IEEE INFOCOM 2019 - IEEE Conference on Computer Communications 2019
DOI: 10.1109/infocom.2019.8737567
|View full text |Cite
|
Sign up to set email alerts
|

Nascent: Tackling Caller-ID Spoofing in 4G Networks via Efficient Network-Assisted Validation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(15 citation statements)
references
References 10 publications
0
15
0
Order By: Relevance
“…In [31], a network-assisted caller-ID authentication solution was proposed to validate the caller-ID information used during call setup, but is only applicable to 4G (Fourth-Generation) networks and not able to prevent caller-ID spoofing initiated via VoIP.…”
Section: B Evaluation Of Academic Solutions For Caller-id Spoofingmentioning
confidence: 99%
“…In [31], a network-assisted caller-ID authentication solution was proposed to validate the caller-ID information used during call setup, but is only applicable to 4G (Fourth-Generation) networks and not able to prevent caller-ID spoofing initiated via VoIP.…”
Section: B Evaluation Of Academic Solutions For Caller-id Spoofingmentioning
confidence: 99%
“…With assisted network solutions, the callee can communicate with a GW, and the GW can communicate with PBX [22] and/or with the IP Multimedia Subsystem (IMS) [9]. These solutions have several flaws.…”
Section: Related Workmentioning
confidence: 99%
“…The outcomes of the fake CID name are identified after the communication. It may cause significant loss of valuable material and/or the leaking of private information [9]. It was difficult to identify fake CID because there is no standard unique identification, such as a MAC address on a LAN network to identify CID.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Both the increase of robocalls and limited robocall prevention have prompted research to understand the threats [11], [12], [13] and solutions from heuristics to cryptography [14]. Solutions include using Caller ID (assuming no spoofing), black or whitelisting [15], call back verification [16], content and audio analysis [17], [18], chatbots [19], provider-based solutions (e.g., SHAKEN/STIR [20], Authenticated Caller ID [21], [22]), end-to-end solutions (e.g., AuthentiCall [23], [24]), and mobile applications that implement some of these solutions. This work investigates the use of mobile applications and evaluates the warning designs being used to alert users of incoming robocalls.…”
Section: Introductionmentioning
confidence: 99%