A proactive defense mechanism for mobile communication user data

被引:0
|
作者
Caixia LIU [1 ]
Xinsheng JI [1 ]
Jiangxing WU [1 ]
Xiao QIN [2 ]
机构
[1] The National Digital Switching System Engineering & Technological R&D Center
[2] Department of Computer Science and Software Engineering, Samuel Ginn College of Engineering,Auburn University
基金
美国国家科学基金会;
关键词
A proactive defense mechanism for mobile communication user data; MSISDN;
D O I
暂无
中图分类号
TN929.5 [移动通信];
学科分类号
080402 ; 080904 ; 0810 ; 081001 ;
摘要
Dear editor,Several studies have recently reported on major vulnerabilities in the Signaling System No.7 (SS7)used in mobile networks [1, 2]. The reported vulnerabilities and security issues would lead to the illegal acquisition and tampering of mobile communication user data, known as cellphone user data. The cellphone user data contain important information such as identity identification, location identification, security parameter-set. Due to
引用
收藏
页码:266 / 268
页数:3
相关论文
共 50 条
  • [31] Activity-Based Proactive Data Management in Mobile Environments
    Wu, Shiow-yang
    Fan, Hsiu-Hao
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2010, 9 (03) : 390 - 404
  • [32] HOLSR: A hierarchical proactive routing mechanism for mobile ad hoc networks
    Villasenor-Gonzalez, L
    Ge, Y
    Lamont, L
    IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (07) : 118 - 125
  • [33] A Defense Mechanism Against Timing Attacks on User Privacy in ICN
    Sivaraman, Vignesh
    Sikdar, Biplab
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 29 (06) : 2709 - 2722
  • [34] Enhancing authentication mechanism with mobile agent in mobile communication system
    Deng, W
    Chen, MQ
    Ai, B
    IEEE VEHICULAR TECHNOLOGY CONFERENCE, FALL 2000, VOLS 1-6, PROCEEDINGS: BRINGING GLOBAL MOBILITY TO THE NETWORK AGE, 2000, : 1956 - 1959
  • [35] VehiCaching: Embracing User Request on Vehicle Route with Proactive Data Transportation
    Shin, Wonkwang
    Min, Byoung-Yoon
    Kim, Dong Ku
    2015 IEEE 81ST VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2015,
  • [36] Eager Data Transfer Mechanism for Reducing Communication Latency in User-Level Network Protocols
    Won, Chulho
    Lee, Ben
    Park, Kyoung
    Kim, Myung-Joon
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2008, 4 (04): : 133 - 144
  • [37] Mining context history for generating user models for proactive personalized mobile networking applications
    An, Wei
    Liu, Qihua
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 638 - +
  • [38] Botnets and proactive system defense
    Bambenek, John
    Klus, Agnes
    BOTNET DETECTION: COUNTERING THE LARGEST SECURITY THREAT, 2008, 36 : 117 - 130
  • [39] A Transformer-Based User Satisfaction Prediction for Proactive Interaction Mechanism in DuerOS
    Shen, Wei
    He, Xiaonan
    Zhang, Chuheng
    Zhang, Xuyun
    Xie, Jian
    PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2022, 2022, : 1777 - 1786
  • [40] Mobile User Location Tracking with Unreliable Data
    Zouaoui, Samia
    Bachir, Abdelmalik
    MODELLING AND IMPLEMENTATION OF COMPLEX SYSTEMS, MISC 2016, 2016, : 261 - 277