作者
Sultan Ahmad, Hikmat AM Abdeljaber, Jabeen Nazeer, Mohammed Yousuf Uddin, Velmurugan Lingamuthu, Amandeep Kaur
发表日期
2022
期刊
Wireless Communications and Mobile Computing
卷号
2022
期号
1
页码范围
6245397
出版商
Hindawi
简介
According to recent research, attacks on USIM cards are on the rise. In a 5G setting, attackers can also employ counterfeit USIM cards to circumvent the identity authentication of specified standard applications and steal user information. Under the assumption that the USIM can be replicated, the identity authentication process of common mobile platform applications is investigated. The identity authentication tree is generated by examining the application behavior of user login, password reset, and sensitive operations. We tested 58 typical applications in 7 categories, including social communication and personal health. We found that 29 of them only needed the SMS verification code received by the USIM card to pass the authentication. In response to this problem, it is recommended to enable two‐step verification and use USIM anti‐counterfeiting methods to complete the verification.
引用总数
学术搜索中的文章
S Ahmad, HAM Abdeljaber, J Nazeer, MY Uddin… - Wireless Communications and Mobile Computing, 2022