Skip to main content

SMS Security Issues

  • Chapter
  • First Online:
Mobile Phone Security and Forensics

Abstract

Short Messaging Service is one of the most widely used services of mobile telephony. As we will see in this chapter, there are threats to its Confidentiality, Integrity, and Availability. Even worse, the advent of more advanced capabilities and services, including mobile shopping and mobile banking transactions, which largely rely on the ability to send and receive short text messages to authenticate the user, will raise even stronger security concerns.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. UK hails 10th birthday of SMS, December 2002. The Times of India. http://timesofindia.indiatimes.com/articleshow/30216466.cms

  2. Americans sent 1 trillion SMS text messages in 2008. http://www.intomobile.com/2009/04/06/americans-sent-1-trillion

  3. 3GPP TS 03.40. Digital cellular telecommunications system (Phase 2+); Technical realization of the Short Message Service (SMS) Point-to-Point (PP)

    Google Scholar 

  4. TEKELEC (2007) SMS security: malicious attacks are just around the corner. Are you protected?

    Google Scholar 

  5. Androulidakis I (2009) Security in SMS. IT Security Professional Magazine 11:36–41

    Article  Google Scholar 

  6. de Haas J (2001) Mobile security: SMS (& a little WAP), HAL200

    Google Scholar 

  7. Miller C, Mulliner C (2009) Fuzzing the phone in your phone. http://www.blackhat.com/presentations/bh-usa-09/MILLER/BHUSA09-Miller-FuzzingPhone-SLIDES.pdf

  8. Mulliner C, Golde N, Seifert J-P (2011) SMS of death: from analyzing to attacking mobile phones on a large scale. In: 20th USENIX Security Symposium

    Google Scholar 

  9. Windows phone SMS attack discovered reboots device and disables messaging hub. http://www.winrumors.com/windows-phone-sms-attack-discovered-reboots-device-and-disables-messaging-hub, 2011

  10. Engel T (2008) Remote SMS/MMS denial of service—“curse of silence” for Nokia S60 phones. http://berlin.ccc.de/~tobias/cursesms.txt

  11. Enck W, Traynor P, McDaniel P, La Porta P. Exploiting open functionality in SMS capable cellular networks. In: 12th ACM Conference on Computer and Communications Security (CCS’05)

    Google Scholar 

  12. Agarwal N, Chandran-Wadia L, Apte V (2004) Capacity analysis of the GSM short message service, NCC2004

    Google Scholar 

  13. Androulidakis, C. Basios, A plain type of mobile attack: Compromise of user’s privacy through a simple implementation method, Proceedings of 3rd International Conference on Communication Systems Software and Middleware (COMSWARE 2008), pp 465—470, 2008

    Google Scholar 

  14. Androulidakis I, Vlachos V, Chatzimisios P (2015) A methodology for testing battery deprivation for testing battery deprivation denial of service attacks in mobile phones. In: Information and Digital Technologies (IDT), 2015 Internal conference on, 7–9 July 2015, pp 6–10. doi:10.1109/DT.2015.7222942)

  15. Network Security Solutions (2006) SMS vulnerabilities-XMS technology enabling mCommerce

    Google Scholar 

  16. Sillanpää A (2001) Mobile asset security and how to make money on it. In: T-110-501 Seminar on network security, pp 1–18

    Google Scholar 

  17. SMS-scandal overshadows Eurovision victory for Rivas. http://www.panarmenian.net/eng/culture/details/44736/, February 2010

  18. Informa Telecoms & Media. SMS traffic growth driven by enterprise, emerging markets and social networks. 2011. http://www.informatm.com/itmgcontent/icoms/whats-new/20017843617.html, accessed on 28/04/2011

  19. Global Information, Inc. (2011) Telecom & IT market report catalog

    Google Scholar 

  20. Bueti MC (2005) Anti-spam legislation. ITU. In: WSIS thematic meeting on cybersecurity

    Google Scholar 

  21. Airwide Solutions, Inc. (2009) Taking the challenge of mobile messaging abuse

    Google Scholar 

  22. Schryen G (2007) Anti-SPAM legislation: an analysis of laws and their effectiveness. ICT Law 16(1):17–32

    Google Scholar 

  23. Hidalgo JM, Cajigas Bringas G, Sanz EP, Garcia FC (2006) Content based SMS Spam filtering. In: Proceedings of the 2006 ACM symposium on document engineering, pp 1–8

    Google Scholar 

  24. Hidalgo JMG, Sanz EP, Cormack GV (2005) Spam filtering for short messages. In: Proceedings of the sixteenth ACM conference on conference on information and knowledge management, pp 1–8

    Google Scholar 

  25. The Apache SpamAssassin Project: SpamAssassin Guide, pp 1–5, accessed on 28/04/2011

    Google Scholar 

  26. WebGate (2009) SMS Spam manager guide, accessed on 28/04/2011

    Google Scholar 

  27. Sabri AT, Mohammads AH, Al-Shargabi B, Hamdeh MA (2010) Developing new continuous learning approach for spam detection using Artificial Neural Network (CLA_ANN). Eur J Sci Res 42(3):525–535, ISSN 1450-216X

    Google Scholar 

  28. Androutsopoulos I, Koutsias J, Chandrinos KV, Spyropoulos CD(2000) An experimental comparison of naive Bayesian and keyword-based anti-spam filtering with personal e-mail messages. In: SIGIR’00: Proceedings of the 23rd annual international ACM SIGIR conference on Research and development in information retrieval, ACM, New York, pp 160–167

    Google Scholar 

  29. Androutsopoulos I, Koutsias J, Chandrinos KV, Spyropoulos CD (2000) An evaluation of naïve Bayesian Anti-Spam filtering. In: Potamias G, Moustakis V, van Someren M (eds) Proceedings of the workshop on machine learning in the new information age, 11th European Conference on Machine Learning, Barcelona, Spain, pp 9–17

    Google Scholar 

  30. Yoon JW, Kim H, Huh JH (2010) Hybrid spam filtering for mobile communication. Computers & Security 29(4):446–459

    Article  Google Scholar 

  31. Cormack GV, Gómez Hidalgo JM, Puertas Sánz E (2007) Feature engineering for mobile (SMS) spam filtering. In: SIGIR’07, pp 1–2

    Google Scholar 

  32. Androulidakis I, Vlachos V, Papanikolaou A (2013) FIMESS: filtering mobile external SMS spam. In: Proceedings of the 6th Balkan Conference in Informatics (BCI ‘13). ACM, New York, pp 221-227. doi:http://dx.doi.org/10.1145/2490257.2490288

  33. TS 23.040, 3rd Generation Partnership Project (3GPP). Technical realization of the short message service (SMS) September 2010. Release 9

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Androulidakis, I.I. (2016). SMS Security Issues. In: Mobile Phone Security and Forensics. Springer, Cham. https://doi.org/10.1007/978-3-319-29742-2_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-29742-2_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-29741-5

  • Online ISBN: 978-3-319-29742-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics