Breaking Cellular IoT with Forged Data-plane Signaling: Attacks and Countermeasure

نویسندگان

چکیده

We devise new attacks exploiting the unprotected data-plane signaling in cellular IoT networks (a.k.a. both NB-IoT and Cat-M). show that, despite deployed security mechanisms on control-plane packet forwarding, novel are still feasible. The attacker can forge uplink downlink messages that pass current checks used by receiver. With capability of forging messages, launch exhibit a variety attack forms beyond simplistic packet-blasting, denial-of-service (DoS) threats, including location privacy breach, delivery loop, prolonged data delivery, throughput limiting, radio resource draining, connection reset, multicast disabling. Our testbed evaluation operational network validation have confirmed viability. To combat threat, we further propose defense solution within 3GPP C-IoT standard framework. It leverages synchronized timer clock information to protect with low overhead.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Threshold Implementation as a Countermeasure against Power Analysis Attacks

One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...

متن کامل

Countermeasure for collusion attacks against digital watermarking

Customer identification watermarking today is one of the most promising application domains of digital watermarking. It enables to identify individual copies of otherwise indistinguishable digital copies. If done without any precautions, those individual watermarking are vulnerable to a number of specialized attacks based on an attacker collecting more than one individual copy. Fingerprinting a...

متن کامل

Leakage Squeezing Countermeasure against High-Order Attacks

In the recent years, side channel attacks have been widely investigated. In particular, second order attacks (2O-attacks) have been improved and successfully applied to break many masked implementations. In this context we propose a new concept to hinder attacks of all order: instead of injecting more entropy, we make the most of a single-mask entropy. With specially crafted bijections instanti...

متن کامل

Metal-Induced Oxidative Stress and Cellular Signaling Alteration in Animals

Contamination by heavy metals has attracted increasing attention considering the ability of these elements in producing serious consequence to ecosystem, and especially on animals health. Due to their widespread use in human activities such as industry, agriculture and even as medicine (e.g. arsenic, selenium and platinum), numerous health risks may be associated with exposure to these substanc...

متن کامل

System Design, Investigation and Countermeasure of Phishing Attacks using Data Mining Classification Methods and its Analysis

The phishing is a kind of e-commerce lure which is intended to steal the confidential information of the internet user by making identical website of legitimate one in which the contents and images most likely remains similar to the legitimate website. The other way of phishing website is to do minor changes in the URL or in the domain of the website. In this paper, an anti-phishing system is p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Sensor Networks

سال: 2022

ISSN: ['1550-4859', '1550-4867']

DOI: https://doi.org/10.1145/3534124