Preventing Telecommunication Fraud in Machine-to Machine Communications



Similar documents
Concept Note. powering the ROC. PBX Hacking.

ROC Data Integrity Management - Leased Line Cost Recovery

Bypass Fraud- Are you getting it right?

M2M Summit Fraud An underestimated risk for M2M solutions?

The Importance of Secure Elements in M2M Deployments: An Introduction

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M

ROC FRAUD MANAGEMENT. fraud management. Driving fraud prevention. Real-time protection from next-gen fraud types. On-the-go Decisioning

Trust Digital Best Practices

Executive Summary. Page 2 of 12

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud

International Dialing and Roaming: Preventing Fraud and Revenue Leakage

December 2013 Copyright 2013 GSM Association

FWD. What the Internet of Things will mean for business

The new role of billing systems in the Internet of Things

Digital Briefing Center Presentation Sources

Nokia Siemens Networks Device Management Solution Executive summary

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Three Ways to Reduce Exposure to Bypass Fraud The Risk Management Group

Communications Fraud Control Association Global Fraud Loss Survey

International Carriers

Application Security in the Software Development Lifecycle

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

10 Quick Tips to Mobile Security

PRIVATE NETWORK Take control of your network with Verizon Wireless Private Network and 4G LTE.

Evolving operator roles. How the Internet of Things can create innovative solutions that support society

Managing IT Security with Penetration Testing

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

WHITE PAPER. Telecom industry the expatriate consumer segment

Device Management. 1 Nokia Siemens Networks

Small businesses: What you need to know about cyber security

TELECOM FRAUD CALL SCENARIOS

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Data Security Concerns for the Electric Grid

On Demand Penetration Testing Applications Networks Compliance.

The M2M Opportunity for the Small-to-Midsize Mobile Network Operator

Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application

Classification, Detection and Prosecution of Fraud on Mobile Networks

WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks

WHAT THE FRAUD? A Look at Telecommunications Fraud and Its Impacts

Small businesses: What you need to know about cyber security

Mobile Voice ~ Whispers of Change?

January Pragati Maidan New Delhi, India. Digital India. International Exhibition & Conference

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

WHITE PAPER Usher Mobile Identity Platform

Empowering Wholesale Customers: WWAN/ Machine to Machine APR 2015

Announcement of the transaction with Oracle. Customer Frequently Asked Questions

IOT for Automotive and Transport Challenges and Opportunities

For more information, contact FieldView Solutions at or

PCI Security Scan Procedures. Version 1.0 December 2004

Guiding principles for security in a networked society

Global Machine to Machine Smart Services

Thatcham Research The Insurers Automotive Research Centre

Digital Strategy. Digital Strategy CGI IT UK Ltd. Digital Innovation. Enablement Services

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Explosive Growth Is No Accident: Driving Digital Transformation in the Insurance Industry

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

Securing the future of mobile services. SIMalliance Open Mobile API. An Introduction v2.0. Security, Identity, Mobility

Securing Remote Vendor Access with Privileged Account Security

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Vulnerability Assessment & Compliance

Module 1: Facilitated e-learning

Assessing the strength of your security operating model

Accenture Mobility Managed Services Overview. Enter

Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER

Security strategies to stay off the Børsen front page

Benefits Analysis of GSMA Embedded SIM Specification on the Mobile Enabled M2M Industry

Securing the Internet of Things WHITEPAPER

W H I T E P A P E R C l o u d E n a b l i n g P l a t f o r m s f o r S e r v i c e P r o v i d e r s, U p d a t e (

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

An Aujas White Paper MITIGATING SECURITY RISKS IN USSD-BASED MOBILE PAYMENT APPLICATIONS. By Suhas Desai

ISO Controls and Objectives

Bringing Continuous Security to the Global Enterprise

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

CuTTIng ComplexITy simplifying security

Protecting Organizations from Cyber Attack

Getting a Secure Intranet

10 Things Every Web Application Firewall Should Provide Share this ebook

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

User and Iot Data Analytics. Empowered by Ericsson User Data Consolidation (UDC)

A strategic approach to fraud

Transcription:

Preventing Telecommunication Fraud in Machine-to Machine Communications

Introduction Machine to Machine (M2M) Communications and the related concept of Embedded Mobile refer to the communication between various machines or devices, and possibly humans in the case of embedded mobile, through the use of wired or wireless technologies. Generally M2M involves the use of a device (such as a meter) to capture an event (such as electricity usage, temperature, inventory level, etc.). This event is then relayed through a communication network (wireless, wired or hybrid) to an application (software program). This application translates the captured event into meaningful information (for example, items that need to be restocked). In the early days, M2M was restricted to one-to-one device communication. Now, the advancement of wireless networks has changed the ecosystem into a connection of networks that relay data to and from multiple devices very fast and at a reasonable cost. This M2M market has garnered a great deal of attention during the past five years. Analysys Mason forecasts that the number of M2M device connections will grow from 62 million in 2010 to 2.1 billion devices in 2020. M2M devices have been in existence for over a decade, but have been predominant in the automotive sector until recently. Now, M2M devices are penetrating the consumer applications sector such as smart metering, supply-side generation management, home and business surveillance, cardio-vascular disease and diabetes management, and body area networks. The diagram below shows the penetration of M2M devices in various sectors. 0.07 Billion 3% 0.03 Billion 1% 0.28 Billion 13% 0.45 Billion 21% Total market: 2.1 billion connections worldwide Utilities Security Automotive and transport Health care Government, retail and financial services 1.32 Billion 62% Figure 1: Commercial and consumer M2M device connections by industry sector, worldwide, 2020 [Source: Analysys Mason, 2011] 2 Subex Limited

Declining ARPUs and increasing customer demands for real time access to various services, have prompted communication service providers (CSPs) to venture into new areas with new revenue models. One of the most prominent being, the M2M market. This rapidly expanding market presents a great opportunity for CSPs to increase their revenue. Although initially ARPU may be low, in the long run it will ensure a steady in flow of cash with minimal incremental administrative or network infrastructure costs. One such area where CSPs across the world have already ventured is the utilities sector (commonly known as smart metering or smart grid). CSPs including Rogers, AT&T, Vodafone, and Orange have already rolled out services to tap into the smart meter market by providing secure data transfer. Fraud Threats to M2M As CSPs expand their businesses into the M2M territory, they are also exposed to various new fraud threats. Some of the main threats likely to affect M2M devices are (Primary Source: GSMA Fraud Forum): 1. Attack against unattended devices - M2M devices will often be left unattended, and therefore more susceptible to tampering. A fraudster may tamper with an M2M device in order to use free mobile service (e.g. by removing and using the Universal Integrated Circuit Card (UICC) in another mobile device), or to suppress payment or usage-related messages sent from the M2M device (e.g. utility meter, road tolling system). Unauthorized use of unattended M2M devices may go unnoticed for longer compared to traditional mobile devices. Examples: a) Unlocked smart meter SIM card racks up loss of $200,000 A 33 year old disability pensioner stole a SIM card from the energy meter and used it to download movies, surf the net and social networking sites, presumably also check email, as well as make phone calls. Since the SIM card was unlocked it could be used in smartphones and 3G modems for various services all of which were billed to energy meter provider. This fraudster racked up a bill of $200,000. This episode shows how important it is to enable security on smart meter SIM cards *Source: ITWire, May 2011 b) Thieves disrupt 400 South African traffic lights by stealing their mobile phone SIM cards In Johannesburg, some 400 South African traffic lights were rendered out of action after thieves stole the mobile phone SIM cards contained within them. The thieves then used these SIM cards to make calls, running up bills amounting to thousands of dollars. One of the cards had a bill of 30,000 rand ($4,500; 2,900) and there were about 150 SIM card bills. Apart from these direct financial losses, repairing the faulty traffic lights would cost the Johannesburg Road Agency (JRA) about 9m rand ($1.3m; 870,000). This example shows how important it is to enable tight security on M2M devices. *Source: BBC News, Jan 2011 An additional impact of attacks against unattended embedded devices is the potential collateral damage caused to other (often very valuable) equipment that houses such devices e.g. meters, vehicles, etc. 3 Subex Limited

2. Cloning - For M2M to work, CSPs need to design and support new business models and usage scenarios. For this, new mechanisms for remote provisioning and re-provisioning are being developed. A remote provisioning solution would involve the transfer of operator credentials to a UICC outside of the secure and trusted environment of the UICC manufacturer. If the credentials are not properly secured during generation, storage and transfer, then subscription cloning will be introduced as a risk to the operator. Similarly, a vulnerability in the mechanism for remotely upgrading the security configuration or security algorithm on a UICC in an M2M device could lead to compromise and financial or brand damage for the CSP. As well as cloning, other forms of unauthorised re-programming may be possible e.g. altering the types and range of service supported by the device. 3. Malware attack - The malware risk will vary depending on the M2M application and the device s interfaces. For example, sealed M2M-enabled utility meters that only communicate with the utility company are less vulnerable to malware than M2M-enabled personal gaming devices that support application download and installation. There is also a risk that malware may be introduced to the UICC via applications somehow introduced (erroneously or maliciously) via the remote provisioning channel. 4. Denial of Service (DoS) Attacks - Two types of risks exist: Examples: a) Attacks against the M2M devices and services. The expected large number of terminals and the automated nature of traffic would appear to be more prone to DoS attacks. These attacks can be either caused deliberately or by bad M2M application design. b) Attacks against non-m2m devices and services which are launched from M2M devices. The large number of terminals with similar configuration and potential vulnerabilities would make M2M devices prime candidates for launching distributed DoS attacks against a CSP or other carrier services (e.g. customer care or emergency numbers). The M2M devices could also become elements of a botnet operated remotely by a malicious party. The impact of a DoS attack will vary depending on the M2M application, e.g. high impact for ecall (automated emergency calling service from vehicles following accidents) vs. low impact for something like a personal fitness monitor. 5. Unauthorised Access to Data - M2M devices and applications will collect large quantities of data that may be considered personal or private. Unauthorised disclosure or use of this data by the CSPs could lead to significant reputation damage and legal consequences. 4 Subex Limited

Countermeasures Many fraud management techniques, both traditional and more innovative, can be applied effectively in the M2M environment: Rule-Based: A wide range of rule-based countermeasures can be effectively applied to M2M such as: Overlapping and velocity rules to detect clones, High use/volume threshold rules etc to spot excessive use of devices that are expected to have low associated activity Rules to detect Invalid service usage can be used to detect stolen or re-programmed devices Negative rules could be used for spotting DoS attacks e.g. where smart-meters or vehicle tracking devices are suppressed. Profiling: Many M2M applications will have very specific and precise behaviour (e.g. tracking device sending location every 15mins, or smart meter sending telemetry at 2am every day. So, deviations from such behaviour can be easy to spot through appropriate profiling techniques e.g. if calls/day not equal to x, SMS not received between 01.00 and 02.00 on any day, or traffic volume deviates by more than x% from daily average, etc Real timecontrols: All of the above approaches can be combined with active in-line rules and policy controls to take direct proactive measures against suspect or undesirable behaviour, for example barring unauthorised services being requested by utility meters, or notifying the device owner of a tracking device that has not called in with location updates. Conclusion As CSPs continue to exploit this growing market, it is crucial for them to have appropriate controls in place to counter various fraud threats. An end-end fraud management solution like Subex s ROC Fraud Management can help CSPs counter existing and future M2M frauds. Since M2M is a relatively new and dynamic environment, CSPs and vendors will have to work together to stay on top of new fraud trends, which if not properly addressed could lead to substantial exposure and revenue loss. 5 Subex Limited

About Subex Subex Limited is a leading global provider of Business Support Systems (BSS) that empowers communications service providers (CSPs) to achieve competitive advantage through Business Optimization - thereby enabling them to improve their operational efficiency to deliver enhanced service experiences to subscribers. The company pioneered the concept of a Revenue Operations Center (ROC ) a centralized approach that sustains profitable growth and financial health through coordinated operational control. Subex's product portfolio powers the ROC and its best-in-class solutions such as revenue assurance, fraud management, credit risk management, cost management, route optimization, data integrity management and interconnect / inter-party settlement. Subex also offers a scalable Managed Services program and has been the market leader in Business optimization for four consecutive years according to Analysys Mason (2007, 2008, 2009 & 2010). Business optimisation includes fraud, revenue assurance, analytics, cost management and credit risk management. Subex has been awarded the Global Telecoms Business Innovation Award 2011 along with Swisscom for the industry s first successful Risk Reward Sharing model for Fraud Management Subex's customers include 28 of top 50 operators worldwide* and 33 of the world s 50 biggest# telecommunications service providers. The company has more than 300 installations across 70 countries. *GTB Carrier Guide, 2011 #Forbes Global 2000 list, 2011 Subex Limited Subex Inc. Subex (UK) Limited Subex (Asia Pacific) Pte. Limited RMZ Ecoworld, Devarabisanahalli, Outer Ring Road, Bangalore - 560037 India 12101 Airport Way, Suite 300 Broomfi eld, Colorado 80021 USA 3rd Floor, Finsbury Tower, 103-105 Bunhill Row, London, EC1Y 8LZ UK 175A, Bencoolen Street, #08-03 Burlington Square, Singapore 189650 Phone: +91 80 6659 8700 Fax: +91 80 6696 3333 Phone: +1 303 301 6200 Fax: +1 303 301 6201 Phone: +44 20 7826 5420 Fax: +44 20 7826 5437 Phone: +65 6338 1218 Fax: +65 6338 1216 Regional offices: Dubai Ipswich Sydney