About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Internet of Things. IoT Infrastructures. Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I

Research Article

Countering Mobile Signaling Storms with Counters

Download(Requires a free EAI acccount)
329 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-319-47063-4_18,
        author={Erol Gelenbe and Omer Abdelrahman},
        title={Countering Mobile Signaling Storms with Counters},
        proceedings={Internet of Things. IoT Infrastructures. Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I},
        proceedings_a={IOT360},
        year={2017},
        month={1},
        keywords={Signaling overload Radio resource control M2M IoT Application malfunctions Malware QoS},
        doi={10.1007/978-3-319-47063-4_18}
    }
    
  • Erol Gelenbe
    Omer Abdelrahman
    Year: 2017
    Countering Mobile Signaling Storms with Counters
    IOT360
    Springer
    DOI: 10.1007/978-3-319-47063-4_18
Erol Gelenbe1,*, Omer Abdelrahman1,*
  • 1: Imperial College
*Contact email: e.gelenbe@imperial.ac.uk, o.abd06@imperial.ac.uk

Abstract

Mobile Networks are subject to signaling storms launched by misbehaving applications or malware, which result in bandwidth overload at the cell level and excessive signaling within the mobile operator, and may also deplete the battery power of mobile devices. This paper reviews the causes of signaling storms and proposes a novel technique for storm detection and mitigation. The approach is based on counting the number of successive signaling transitions that do not utilize allocated bandwidth, and temporarily blocking mobile devices that exceed a certain threshold to avoid overloading the network. Through a mathematical analysis, we derive the optimum value of the counter’s threshold, which minimizes both the number of misbehaving mobiles and the signaling overload in the network. Simulation results are provided to illustrate the effectiveness of the proposed scheme.

Keywords
Signaling overload Radio resource control M2M IoT Application malfunctions Malware QoS
Published
2017-01-05
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-319-47063-4_18
Copyright © 2015–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL