How Can IoT Services Pose New Security Threats in Operational Cellular Networks?

Tian Xie, Guan Hua Tu*, Chi-Yu Li, Chunyi Peng

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

8 Scopus citations

Abstract

Carriers are rolling out Internet of Things (IoT) services including various IoT devices and use scenarios. Compared with conventional non-IoT devices such as smartphones and tablets, IoT devices have limited network capabilities (e.g., low rates) and specific use scenarios (e.g., inside vehicles only). These specialized use scenarios lead to carries often offering cheaper device access fees for IoT devices. However, the aforementioned disparity of service charging between IoT and non-IoT devices may lead to security issues. In this work, we conduct the first empirical security study on cellular IoT service charging over two major US carriers and make three major contributions. First, we discover four security vulnerabilities and analyze their root causes, which help us identify two significant security threats, IoT masquerading and IoT use scenario abuse. Second, we devise three proof-of-concept attacks and assess their real-world impact. We determine that they can be exploited to allow adversaries to pay 43.75-80.00 percent less for cellular data services. Third, we analyze the challenges in addressing these vulnerabilities and develop an anti-abuse solution to mitigate attack incentives. The solution is standard-compliant and can be used immediately in practice. Our prototype and evaluation confirm its effectiveness.

Original languageEnglish
Article number9055084
Pages (from-to)2592-2606
Number of pages15
JournalIEEE Transactions on Mobile Computing
Volume20
Issue number8
DOIs
StatePublished - 1 Aug 2021

Keywords

  • Cellular network
  • IoT
  • and charging
  • security

Fingerprint

Dive into the research topics of 'How Can IoT Services Pose New Security Threats in Operational Cellular Networks?'. Together they form a unique fingerprint.

Cite this