The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Machine to Machine (M2M) systems are actively spreading, with mobile networks rapidly evolving to provide connectivity beyond smartphones and tablets. With billions of embedded devices expected to join cellular networks over the next few years, novel applications are emerging and contributing to the Internet of Things (IoT) paradigm. The new generation of mobile networks, the Long Term Evolution (LTE),...
The emergence of the Internet of Things (IoT) introduces a vast ecosystem of new network-enabled objects. Although most current cellular IoT services run over 2G and 3G cellular networks, the Long Term Evolution (LTE) is expected to be one of the main platforms for the emergence of new Machine to Machine (M2M) communication systems. Cellular communication protocols were designed and optimized to handle...
LTE (Long Term Evolution) is the latest cellular communications standard to provide advanced mobile services that go beyond traditional voice and short messaging traffic. Mobility networks are experiencing a drastic evolution with the advent of Machine to Machine (M2M) systems and the Internet of Things (IoT), which is expected to result in billions of connected devices in the near future. In parallel,...
Voice traffic termination fraud, often referred to as Subscriber Identity Module box (SIMbox) fraud, is a common illegal practice on mobile networks. As a result, cellular operators around the globe lose billions annually. Moreover, SIMboxes compromise the cellular network infrastructure by overloading local base stations serving these devices. This paper analyzes the fraudulent traffic from SIMboxes...
Communication networks are rapidly evolving with connectivity reaching far beyond cell-phones, computers and tablets. Novel applications are emerging based on the widespread presence of network-enabled sensors and actuators. Machine-to-Machine (M2M) devices such as power meters, medical sensors and asset tracking appliances provide a new dimension to telecommunication services. The majority of these...
As smart phones increase in popularity, they become an attractive target for attackers and spammers. This paper presents a new simulation model that evaluates the effects of an SMS-based malware infection in GSM and UMTS networks. It is the first known work that accounts for the wireless link of the network in modeling of malware propagation. The paper demonstrates propagation of the SMS-transmitted...
In recent years, enterprises have been facing a growing number of highly customized attacks using sophisticated techniques that seek to compromise important company assets. In this paper, we propose a multi-layer deception system that provides an in depth defense against such sophisticated attacks. Specifically, based on previous knowledge and patterns of such attacks, we model the attacker as trying...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.