D. Wasil, O. Nakhila, S. S. Bacanli, C. Zou, and D. Turgut

Exposing Vulnerabilities in Mobile Networks: A Mobile Data Consumption Attack


Cite as:

D. Wasil, O. Nakhila, S. S. Bacanli, C. Zou, and D. Turgut. Exposing Vulnerabilities in Mobile Networks: A Mobile Data Consumption Attack. In Fourth National Workshop for REU Research in Networking and Systems (REUNS), co-located with 14th IEEE International Conference on Mobile Ad-hoc Sensor Systems (IEEE MASS 2017), pp. 550–554, October 2017.

Download:

Download 

Abstract:

Smartphone carrier companies rely on mobile networks for keeping an accurate record of customer data usage for billing purposes. In this paper, we present a vulnerability that allows an attacker to force the victim's smartphone to consume data through the cellular network by starting the data download on the victim's cell phone without the victim's knowledge. The attack is based on switching the victim's smartphones from the Wi-Fi network to the cellular network while downloading a large data file. This attack has been implemented in real-life scenarios where the test's outcomes demonstrate that the attack is feasible and that mobile networks do not record customer data usage accurately.

BibTeX:

@inproceedings{Wasil-2017-REUNS,
   title={{Exposing Vulnerabilities in Mobile Networks: A Mobile Data Consumption Attack}},
   author={D. Wasil and O. Nakhila and S. S. Bacanli and C. Zou and D. Turgut},
   booktitle={Fourth National Workshop for REU Research in Networking and Systems {(REUNS)}, co-located with  14th IEEE International Conference on Mobile Ad-hoc Sensor Systems {(IEEE MASS 2017)}},
   pages = "550-554",
   year={2017},
   month={October},
     abstract = {Smartphone carrier companies rely on mobile networks for keeping an accurate record of customer data usage for billing purposes. In this paper, we present a vulnerability that allows an attacker to force the victim's smartphone to consume data through the cellular network by starting the data download on the victim's cell phone without the victim's knowledge. The attack is based on switching the victim's smartphones from the Wi-Fi network to the cellular network while downloading a large data file. This attack has been implemented in real-life scenarios where the test's outcomes demonstrate that the attack is feasible and that mobile networks do not record customer data usage accurately. },
}

Generated by bib2html.pl (written by Patrick Riley, Lotzi Boloni ) on Mon Nov 13, 2023 12:30:29