“…Examples of such events include outages in mobile cloud services [31,8] and in VoIP peer-to-peer networks [9]. During those incidents, a large number of mobile devices attempt to recover connectivity to the application servers, generating significantly more keep-alive messages [5] and an unexpectedly high signaling load in the process.…”
Abstract. Mobile Networks are subject to signaling storms launched by misbehaving applications or malware, which result in bandwidth overload at the cell level and excessive signaling within the mobile operator, and may also deplete the battery power of mobile devices. This paper reviews the causes of signaling storms and proposes a novel technique for storm detection and mitigation. The approach is based on counting the number of successive signaling transitions that do not utilize allocated bandwidth, and temporarily blocking mobile devices that exceed a certain threshold to avoid overloading the network. Through a mathematical analysis, we derive the optimum value of the counter's threshold, which minimizes both the number of misbehaving mobiles and the signaling overload in the network. Simulation results are provided to illustrate the effectiveness of the proposed scheme.
“…Examples of such events include outages in mobile cloud services [31,8] and in VoIP peer-to-peer networks [9]. During those incidents, a large number of mobile devices attempt to recover connectivity to the application servers, generating significantly more keep-alive messages [5] and an unexpectedly high signaling load in the process.…”
Abstract. Mobile Networks are subject to signaling storms launched by misbehaving applications or malware, which result in bandwidth overload at the cell level and excessive signaling within the mobile operator, and may also deplete the battery power of mobile devices. This paper reviews the causes of signaling storms and proposes a novel technique for storm detection and mitigation. The approach is based on counting the number of successive signaling transitions that do not utilize allocated bandwidth, and temporarily blocking mobile devices that exceed a certain threshold to avoid overloading the network. Through a mathematical analysis, we derive the optimum value of the counter's threshold, which minimizes both the number of misbehaving mobiles and the signaling overload in the network. Simulation results are provided to illustrate the effectiveness of the proposed scheme.
“…The underlying communication is TCP based with a keep-alive interval of 180 s. As indicated by Choi et al [13] keep-alive intervals in common implementations fluctuate between 30 s and 10 minutes. Our keep-alive interval was arbitrary selected and has empirically shown to result in a stable connection.…”
Section: ) Pushkommentioning
confidence: 99%
“…Choi et al [13] study the impact of mobile Internet applications on the signaling traffic and thus, the impact on the overall mobile network traffic that mobile network operators have to handle. The authors highlight that applications force the radio resource frequently to change between connected and idle states, which in return causes the signaling overhead.…”
An increasing number of modern smartphone applications are dependent on information updates from the cloud. To realize such information updates mainly two communication approaches are common, namely push-and pull. Due to different communication patterns both approaches differ in their energy consumption and notification latency. The energy constrained nature of mobile devices entails a sensible selection of the appropriate notification approach. In this paper we provide an evaluation of the energy consumption of both communication approaches. Based on this we provide a transition approach that is able to use the best of both, low latency and low energy consumption. Our results show that energy savings of up to 7 % of the total smartphone battery per day can be achieved by switching between both approaches, depending on the context.
“…signaling storms are mainly caused by misbehaving mobile apps that repeatedly establish and teardown data connections [14] with a serious effect on the QoS of the network control plane [15], and many events have been reported to illustrate such attacks [5]- [8]. Similar events have also been observed for mobile devices that seek to connect to Cloud services [9], [16]. Thus significant efforts are required to be made to understand the security of mobile connections, making them resilient and reliable in the face of malicious apps [17].…”
Abstract-Mobile Networks are subject to "signaling storms" launched by malware or apps, which overload the the bandwidth at the cell, the backbones signaling servers, and Cloud servers, and may also deplete the battery power of mobile devices. This paper reviews the subject and discusses a novel technique to detect and mitigate such signaling storms. Through a mathematical analysis we introduce a technique based on tracking time-out transitions in the signaling system that can substantially reduce both the number of attacked mobiles and the signaling overload in the backbone.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.