New research details how SMS will remain a critical part of operators’ 5G offering and exposes security vulnerabilities of SMS on 5G networks
AdaptiveMobile Security, an Enea company and the world leader in mobile network security, published a comprehensive blueprint on how to secure SMS on 5G Networks. The research outlines how SMS operates on the next generation of networks, identifying the emerging security risks and attack scenarios that exist on 5G networks. It also sets out the principles for securing 5G networks against malicious attacks via SMS, including the need for attack correlation across both legacy 2G, 3G, 4G and new 5G protocols and between different interfaces to identify the real threats. The full research paper, Messaging for the Future: Securing SMS in 5G, is available for download from:
The research details how the security of SMS communication in 5G is more important than ever and the key aspects mobile operators must consider when protecting their subscribers from attacks. There are new security considerations as SMS usage increasingly moves from user-centric messaging towards Application-to-Person (A2P) and Machine-to-Machine (M2M) SMS-based messaging. A growing number of enterprises are dependent on SMS for direct communication with their customers, and the market is witnessing huge expansion in the Communications Platform as a Service (CPaaS) sector which in turn is driving the unstoppable momentum witnessed in A2P SMS. Meanwhile, the growth of IoT devices and the subsequent increase in M2M SMS means that messaging must be secured at the network level due to the lack of any human supervision that could detect a security breach and raise an alert.
Top iTechnology AIOps News: Habana Gaudi AI Processor Joins cnvrg.io’s Metacloud Marketplace of AI Infrastructure Solutions
SMS on 5G networks also retains legacy technology which must be integrated with the new technologies 5G brings to the mobile network, with attackers able to use an extensive toolkit of techniques to penetrate networks at various entry points until they succeed. Even with new standards and specifications, 5G is not completely secure, and lessons from the vulnerabilities of previous mobile network generations must be learned and applied to secure the future of SMS mobile messaging in 5G. The mistakes of 3G and 4G must not be repeated.
The research paper also includes:
- Information to mobile operators on implementing legacy support for SMS traversing both 4G and 5G networks
- SMS Subscriber roaming methods, how messages are sent through and the various delivery approaches
- A detailed comparison of 2G, 3G, 4G and 5G SMS-related nodes and interfaces, and a breakdown of the mechanisms of SMS delivery using Rich Communication Suite (RCS) in a 5G environment
- An overview of the current misuse of SMS and the various attack types that are possible and that AdaptiveMobile Security believes will continue when sending SMS through the 5G core network, including: U********** SMS Messaging, SMS Phishing, Premium SMS Fraud, Mobile Malware, Surveillance, Information Retrieval, Denial of Service, SMS Interception and Grey Routes abuse
- Highlights of new potential SMS risks and attacks that may arise in the next generation of mobile networks
- An outline of how to mitigate threats and best practices for securing SMS in 5G, such as protecting various attacker entry points, implementing efficient filtering approaches, complemented with ongoing threat intelligence to defend against new and evolving attacker tactics, techniques, and procedures
“Rumours of the demise of SMS have been greatly exaggerated, in particular in the A2P market where we continue to see strong growth. SMS holds and will continue to hold significant and considerable advantages to Over-the-Top messaging services. Despite all the new features of 5G, SMS’s ability to reach every mobile device in the world makes it a powerful tool for mobile operators and brands, both today but also for the foreseeable future,” said Cathal McDaid, CTO of AdaptiveMobile Security. “However, securing SMS over 5G is a complex combination of dealing with legacy technology, while also integrating with the new demands and network designs that 5G brings. Mobile network operators must ensure they are fully aware of the potential threats and how to best to mitigate them both today and in the future as they migrate to 5G.”
Top iTechnology IT and DevOps News: SnapLogic Automates the Enterprise with Flows, Advanced API Management, Data Integration, and Connectivity Capabilities
[To share your insights with us, please write to sghosh@martechseries.com]