pdfAccepted version363.29 kBAdobe PDFView/Open
Title: Countering mobile signaling storms with counters
Authors: Gelenbe, E
Abdelrahman, OH
Item Type: Conference Paper
Abstract: Mobile Networks are subject to signaling storms launched by misbehaving applications or malware, which result in bandwidth overload at the cell level and excessive signaling within the mobile operator, and may also deplete the battery power of mobile devices. This paper reviews the causes of signaling storms and proposes a novel technique for storm detection and mitigation. The approach is based on counting the number of successive signaling transitions that do not utilize allocated bandwidth, and temporarily blocking mobile devices that exceed a certain threshold to avoid overloading the network. Through a mathematical analysis, we derive the optimum value of the counter’s threshold, which minimizes both the number of misbehaving mobiles and the signaling overload in the network. Simulation results are provided to illustrate the effectiveness of the proposed scheme.
Editors: Mandler, B
MarquezBarja, J
Campista, MEM
Caganova, D
Chaouchi, H
Zeadally, S
Badra, M
Giordano, S
Fazio, M
Somov, A
Vieriu, RL
Issue Date: 18-Oct-2016
Date of Acceptance: 27-Oct-2015
URI: http://hdl.handle.net/10044/1/51305
DOI: https://dx.doi.org/10.1007/978-3-319-47063-4_18
ISBN: 978-3-319-47062-7
ISSN: 1867-8211
Publisher: Springer Verlag (Germany)
Start Page: 199
End Page: 209
Journal / Book Title: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Volume: 169
Copyright Statement: © ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2016
Sponsor/Funder: Commission of the European Communities
Funder's Grant Number: 317888 - NEMESYS
Conference Name: 2nd International Summit on Internet of Things - IoT Infrastructures( IoT 360)
Keywords: Science & Technology
Technology
Computer Science, Information Systems
Computer Science, Software Engineering
Computer Science, Theory & Methods
Telecommunications
Computer Science
Signaling overload
Radio resource control
M2M
IoT
Application malfunctions
Malware
QoS
NETWORKS
Publication Status: Published
Start Date: 2015-10-27
Finish Date: 2015-10-29
Conference Place: Rome, ITALY
Appears in Collections:Faculty of Engineering
Electrical and Electronic Engineering



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Creative Commonsx