{"title":"Analysis of an adjacent 3G network corruption influence on WLAN/3G interworking access","authors":"R. Fouladi, Somayeh Salimi, Hossein Gharaee","doi":"10.1109/CASON.2011.6085936","DOIUrl":null,"url":null,"abstract":"In this article, we investigate the user access, i.e., the average number of times of a mobile user entrance, to a Wireless Local Area Network (WLAN) cell in a WLAN and third generation (3G) telecommunication coupled network when an attack causes harm to its adjacent network. The adjacent network is a 3G network. The considered attack is a removal attack that makes a 3G cell, in an adjacent network, disabled to support its services. To do the study, regular Markov chain model is applied. This study shows the dependency of user access to the structure of its adjacent network.","PeriodicalId":342597,"journal":{"name":"2011 International Conference on Computational Aspects of Social Networks (CASoN)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Computational Aspects of Social Networks (CASoN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CASON.2011.6085936","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this article, we investigate the user access, i.e., the average number of times of a mobile user entrance, to a Wireless Local Area Network (WLAN) cell in a WLAN and third generation (3G) telecommunication coupled network when an attack causes harm to its adjacent network. The adjacent network is a 3G network. The considered attack is a removal attack that makes a 3G cell, in an adjacent network, disabled to support its services. To do the study, regular Markov chain model is applied. This study shows the dependency of user access to the structure of its adjacent network.