Exposing Vulnerabilities In Mobile Networks: A Mobile Data Consumption Attack

Keywords

Captive Portal; Deauthentication Attack; Evil Twin Attack; Man in the Middle Attack; Mobile Data Consumption; WiFi Security

Abstract

Smartphone carrier companies rely on mobile networks for keeping an accurate record of customer data usage for billing purposes. In this paper, we present a vulnerability that allows an attacker to force the victim's smartphone to consume data through the cellular network by starting the data download on the victim's cell phone without the victim's knowledge. The attack is based on switching the victim's smartphones from the Wi-Fi network to the cellular network while downloading a large data file. This attack has been implemented in real-life scenarios where the test's outcomes demonstrate that the attack is feasible and that mobile networks do not record customer data usage accurately.

Publication Date

11-14-2017

Publication Title

Proceedings - 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2017

Number of Pages

550-554

Document Type

Article; Proceedings Paper

Personal Identifier

scopus

DOI Link

https://doi.org/10.1109/MASS.2017.76

Socpus ID

85040543382 (Scopus)

Source API URL

https://api.elsevier.com/content/abstract/scopus_id/85040543382

This document is currently not available here.

Share

COinS