TY - JOUR
T1 - Dissecting Operational Cellular IoT Service Security
T2 - Attacks and Defenses
AU - Wang, Sihan
AU - Xie, Tian
AU - Chen, Min Yue
AU - Tu, Guan Hua
AU - Li, Chi Yu
AU - Lei, Xinyu
AU - Chou, Po Yi
AU - Hsieh, Fucheng
AU - Hu, Yiwen
AU - Xiao, Li
AU - Peng, Chunyi
N1 - Publisher Copyright:
© 1993-2012 IEEE.
PY - 2024/4/1
Y1 - 2024/4/1
N2 - More than 150 cellular networks worldwide have rolled out LTE-M (LTE-Machine Type Communication) and/or NB-IoT (Narrow Band Internet of Things) technologies to support massive IoT services such as smart metering and environmental monitoring. Such cellular IoT services share the existing cellular network architecture with non-IoT (e.g., smartphone) ones. When they are newly integrated into the cellular network, new security vulnerabilities may happen from imprudent integration. In this work, we explore the security vulnerabilities of the cellular IoT from both system-integrated and service-integrated aspects. We discover several vulnerabilities spanning cellular standard design defects, network operation slips, and IoT device implementation flaws. Threateningly, they allow an adversary to remotely identify IP addresses and phone numbers assigned to cellular IoT devices, interrupt their power saving services, and launch various attacks, including data/text spamming, battery draining, device hibernation against them. We validate these vulnerabilities over five major cellular IoT carriers in the U.S. and Taiwan using their certified cellular IoT devices. The attack evaluation result shows that the adversary can raise an IoT data bill by up to {\}226 with less than 120 MB spam traffic, increase an IoT text bill at a rate of {\}5 per second, and prevent an IoT device from entering/leaving power saving mode; moreover, cellular IoT devices may suffer from denial of IoT services. We finally propose, prototype, and evaluate recommended solutions.
AB - More than 150 cellular networks worldwide have rolled out LTE-M (LTE-Machine Type Communication) and/or NB-IoT (Narrow Band Internet of Things) technologies to support massive IoT services such as smart metering and environmental monitoring. Such cellular IoT services share the existing cellular network architecture with non-IoT (e.g., smartphone) ones. When they are newly integrated into the cellular network, new security vulnerabilities may happen from imprudent integration. In this work, we explore the security vulnerabilities of the cellular IoT from both system-integrated and service-integrated aspects. We discover several vulnerabilities spanning cellular standard design defects, network operation slips, and IoT device implementation flaws. Threateningly, they allow an adversary to remotely identify IP addresses and phone numbers assigned to cellular IoT devices, interrupt their power saving services, and launch various attacks, including data/text spamming, battery draining, device hibernation against them. We validate these vulnerabilities over five major cellular IoT carriers in the U.S. and Taiwan using their certified cellular IoT devices. The attack evaluation result shows that the adversary can raise an IoT data bill by up to {\}226 with less than 120 MB spam traffic, increase an IoT text bill at a rate of {\}5 per second, and prevent an IoT device from entering/leaving power saving mode; moreover, cellular IoT devices may suffer from denial of IoT services. We finally propose, prototype, and evaluate recommended solutions.
KW - Cellular IoT
KW - power saving mode
KW - security
KW - service charging
UR - http://www.scopus.com/inward/record.url?scp=85181579550&partnerID=8YFLogxK
U2 - 10.1109/TNET.2023.3313557
DO - 10.1109/TNET.2023.3313557
M3 - Article
AN - SCOPUS:85181579550
SN - 1063-6692
VL - 32
SP - 1229
EP - 1244
JO - IEEE/ACM Transactions on Networking
JF - IEEE/ACM Transactions on Networking
IS - 2
ER -