Abstract | ||
---|---|---|
ABSTRACTIn this paper, we devise new attacks exploiting the unprotected data-plane signaling in cellular IoT networks (aka both NB-IoT and Cat-M). We show that, despite the deployed security mechanisms on both control-plane signaling and data-plane packet forwarding, novel data-plane signaling attacks are still feasible. Such attacks exhibit a variety of attack forms beyond simplistic packet-blasting, denial-of-service (DoS) threats, including location privacy breach, packet delivery loop, prolonged data delivery, throughput limiting, radio resource draining, and connection reset. Our testbed evaluation and operational network validation have confirmed the viability. We further propose a new defense solution within the 3GPP C-IoT standard framework. |
Year | DOI | Venue |
---|---|---|
2021 | 10.1145/3447993.3483255 | Mobile Computing and Networking |
DocType | Citations | PageRank |
Conference | 0 | 0.34 |
References | Authors | |
0 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Zhenhui Tan | 1 | 470 | 38.24 |
B Ding | 2 | 0 | 0.34 |
Jijun Zhao | 3 | 3 | 2.63 |
Y. Jay Guo | 4 | 643 | 64.62 |
Sanglu Lu | 5 | 1380 | 144.07 |