Skip to main content

Security Risk Assessment of Rich Communication Services Over LTE

  • Conference paper
  • First Online:
Trustworthy Computing and Services (ISCTCS 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 520))

Included in the following conference series:

  • 968 Accesses

Abstract

To deal with the threat of over the top (OTT) applications, many operators launch their own rich communication services over LTE. China Mobile also declares the overall commercial of rich communication services in 2015. The rich communication services integrate abundant multimedia, media and social characteristics into the traditional telecom services. While these characteristics provide a superior user experience, they also attract the scammers to utilize these services as the new channel of spreading digital misinformation, launching mass events, phishing and so on. Besides these, the LTE/SAE network and user terminals also pose much security challenges to the RCS services. In this paper, we firstly and systematically assess the security risk of rich communication services based on their three-tier architecture, which aims at improving the security of rich communication services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Henry, K., Liu, Q., Pasquereau, S.: Rich communication suite. In: International Conference on Intelligence in Next Generation Networks (2009)

    Google Scholar 

  2. Park, Y., Park, T.: A survey of security threats on 4G networks. In: IEEE GlOBECOM Workshops (2007)

    Google Scholar 

  3. Cook, N.: Rich communications suite: opportunities and threats. Comput. Fraud Secur. 4, 9–11 (2012)

    Article  Google Scholar 

  4. Cao, J., Ma, M., Li, H., et al.: A survey on security aspects for LTE and LTE-a networks. IEEE Commun. Surv. Tutor. 16(1), 283–302 (2014)

    Article  Google Scholar 

  5. Da, Y., Wushao, W.: Non-access-stratum request attack in E-UTRAN. In: Computing, Communications and Applications Conference (2012)

    Google Scholar 

  6. Forsberg, D., Huang, L., Tsuyoshi, K., Alanara, S.: Enhancing security and privacy in 3GPP E-UTRAN radio interface. In: Personal, Indoor and Mobile Radio Communications (2007)

    Google Scholar 

  7. Kambourakis, G., Kolias, C., Gritzalis, S., Park, J.: DoS attacks exploiting signaling in UMTS and IMS. Comput. Commun. 34(3), 226–235 (2011)

    Article  Google Scholar 

  8. Felt, A., Finifter, M., Chin, E., et al.: A survey of mobile malware in the wild. In: ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (2011)

    Google Scholar 

  9. Barrera, D., Van, P.: Secure software installation on smartphones. IEEE Secur. Priv. 9(3), 42–48 (2001)

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported by the National Key Technology Research and Development Program of the Ministry of Science and Technology of China [2012BAH46B02].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huiyun Jing .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

He, X., Jing, H. (2015). Security Risk Assessment of Rich Communication Services Over LTE. In: Yueming, L., Xu, W., Xi, Z. (eds) Trustworthy Computing and Services. ISCTCS 2014. Communications in Computer and Information Science, vol 520. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47401-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-47401-3_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-47400-6

  • Online ISBN: 978-3-662-47401-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics