完整後設資料紀錄
DC 欄位語言
dc.contributor.authorXie, Tianen_US
dc.contributor.authorTu, Guan-Huaen_US
dc.contributor.authorLi, Chi-Yuen_US
dc.contributor.authorPeng, Chunyien_US
dc.contributor.authorLi, Jiaweien_US
dc.contributor.authorZhang, Mien_US
dc.date.accessioned2019-04-02T06:04:52Z-
dc.date.available2019-04-02T06:04:52Z-
dc.date.issued2018-01-01en_US
dc.identifier.issn2474-025Xen_US
dc.identifier.urihttp://hdl.handle.net/11536/150792-
dc.description.abstractAll of four major U.S. operators have rolled out nationwide Wi-Fi calling services. They are projected to surpass VoLTE (Voice over LTE) and other VoIP services in terms of mobile IP voice usage minutes in 2018. They enable mobile users to place cellular calls over Wi-Fi networks based on the 3GPP IMS (IP Multimedia Subsystem) technology. Compared with conventional cellular voice solutions, the major difference lies in that their traffic traverses untrustful Wi-Fi networks and the Internet. This exposure to insecure networks may cause the Wi-Fi calling users to suffer from security threats. Its security mechanisms are similar to the VoLTE, because both of them are supported by the IMS. They include SIM-based security, 3GPP AKA (Authentication and Key Agreement), IPSec (Internet Protocol Security), etc. However, are they sufficient to secure Wi-Fi calling services? Unfortunately, our study yields a negative answer. In this work, we explore security issues of the operational Wi-Fi calling services in three major U.S. operators' networks using commodity devices. We disclose that current Wi-Fi calling security is not bullet-proof. We uncover four vulnerabilities which stem from improper standard designs, device implementation issues and network operation slips. By exploiting them, we devise two proof-of-concept attacks: user privacy leakage and telephony harassment or denial of voice service (THDoS); they can bypass the security defenses deployed on both mobile devices and network infrastructure. We have confirmed their feasibility and simplicity using real-world experiments, as well as assessed their potential damages and proposed recommended solutions.en_US
dc.language.isoen_USen_US
dc.titleThe Dark Side of Operational Wi-Fi Calling Servicesen_US
dc.typeProceedings Paperen_US
dc.identifier.journal2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS)en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000449531900012en_US
dc.citation.woscount0en_US
顯示於類別:會議論文