Abstract
Short Messaging Service is one of the most widely used services of mobile telephony. As we will see in this chapter, there are threats to its Confidentiality, Integrity, and Availability. Even worse, the advent of more advanced capabilities and services, including mobile shopping and mobile banking transactions, which largely rely on the ability to send and receive short text messages to authenticate the user, will raise even stronger security concerns.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
UK hails 10th birthday of SMS, December 2002. The Times of India. http://timesofindia.indiatimes.com/articleshow/30216466.cms
Americans sent 1 trillion SMS text messages in 2008. http://www.intomobile.com/2009/04/06/americans-sent-1-trillion
3GPP TS 03.40. Digital cellular telecommunications system (Phase 2+); Technical realization of the Short Message Service (SMS) Point-to-Point (PP)
TEKELEC (2007) SMS security: malicious attacks are just around the corner. Are you protected?
Androulidakis I (2009) Security in SMS. IT Security Professional Magazine 11:36–41
de Haas J (2001) Mobile security: SMS (& a little WAP), HAL200
Miller C, Mulliner C (2009) Fuzzing the phone in your phone. http://www.blackhat.com/presentations/bh-usa-09/MILLER/BHUSA09-Miller-FuzzingPhone-SLIDES.pdf
Mulliner C, Golde N, Seifert J-P (2011) SMS of death: from analyzing to attacking mobile phones on a large scale. In: 20th USENIX Security Symposium
Windows phone SMS attack discovered reboots device and disables messaging hub. http://www.winrumors.com/windows-phone-sms-attack-discovered-reboots-device-and-disables-messaging-hub, 2011
Engel T (2008) Remote SMS/MMS denial of service—“curse of silence” for Nokia S60 phones. http://berlin.ccc.de/~tobias/cursesms.txt
Enck W, Traynor P, McDaniel P, La Porta P. Exploiting open functionality in SMS capable cellular networks. In: 12th ACM Conference on Computer and Communications Security (CCS’05)
Agarwal N, Chandran-Wadia L, Apte V (2004) Capacity analysis of the GSM short message service, NCC2004
Androulidakis, C. Basios, A plain type of mobile attack: Compromise of user’s privacy through a simple implementation method, Proceedings of 3rd International Conference on Communication Systems Software and Middleware (COMSWARE 2008), pp 465—470, 2008
Androulidakis I, Vlachos V, Chatzimisios P (2015) A methodology for testing battery deprivation for testing battery deprivation denial of service attacks in mobile phones. In: Information and Digital Technologies (IDT), 2015 Internal conference on, 7–9 July 2015, pp 6–10. doi:10.1109/DT.2015.7222942)
Network Security Solutions (2006) SMS vulnerabilities-XMS technology enabling mCommerce
Sillanpää A (2001) Mobile asset security and how to make money on it. In: T-110-501 Seminar on network security, pp 1–18
SMS-scandal overshadows Eurovision victory for Rivas. http://www.panarmenian.net/eng/culture/details/44736/, February 2010
Informa Telecoms & Media. SMS traffic growth driven by enterprise, emerging markets and social networks. 2011. http://www.informatm.com/itmgcontent/icoms/whats-new/20017843617.html, accessed on 28/04/2011
Global Information, Inc. (2011) Telecom & IT market report catalog
Bueti MC (2005) Anti-spam legislation. ITU. In: WSIS thematic meeting on cybersecurity
Airwide Solutions, Inc. (2009) Taking the challenge of mobile messaging abuse
Schryen G (2007) Anti-SPAM legislation: an analysis of laws and their effectiveness. ICT Law 16(1):17–32
Hidalgo JM, Cajigas Bringas G, Sanz EP, Garcia FC (2006) Content based SMS Spam filtering. In: Proceedings of the 2006 ACM symposium on document engineering, pp 1–8
Hidalgo JMG, Sanz EP, Cormack GV (2005) Spam filtering for short messages. In: Proceedings of the sixteenth ACM conference on conference on information and knowledge management, pp 1–8
The Apache SpamAssassin Project: SpamAssassin Guide, pp 1–5, accessed on 28/04/2011
WebGate (2009) SMS Spam manager guide, accessed on 28/04/2011
Sabri AT, Mohammads AH, Al-Shargabi B, Hamdeh MA (2010) Developing new continuous learning approach for spam detection using Artificial Neural Network (CLA_ANN). Eur J Sci Res 42(3):525–535, ISSN 1450-216X
Androutsopoulos I, Koutsias J, Chandrinos KV, Spyropoulos CD(2000) An experimental comparison of naive Bayesian and keyword-based anti-spam filtering with personal e-mail messages. In: SIGIR’00: Proceedings of the 23rd annual international ACM SIGIR conference on Research and development in information retrieval, ACM, New York, pp 160–167
Androutsopoulos I, Koutsias J, Chandrinos KV, Spyropoulos CD (2000) An evaluation of naïve Bayesian Anti-Spam filtering. In: Potamias G, Moustakis V, van Someren M (eds) Proceedings of the workshop on machine learning in the new information age, 11th European Conference on Machine Learning, Barcelona, Spain, pp 9–17
Yoon JW, Kim H, Huh JH (2010) Hybrid spam filtering for mobile communication. Computers & Security 29(4):446–459
Cormack GV, Gómez Hidalgo JM, Puertas Sánz E (2007) Feature engineering for mobile (SMS) spam filtering. In: SIGIR’07, pp 1–2
Androulidakis I, Vlachos V, Papanikolaou A (2013) FIMESS: filtering mobile external SMS spam. In: Proceedings of the 6th Balkan Conference in Informatics (BCI ‘13). ACM, New York, pp 221-227. doi:http://dx.doi.org/10.1145/2490257.2490288
TS 23.040, 3rd Generation Partnership Project (3GPP). Technical realization of the short message service (SMS) September 2010. Release 9
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Androulidakis, I.I. (2016). SMS Security Issues. In: Mobile Phone Security and Forensics. Springer, Cham. https://doi.org/10.1007/978-3-319-29742-2_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-29742-2_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-29741-5
Online ISBN: 978-3-319-29742-2
eBook Packages: EngineeringEngineering (R0)