Abstract
Short messaging service is one of the most widely used services of mobile telephony. As we will see in this chapter, there are threats to its confidentiality, integrity, and availability. Even worse, the advent of more advanced capabilities and services, including mobile shopping and mobile banking transactions, which largely rely on the ability to send and receive short text messages to authenticate the user, will raise even stronger security concerns.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
UK hails 10th birthday of SMS, December 2002, The Times of India. http://timesofindia.indiatimes.com/articleshow/30216466.cms
Americans sent 1 trillion sms text messages in 2008. http://www.intomobile.com/2009/04/06/americans-sent-1-trillion-
GPP TS 03.40, Digital cellular telecommunications system (Phase 2+); Technical realization of the short message service (SMS) point-to-point (PP)
TEKELEC (2007) SMS security: malicious attacks are just around the corner. Are you protected?
Androulidakis I (2009) Security in SMS. IT security professional magazine, Issue 11, pp 36–41
de Haas J (2001) Mobile security: SMS (& a little WAP), HAL2001
Miller C, MullinerC (2009) Fuzzing the phone in your phone. http://www.blackhat.com/presentations/bh-usa-09/MILLER/BHUSA09-Miller-FuzzingPhone-SLIDES.pdf
Mulliner C, Golde N, Seifert J-P (2011) SMS of death: from analyzing to attacking mobile phones on a large scale. In: 20th USENIX security symposium
Windows phone sms attack discovered reboots device and disables messaging hub, 2011. http://www.winrumors.com/windows-phone-sms-attack-discovered-reboots-device-and-disables-messaging-hub
Engel T (2008) Remote SMS/MMS denial of service—“curse of silence” for Nokia S60 phones. http://berlin.ccc.de/~tobias/cursesms.txt
Enck W, Traynor P, McDaniel P, La Porta T (2005) Exploiting open functionality in SMS capable cellular networks. In: 12th ACM conference on computer and communications security (CCS’05)
Agarwal N, Chandran-Wadia L, Apte V (2004) Capacity analysis of the GSM short message service, NCC2004
Androulidakis Ι, Basios C (2008) A plain type of mobile attack: compromise of user’s privacy through a simple implementation method. In: Proceedings of 3rd international conference on communication systems software and middleware (COMSWARE 2008), pp 465–470
SMS Vulnerabilities-XMS Technology White paper, NSS Network Security Solutions
Sillanpää A (2001) Mobile asset security and how to make money on It. In: T-110-501 seminar on network security, pp 1–18
SMS-scandal overshadows Eurovision victory for Rivas, February 2010. http://www.panarmenian.net/eng/culture/details/44736/
Informa Telecoms & Media (2011) SMS traffic growth driven by enterprise, emerging markets and social networks. http://www.informatm.com/itmgcontent/icoms/whats-new/20017843617.html. Accessed 28 Apr 2011
Global Information, Inc (2011) Telecom & IT market report catalog
Bueti MC (2005) Anti-spam legislation. In: ITU, WSIS thematic meeting on cybersecurity
Airwide Solutions Inc (2009) Taking the challenge of mobile messaging abuse
Schryen G (2007) Anti-SPAM legislation: an analysis of laws and their effectiveness. In: Information and Communications Technology Law, 16, 1, pp 17–32, Taylor & Francis
Gómez Hidalgo JM, Cajigas Bringas G, Puertas Sanz E, Carrero García F (2006) Content Based SMS Spam Filtering. Dick Bulterman, David F. Brailsford (Eds.). In: Proceedings of the 2006 ACM Symposium on Document Engineering, ACM Press, Amsterdam, The Netherlands, October 10–13, 2006
Cormack GV, Gómez Hidalgo JM, Puertas Sánz E (2007) Spam filtering for short messages. In Proceedings of the Sixteenth ACM Conference on Conference on information and Knowledge Management (Lisbon, Portugal, November 06–10, 2007). CIKM ‘07. ACM, New York, NY, pp 313–320. doi.acm.org/10.1145/1321440.1321486
The Apache SpamAssassin Project: SpamAssassin Guide, pp 1–5. Accessed 28 Apr 2011
WebGate (2009) SMS spam manager guide. Accessed 28 Apr 2011
Sabri AT, Mohammads AH, Al-Shargabi B, Hamdeh MA (2010) Developing new continuous learning approach for spam detection using artificial neural network (CLA_ANN). Eur J Sci Res 42(3):525–535, ISSN 1450-216X
Androutsopoulos I, Koutsias J, Chandrinos KV, Spyropoulos CD (2000) An experimental comparison of naive Bayesian and keyword-based anti-spam filtering with personal e-mail messages. In: SIGIR’00: proceedings of the 23rd annual international ACM SIGIR conference on research and development in information retrieval. ACM Press, pp 160–167
Androutsopoulos I, Koutsias J, Chandrinos KV, Spyropoulos CD (2000) An evaluation of naïve Bayesian anti-spam filtering. In: Potamias G, Moustakis V, van Someren M (eds) Proceedings of the workshop on machine learning in the new information age. 11th European conference on machine learning, Barcelona, Spain, pp 9–17
Yoon JW, Kim H, Huh JH (2010) Hybrid spam filtering for mobile communication. Sciencedirect, Computers and Security, pp 446–459
Cormack GV, Gomez Hidalgo JM, Puertas Sanz E (2007) Feature engineering for mobile (SMS) spam filtering. In: SIGIR’07, pp 1–2
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media New York
About this chapter
Cite this chapter
Androulidakis, I.I. (2012). SMS Security Issues. In: Mobile Phone Security and Forensics. SpringerBriefs in Electrical and Computer Engineering(). Springer, Boston, MA. https://doi.org/10.1007/978-1-4614-1650-0_5
Download citation
DOI: https://doi.org/10.1007/978-1-4614-1650-0_5
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4614-1649-4
Online ISBN: 978-1-4614-1650-0
eBook Packages: EngineeringEngineering (R0)