How Can IoT Services Pose New Security Threats in Operational Cellular Networks?

Tian Xie, Guan Hua Tu*, Chi-Yu Li, Chunyi Peng

*此作品的通信作者

研究成果: Article同行評審

8 引文 斯高帕斯(Scopus)

摘要

Carriers are rolling out Internet of Things (IoT) services including various IoT devices and use scenarios. Compared with conventional non-IoT devices such as smartphones and tablets, IoT devices have limited network capabilities (e.g., low rates) and specific use scenarios (e.g., inside vehicles only). These specialized use scenarios lead to carries often offering cheaper device access fees for IoT devices. However, the aforementioned disparity of service charging between IoT and non-IoT devices may lead to security issues. In this work, we conduct the first empirical security study on cellular IoT service charging over two major US carriers and make three major contributions. First, we discover four security vulnerabilities and analyze their root causes, which help us identify two significant security threats, IoT masquerading and IoT use scenario abuse. Second, we devise three proof-of-concept attacks and assess their real-world impact. We determine that they can be exploited to allow adversaries to pay 43.75-80.00 percent less for cellular data services. Third, we analyze the challenges in addressing these vulnerabilities and develop an anti-abuse solution to mitigate attack incentives. The solution is standard-compliant and can be used immediately in practice. Our prototype and evaluation confirm its effectiveness.

原文English
文章編號9055084
頁(從 - 到)2592-2606
頁數15
期刊IEEE Transactions on Mobile Computing
20
發行號8
DOIs
出版狀態Published - 1 8月 2021

指紋

深入研究「How Can IoT Services Pose New Security Threats in Operational Cellular Networks?」主題。共同形成了獨特的指紋。

引用此