Skip to main content

SMS Security Issues

  • Chapter
  • First Online:

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSELECTRIC))

Abstract

Short messaging service is one of the most widely used services of mobile telephony. As we will see in this chapter, there are threats to its confidentiality, integrity, and availability. Even worse, the advent of more advanced capabilities and services, including mobile shopping and mobile banking transactions, which largely rely on the ability to send and receive short text messages to authenticate the user, will raise even stronger security concerns.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. UK hails 10th birthday of SMS, December 2002, The Times of India. http://timesofindia.indiatimes.com/articleshow/30216466.cms

  2. Americans sent 1 trillion sms text messages in 2008. http://www.intomobile.com/2009/04/06/americans-sent-1-trillion-

  3. GPP TS 03.40, Digital cellular telecommunications system (Phase 2+); Technical realization of the short message service (SMS) point-to-point (PP)

    Google Scholar 

  4. TEKELEC (2007) SMS security: malicious attacks are just around the corner. Are you protected?

    Google Scholar 

  5. Androulidakis I (2009) Security in SMS. IT security professional magazine, Issue 11, pp 36–41

    Google Scholar 

  6. de Haas J (2001) Mobile security: SMS (& a little WAP), HAL2001

    Google Scholar 

  7. Miller C, MullinerC (2009) Fuzzing the phone in your phone. http://www.blackhat.com/presentations/bh-usa-09/MILLER/BHUSA09-Miller-FuzzingPhone-SLIDES.pdf

  8. Mulliner C, Golde N, Seifert J-P (2011) SMS of death: from analyzing to attacking mobile phones on a large scale. In: 20th USENIX security symposium

    Google Scholar 

  9. Windows phone sms attack discovered reboots device and disables messaging hub, 2011. http://www.winrumors.com/windows-phone-sms-attack-discovered-reboots-device-and-disables-messaging-hub

  10. Engel T (2008) Remote SMS/MMS denial of service—“curse of silence” for Nokia S60 phones. http://berlin.ccc.de/~tobias/cursesms.txt

  11. Enck W, Traynor P, McDaniel P, La Porta T (2005) Exploiting open functionality in SMS capable cellular networks. In: 12th ACM conference on computer and communications security (CCS’05)

    Google Scholar 

  12. Agarwal N, Chandran-Wadia L, Apte V (2004) Capacity analysis of the GSM short message service, NCC2004

    Google Scholar 

  13. Androulidakis Ι, Basios C (2008) A plain type of mobile attack: compromise of user’s privacy through a simple implementation method. In: Proceedings of 3rd international conference on communication systems software and middleware (COMSWARE 2008), pp 465–470

    Google Scholar 

  14. SMS Vulnerabilities-XMS Technology White paper, NSS Network Security Solutions

    Google Scholar 

  15. Sillanpää A (2001) Mobile asset security and how to make money on It. In: T-110-501 seminar on network security, pp 1–18

    Google Scholar 

  16. SMS-scandal overshadows Eurovision victory for Rivas, February 2010. http://www.panarmenian.net/eng/culture/details/44736/

  17. Informa Telecoms & Media (2011) SMS traffic growth driven by enterprise, emerging markets and social networks. http://www.informatm.com/itmgcontent/icoms/whats-new/20017843617.html. Accessed 28 Apr 2011

  18. Global Information, Inc (2011) Telecom & IT market report catalog

    Google Scholar 

  19. Bueti MC (2005) Anti-spam legislation. In: ITU, WSIS thematic meeting on cybersecurity

    Google Scholar 

  20. Airwide Solutions Inc (2009) Taking the challenge of mobile messaging abuse

    Google Scholar 

  21. Schryen G (2007) Anti-SPAM legislation: an analysis of laws and their effectiveness. In: Information and Communications Technology Law, 16, 1, pp 17–32, Taylor & Francis

    Google Scholar 

  22. Gómez Hidalgo JM, Cajigas Bringas G, Puertas Sanz E, Carrero García F (2006) Content Based SMS Spam Filtering. Dick Bulterman, David F. Brailsford (Eds.). In: Proceedings of the 2006 ACM Symposium on Document Engineering, ACM Press, Amsterdam, The Netherlands, October 10–13, 2006

    Google Scholar 

  23. Cormack GV, Gómez Hidalgo JM, Puertas Sánz E (2007) Spam filtering for short messages. In Proceedings of the Sixteenth ACM Conference on Conference on information and Knowledge Management (Lisbon, Portugal, November 06–10, 2007). CIKM ‘07. ACM, New York, NY, pp 313–320. doi.acm.org/10.1145/1321440.1321486

    Google Scholar 

  24. The Apache SpamAssassin Project: SpamAssassin Guide, pp 1–5. Accessed 28 Apr 2011

    Google Scholar 

  25. WebGate (2009) SMS spam manager guide. Accessed 28 Apr 2011

    Google Scholar 

  26. Sabri AT, Mohammads AH, Al-Shargabi B, Hamdeh MA (2010) Developing new continuous learning approach for spam detection using artificial neural network (CLA_ANN). Eur J Sci Res 42(3):525–535, ISSN 1450-216X

    Google Scholar 

  27. Androutsopoulos I, Koutsias J, Chandrinos KV, Spyropoulos CD (2000) An experimental comparison of naive Bayesian and keyword-based anti-spam filtering with personal e-mail messages. In: SIGIR’00: proceedings of the 23rd annual international ACM SIGIR conference on research and development in information retrieval. ACM Press, pp 160–167

    Google Scholar 

  28. Androutsopoulos I, Koutsias J, Chandrinos KV, Spyropoulos CD (2000) An evaluation of naïve Bayesian anti-spam filtering. In: Potamias G, Moustakis V, van Someren M (eds) Proceedings of the workshop on machine learning in the new information age. 11th European conference on machine learning, Barcelona, Spain, pp 9–17

    Google Scholar 

  29. Yoon JW, Kim H, Huh JH (2010) Hybrid spam filtering for mobile communication. Sciencedirect, Computers and Security, pp 446–459

    Google Scholar 

  30. Cormack GV, Gomez Hidalgo JM, Puertas Sanz E (2007) Feature engineering for mobile (SMS) spam filtering. In: SIGIR’07, pp 1–2

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media New York

About this chapter

Cite this chapter

Androulidakis, I.I. (2012). SMS Security Issues. In: Mobile Phone Security and Forensics. SpringerBriefs in Electrical and Computer Engineering(). Springer, Boston, MA. https://doi.org/10.1007/978-1-4614-1650-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-1650-0_5

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4614-1649-4

  • Online ISBN: 978-1-4614-1650-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics