The authors of this article have attempted to develop two new vulnerabilities in cellular data networks, namely those linked with interfering with services by crashing services and those that interfere with services by flooding (Traynor, McDaniel and La Porta, 2008).
Fundamentally, these two vulnerabilities are very much alike. They both come into effect from the very fact that cellular data networks are still circuit-switched. Vulnerabilities that bring about crashing can be explained as those weaknesses that give space for structural inflexibility thereby making it impossible to inhibit attacks. There are a number of crash-related vulnerabilities examples.
Delegate your assignment to our experts and they will do the rest.
Cellular data network architecture poses to be the main weak point insofar as crash-related vulnerabilities are concerned. The network architecture allows for interference between voice and data operations in devices such as mobile phones (Paul, Subramanian, Budhikot and Das, 2011). Another example is the commonly known data grouping method, packet switching. This method allows the serving of many users on a single physical channel simultaneously. At this point], denial of service is unavoidable.
Conversely, vulnerabilities that cause service flooding entail weak spots in data architecture that make it impossible to limit cellular data control, thereby causing malfunctioning ( Zhang, 2012 ). The instances here include teardown mechanisms. When this cellular mechanism is exploited, they cause traffic interference in the target device. This will ultimately lead to denial of service.
Another example of this type of vulnerability is interference of setup procedures. A cellular device has in its structure setup procedures that allow time intervals for transferring paging requests between users. This implies that resource reclamation must be delayed. As a result, the response rates can be easily interfered with thereby causing a denial of service (DoS).
References
Paul, U., Subramanian, A. P., Buddhikot, M. M., & Das, S. R. (2011, April). Understanding traffic dynamics in cellular data networks. In INFOCOM, 2011 Proceedings IEEE (pp. 882-890). IEEE.
Traynor, P., McDaniel, P., & La Porta, T. (2008). On Attack Causality in Internet-Connected Cellular Networks. Retrieved from https://www.cise.ufl.edu/~traynor/papers/traynor_usenix07.pdf .
Zhang, Y., & Årvidsson, A. (2012, August). Understanding the characteristics of cellular data traffic. In Proceedings of the 2012 ACM SIGCOMM workshop on Cellular networks: operations, challenges, and future design (pp. 13-18). ACM