Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems

Author:

Wang Shen1ORCID,Delavar Mahshid1ORCID,Azad Muhammad Ajmal2ORCID,Nabizadeh Farshad3ORCID,Smith Steve4ORCID,Hao Feng1ORCID

Affiliation:

1. University of Warwick, United Kingdom

2. School of Computing and Digital Technology, Birmingham City University, United Kingdom

3. Nar Co., Iran

4. trueCall Ltd, United Kingdom

Abstract

Caller ID spoofing is a global industry problem and often acts as a critical enabler for telephone fraud. To address this problem, the Federal Communications Commission has mandated telecom providers in the U.S. to implement STIR/SHAKEN, an industry-driven solution based on digital signatures. STIR/SHAKEN relies on a public key infrastructure (PKI) to manage digital certificates, but scaling up this PKI for the global telecom industry is extremely difficult, if not impossible. Furthermore, it only works with IP-based systems (e.g., SIP), leaving the traditional non-IP systems (e.g., SS7) unprotected. So far the alternatives to the STIR/SHAKEN have not been sufficiently studied. In this article, we propose a PKI-free solution, called Caller ID Verification (CIV). CIV authenticates the caller ID based on a challenge-response process instead of digital signatures, hence requiring no PKI. It supports both IP and non-IP systems. Perhaps counter-intuitively, we show that number spoofing can be leveraged, in conjunction with Dual-tone Multi-frequency, to efficiently implement the challenge-response process, i.e., using spoofing to fight against spoofing. We implement CIV for Voice over Internet Protocol, cellular, and landline phones across heterogeneous networks (SS7/SIP) by only updating the software on the user’s phone. This is the first caller ID authentication solution with working prototypes for all three types of telephone systems in the current telecom architecture. Finally, we show how the implementation of CIV can be optimized by integrating it into telecom clouds as a service, which users may subscribe to.

Funder

EPSRC

Publisher

Association for Computing Machinery (ACM)

Subject

Safety, Risk, Reliability and Quality,General Computer Science

Reference32 articles.

1. Security Engineering

2. Charles Beumier and Thibault Debatty. 2022. Attack detection in SS7. In Proceedings of the International Conference on Multimedia Communications, Services and Security. Springer, 11–20.

3. Authenticating displayed names in telephony;Chow Stanley T.;Bell Labs Tech. J.,2009

4. CEIVE

5. Lee Dryburgh and Jeff Hewett. 2005. Signaling System No. 7 (SS7/C7): Protocol, Architecture, and Services. Cisco Press.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3