Full metadata record
DC FieldValueLanguage
dc.contributor.authorXie, Tianen_US
dc.contributor.authorLi, Chi-Yuen_US
dc.contributor.authorTang, Jiliangen_US
dc.contributor.authorTu, Guan-Huaen_US
dc.date.accessioned2020-05-05T00:01:56Z-
dc.date.available2020-05-05T00:01:56Z-
dc.date.issued2018-01-01en_US
dc.identifier.isbn978-1-5386-3180-5en_US
dc.identifier.issn1550-3607en_US
dc.identifier.urihttp://hdl.handle.net/11536/153992-
dc.description.abstractLTE networks are rolling out cellular Internetof-Things (IoT) services. Cellular-connected IoT devices are becoming increasingly popular and the number is forecasted to grow almost fourfold from 2015 to 2021. Since they share the same infrastructure with non-IoT devices such as smartphones, we may expect no big differences between them in terms of voice/data service accounting/charging (e.g., paying for what you get) and security risks. However, our study shows that cellular IoT users may pay more than what they get, as well as are vulnerable to voice signaling spams and thus suffer from an overcharging attack which leads to financial loss or denial of service. We validate our proof-of-concept attack in a major U.S. cellular network operator which takes higher than 35% market share. We finally propose a solution to address the identified security vulnerabilities.en_US
dc.language.isoen_USen_US
dc.titleHow Voice Service Threatens Cellular-Connected IoT Devices in the Operational 4G LTE Networksen_US
dc.typeProceedings Paperen_US
dc.identifier.journal2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)en_US
dc.citation.spage0en_US
dc.citation.epage0en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000519271300113en_US
dc.citation.woscount0en_US
Appears in Collections:Conferences Paper