Unique Vulnerabilities and Attacks on Cellular Data Packet Services
نویسندگان
چکیده
As cellular data services and applications are being widely deployed, they become attractive targets for attackers, who could exploit unique vulnerabilities in cellular networks, mobile devices, and the interaction between cellular data networks and the Internet. Furthermore, mobile devices, often times considered to be part of the cellular network’s trusted computing base (TCB), are becoming more vulnerable to attacks. This thesis presents several vulnerabilities on the cellular data packet services and its applications, and present two particular denial of service attacks. First, we demonstrate an attack, which surreptitiously drains mobile devices’ battery power up to 22 times faster and therefore could render these devices useless before the end of business hours. This attack targets a unique resource bottleneck in mobile devices (the battery power) by exploiting an insecure cellular data service (MMS) and the insecure interaction between cellular data networks and the Internet (PDP context retention and the paging channel). Second, we propose a series of attacks on 3G cellular packet services that exploit the unverified channel condition reports from mobile devices to their base stations, and user-initiated handoffs. Our simulations show that only five rogue devices per cell can use up over 90% of the network resource, and thus induce and perpetuate 2.1s end-to-end inter-packet transmission delay for every user in the cell. This thesis also presents several mitigation strategies to defend against not only the two aforementioned attacks, but also similar attacks of these type.
منابع مشابه
IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملA survey on RPL attacks and their countermeasures
RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...
متن کاملImpacts and solutions of control packets vulnerabilities with IEEE 802.11 MAC
In this paper, we focus on the Medium Access Control (MAC), particularly the IEEE 802.11 and we deal with some hidden vulnerabilities based on the control packets CTS (Clear to Send) and ACK. Through these vulnerabilities, we show two new smart attacks which were not dealt by the solutions proposed recently like the attack based on the RTS (Request to Send) packet vulnerability. The malicious n...
متن کاملGaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission
Packet retransmission is a fundamental TCP mechanism that ensures reliable data transfer between two end nodes. Interestingly, when it comes to cellular data accounting, TCP retransmissions create an important policy issue giving rise to a tension between ISPs accounting for network resource consumption, and users only being aware of the application layer data. Regardless of the policies, we fi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007