Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
173 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Investigating Threats Posed by SMS Origin Spoofing to IoT Devices (2310.11052v3)

Published 17 Oct 2023 in cs.CR

Abstract: The short message service (SMS) is a service for exchanging texts via mobile networks that has been developed not only as a means of text communication between subscribers but also as a means to remotely manage Internet of Things (IoT) devices. However, the originating number of an SMS can be spoofed. If IoT devices authenticate administrators based on the originating number of an SMS, the authentication is bypassed via SMS origin spoofing. Consequently, IoT devices are at risk of accepting commands from attackers and performing unauthorized actions. Accordingly, in this study, the specifications of major cellular IoT gateways were evaluated by focusing on remote management via SMS, and the authentication bypass hypothesis was verified. The results showed that 25 of the 32 targeted products supported SMS-based remote management, and 20 implemented authentication based on the originating number of the SMS. Furthermore, by spoofing the originating number of the SMS, one product was demonstrated to be remotely exploitable through authentication bypassing. Thus, this study revealed the threats posed by SMS origin spoofing to IoT devices and proved that SMS origin spoofing not only threatens text communication between people but also puts machine communication at risk.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (45)
  1. 3GPP. 1999. TS23.040: Technical realization of the Short Message Service (SMS).
  2. 3GPP. 2010. TR23.888: System improvements for Machine-Type Communications (MTC).
  3. 3GPP. 2016. Standards for the IoT. https://www.3gpp.org/news-events/3gpp-news/iot-r14
  4. SMSPROTECT: An automatic smishing detection mobile application. ICT Express 9, 2 (2023), 168–176. https://doi.org/10.1016/j.icte.2022.05.009
  5. Open Mobile Alliance. 2010. OMA-TS-DM_Security-V1_3-20100525-C: OMA Device Management Security.
  6. Open Mobile Alliance. 2016. OMA-TS-DM_Protocol-V1_3-20160524-A: OMA Device Management Protocol.
  7. SoK: Security Evaluation of Home-Based IoT Deployments. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, San Francisco, CA, USA, 1362–1380. https://doi.org/10.1109/SP.2019.00013
  8. Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, Canada, 1093–1110. https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis
  9. PETIoT: PEnetration Testing the Internet of Things. Internet of Things 22 (2023), 100707. https://doi.org/10.1016/j.iot.2023.100707
  10. Firmware Update Attacks and Security for IoT Devices: Survey. In Proceedings of the ArabWIC 6th Annual International Conference Research Track (ArabWIC 2019). Association for Computing Machinery, New York, NY, USA, Article 4, 6 pages. https://doi.org/10.1145/3333165.3333169
  11. Squire Technologies Blog. [n. d.]. Why SMS is Purpose Built for IoT. Retrieved August 12, 2023 from https://squire-technologies.co.uk/blog/why-sms-is-purpose-built-for-iot-3
  12. Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures. IEEE Communications Surveys & Tutorials 22, 1 (2020), 616–644. https://doi.org/10.1109/COMST.2019.2953364
  13. MB connect line. 2022. Manual mbNET (MDH810 – MDH859 + MDH871 + MDH 876) - from HW 02. https://mbconnectline.com/download/manual-mbnet-mdh810-mdh859-mdh871-mdh-876-from-hw-02/
  14. Smart logistics based on the internet of things technology: an overview. International Journal of Logistics Research and Applications 24, 4 (2021), 323–345. https://doi.org/10.1080/13675567.2020.1757053
  15. Automatic Verification and Execution of Cyber Attack on IoT Devices. Sensors 23, 2 (2023), 733. https://doi.org/10.3390/s23020733
  16. GSA. 2023. NB-IoT & LTE-M March-2023 – Summary. https://gsacom.com/paper/nb-iot-lte-m-march-2023-summary/
  17. GSMA. 2018. The Internet of Things by 2025. https://www.gsma.com/iot/wp-content/uploads/2018/08/GSMA-IoT-Infographic-2019.pdf
  18. Ng Huiwen. 2018. Police warn of phishing scams targeting DBS Bank customers via SMS. The Straits Times. https://www.straitstimes.com/singapore/police-warn-of-phishing-scams-targeting-dbs-bank-customers-via-sms
  19. Security threats in M2M networks: a survey with case study. Computer Systems Science and Engineering 270 (2016).
  20. Akaki I/O. 2022. Analysis and Reproduction of Spoofed SMS-DELIVER. https://akaki.io/2022/analysis_and_reproduction_of_spoofed_sms-deliver
  21. Ankit Kumar Jain and B.B. Gupta. 2018. Rule-Based Framework for Detection of Smishing Messages in Mobile Environment. Procedia Computer Science 125 (2018), 617–623. https://doi.org/10.1016/j.procs.2017.12.079
  22. S-Detector: an enhanced security model for detecting Smishing attack for mobile computing. Telecommunication Systems 66 (2017), 29–38. https://doi.org/10.1007/s11235-016-0269-9
  23. Mike Just. 2011. Challenge-Response Identification. Springer US, Boston, MA, 198–199. https://doi.org/10.1007/978-1-4419-5906-5_73
  24. Securing IoT Devices Against Emerging Security Threats: Challenges and Mitigation Techniques. Journal of Cyber Security Technology (2023), 1–25. https://doi.org/10.1080/23742917.2023.2228053
  25. Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, San Francisco, CA, USA, 1153–1168. https://doi.org/10.1109/SP.2019.00038
  26. A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects. Computers & Security 112 (2022), 102498. https://doi.org/10.1016/j.cose.2021.102498
  27. Lantronix. 2023. X300 Series IoT Cellular Gateway User Guide. https://cdn.lantronix.com/wp-content/uploads/pdf/PMD-00153B-X300-UG-release.pdf
  28. Structural health monitoring of civil engineering structures by using the internet of things: A review. Journal of Building Engineering 48 (2022), 103954. https://doi.org/10.1016/j.jobe.2021.103954
  29. Sandhya Mishra and Devpriya Soni. 2020. Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis. Future Generation Computer Systems 108 (2020), 803–815. https://doi.org/10.1016/j.future.2020.03.021
  30. Moxa. 2022. OnCell 3120-LTE-1 User’s Manual. https://cdn-cms.azureedge.net/getmedia/072255dc-19e6-455d-9aa6-14bd6b2bdff0/moxa-oncell-3120-lte-1-series-manual-v1.3.pdf
  31. Teltonika Networks. [n. d.]. RUT241 - 4G/LTE Wi-Fi Router. Retrieved August 12, 2023 from https://teltonika-networks.com/products/routers/rut241/
  32. oneM2M. 2019. TS-0005-V3.5.1: Management Enablement (OMA).
  33. Peter Pistek and Martin Hudec. 2020. Using sms for communication with IoT devices. Mobile Networks and Applications 25, 3 (2020), 896–903. https://doi.org/10.1007/s11036-020-01520-8
  34. CatalanGate: Extensive Mercenary Spyware Operation against Catalans Using Pegasus and Candiru. The Citizen Lab. https://citizenlab.ca/2022/04/catalangate-extensive-mercenary-spyware-operation-against-catalans-using-pegasus-candiru/
  35. SMS.to. 2023. International SMS Sender ID regulations and requirements (list of countries). https://support.sms.to/support/solutions/articles/43000562659-international-sms-sender-id-regulations-and-requirements-list-of-countries-
  36. Mathew Solnik and Marc Blanchou. 2014. Cellular exploitation on a global scale: The rise and fall of the control protocol. Black Hat USA. https://www.blackhat.com/docs/us-14/materials/us-14-Solnik-Cellular-Exploitation-On-A-Global-Scale-The-Rise-And-Fall-Of-The-Control-Protocol.pdf
  37. Toward Automatically Connecting IoT Devices with Vulnerabilities in the Wild. ACM Trans. Sen. Netw. 20, 1, Article 6 (2023), 26 pages. https://doi.org/10.1145/3608951
  38. Fredrik Stålbrand. 2022. The Global Cellular IoT Gateway Market. Berg Insight. https://media.berginsight.com/2022/10/31230209/bi-terminal6-ps.pdf
  39. {{\{{ATtention}}\}} Spanned: Comprehensive Vulnerability Analysis of {{\{{AT}}\}} Commands Within the Android Ecosystem. In 27th USENIX security symposium (USENIX security 18). USENIX Association, Baltimore, MD, USA, 273–290. https://www.usenix.org/conference/usenixsecurity18/presentation/tian
  40. Rory Tingle. 2020. Royal Mail warns of text scam claiming to offer free iPhone 11 Pro. Mail Online. https://www.dailymail.co.uk/news/article-7801183/Royal-Mail-warns-text-scam-claiming-offer-free-iPhone-11-Pro.html
  41. Akaki Tsunoda. 2024. Demonstrating Spoofability of an Originating Number when Sending an SMS using SMPP. Digital Threats 5, 1, Article 12 (2024), 13 pages. https://doi.org/10.1145/3615667
  42. New Security Threats Caused by IMS-Based SMS Service in 4G LTE Networks. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS ’16). Association for Computing Machinery, New York, NY, USA, 1118–1130. https://doi.org/10.1145/2976749.2978393
  43. Webdyn. 2022. MTX-Titan Software & Hardware User Guide. https://www.webdyn.com/wp-content/uploads/2022/02/MTX-Titan-software-hardware-user-guide.pdf
  44. Review of agricultural IoT technology. Artificial Intelligence in Agriculture 6 (2022), 10–22. https://doi.org/10.1016/j.aiia.2022.01.001
  45. Lte phone number catcher: A practical attack against mobile privacy. Security and Communication Networks 2019 (2019), 1–10. https://doi.org/10.1155/2019/7425235

Summary

We haven't generated a summary for this paper yet.