Abstract
To deal with the threat of over the top (OTT) applications, many operators launch their own rich communication services over LTE. China Mobile also declares the overall commercial of rich communication services in 2015. The rich communication services integrate abundant multimedia, media and social characteristics into the traditional telecom services. While these characteristics provide a superior user experience, they also attract the scammers to utilize these services as the new channel of spreading digital misinformation, launching mass events, phishing and so on. Besides these, the LTE/SAE network and user terminals also pose much security challenges to the RCS services. In this paper, we firstly and systematically assess the security risk of rich communication services based on their three-tier architecture, which aims at improving the security of rich communication services.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Henry, K., Liu, Q., Pasquereau, S.: Rich communication suite. In: International Conference on Intelligence in Next Generation Networks (2009)
Park, Y., Park, T.: A survey of security threats on 4G networks. In: IEEE GlOBECOM Workshops (2007)
Cook, N.: Rich communications suite: opportunities and threats. Comput. Fraud Secur. 4, 9–11 (2012)
Cao, J., Ma, M., Li, H., et al.: A survey on security aspects for LTE and LTE-a networks. IEEE Commun. Surv. Tutor. 16(1), 283–302 (2014)
Da, Y., Wushao, W.: Non-access-stratum request attack in E-UTRAN. In: Computing, Communications and Applications Conference (2012)
Forsberg, D., Huang, L., Tsuyoshi, K., Alanara, S.: Enhancing security and privacy in 3GPP E-UTRAN radio interface. In: Personal, Indoor and Mobile Radio Communications (2007)
Kambourakis, G., Kolias, C., Gritzalis, S., Park, J.: DoS attacks exploiting signaling in UMTS and IMS. Comput. Commun. 34(3), 226–235 (2011)
Felt, A., Finifter, M., Chin, E., et al.: A survey of mobile malware in the wild. In: ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (2011)
Barrera, D., Van, P.: Secure software installation on smartphones. IEEE Secur. Priv. 9(3), 42–48 (2001)
Acknowledgement
This work was supported by the National Key Technology Research and Development Program of the Ministry of Science and Technology of China [2012BAH46B02].
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
He, X., Jing, H. (2015). Security Risk Assessment of Rich Communication Services Over LTE. In: Yueming, L., Xu, W., Xi, Z. (eds) Trustworthy Computing and Services. ISCTCS 2014. Communications in Computer and Information Science, vol 520. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47401-3_16
Download citation
DOI: https://doi.org/10.1007/978-3-662-47401-3_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-47400-6
Online ISBN: 978-3-662-47401-3
eBook Packages: Computer ScienceComputer Science (R0)