Do You Trust Your Phone?

Despite the promising start, Electronic Commerce has not taken off mostly because of security issues with the communication infrastructures that are popping up threateningly undermining the perceived trustworthiness in Electronic Commerce. Some Internet security issues, like malware, phishing, pharming are well known to the Internet community. Such issues are being, however, transferred to the telephone networks thanks to the symbiotic relation between the two worlds. Such an interconnection is becoming so pervasive that we can really start thinking about a unique network, which, in this paper, we refer to as the Interphonet. The main goal of this paper is to analyze some of the Internet security issues that are being transferred to the Interphonet and also to identify new security issues of the Interphonet. In particular we will discuss about mobile phones malware and identity theft, phishing with SMS, telephone pharming, untraceability of phone calls that use VoIP and Caller ID spoofing. We will also briefly discuss about countermeasures.

[1]  Roger Thompson,et al.  Why spyware poses multiple threats to security , 2005, CACM.

[2]  Francesco Palmieri,et al.  Providing true end-to-end security in converged voice over IP infrastructures , 2009, Comput. Secur..

[3]  H. Raghav Rao,et al.  Consumer-perceived risk in e-commerce transactions , 2003, CACM.

[4]  Guillaume Peersman,et al.  The Global System for Mobile Communications Short Message Service , 2000, IEEE Personal Communications.

[5]  Gigi Karmous-Edwards,et al.  A New Era of Presidential Security: The President and His BlackBerry , 2009 .

[6]  Lori M. Kaufman,et al.  A New Era of Presidential Security: The President and His BlackBerry , 2009, IEEE Security & Privacy.

[7]  Choon Seong Leem,et al.  Security Threats and Their Countermeasures of Mobile Portable Computing Devices in Ubiquitous Computing Environments , 2005, ICCSA.

[8]  David Taniar,et al.  Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part I , 2005, ICCSA.

[9]  Umberto Ferraro Petrillo,et al.  An Extensible Framework for Efficient Secure SMS , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.

[10]  Umberto Ferraro Petrillo,et al.  SPEECH: Secure Personal End-to-End Communication with Handheld , 2006, ISSE.

[11]  Thomas F. La Porta,et al.  Exploiting open functionality in SMS-capable cellular networks , 2005, CCS '05.

[12]  George Lawton E-mail authentication is here, but has it arrived yet? , 2005, Computer.