Embedded Mobile (M2M): Fraud and security management

The GSMA tells us to expect 500 million new connected devices in three years as the machine-to-machine (M2M) market booms. The growth in fraud could be equally rapid unless all the loopholes are closed.

There are boundless fraud risks associated with Embedded Mobile devices and their relevant applications, processes and different business models.

Communication service providers are finding that traditional security and fraud countermeasures are not practical, because there are too many new devices and configurations used in M2M.

What will be offered and who owns the risk?

In recent years, the telecoms industry has aligned with the financial services sector through to m-banking and m-commerce. Now with M2M extending the range of new markets and business partners to vehicle manufacturers, insurance providers, utility and medical businesses and vending machine suppliers, the opportunity for fraud is widening.

Types of fraud and security attacks

The CSP will need to evaluate the level of risk by initially defining some basic areas to be subjected to a risk assessment. These include the radio interface (communication path), provisioning, authentication (device & customer), actual product security, attended/unattended devices, operational control, device management, privacy and confidentiality of information.

For the core network protection, the security threat could take the form of impersonation of devices, traffic tunneling between impersonated devices, and firewall misconfiguration specific to the modem, router or gateway or attacks against the radio network being committed by rogue devices.

On a more basic level, unattended embedded mobile devices will often have their Universal Integrated Circuit Card (UICC) stolen. In South Africa recently, fraudsters stole more than 400 SIMs and made calls costing thousands of dollars in a systematic and co-ordinated attack.

Application designers must even consider the threat from Denial of Services attacks. A distributed DoS attack on the emergency services, during a major incident, is a high impact attack that would damage any CSP.

EM devices and applications collect masses of information that could be “confidential and private”. Any wrongful disclosure will both blight the CSP’s brand image and result in legal action.

Meanwhile, the boom in M2M will attract new device makers and app developers to the telecoms industry who may not appreciate procedures or understand the risks – as happened with the new round of mobile providers.

Considerations for a successful risk management strategy

Having considered potential risks, the CSP should consider how to defend itself. Adapting existing Fraud Management Systems (FMS) is an option when there are expected usage profiles.

However, defences need to extend beyond the traditional methods, by factoring in the way the devices and services are provisioned and offered. For example, a CSP needs to detect tampering or physical removal of a device. Location updates will ensure integrity of the device. Which means that if the device is programmed to call in every X hours or the cell ID changes, movement of a fixed device can be indicated.

Summary

of processes. Staff must be educated in new M2M fraud trends, and new products and services assessed for fraud and security weaknesses. In support of this, state of the art technology should be used to quickly raise alerts for suspect activity.

RECENT ARTICLES

Aeris to acquire IoT business from Ericsson

Posted on: December 8, 2022

Ericsson and Aeris Communications, a provider of Internet of Things (IoT) solutions based in San Jose, California, have signed an agreement for the transfer of Ericsson’s IoT Accelerator and Connected Vehicle Cloud businesses.

Read more

Telenor IoT passes milestone of 20mn SIM cards

Posted on: December 8, 2022

Telenor, the global IoT provider and telecom operator, has experienced rapid growth over the last years and ranks among the top 3 IoT operators in Europe and among the top IoT operators in the world. The positive development is due to an accelerated pace of new customers combined with a successful growth of existing customers’

Read more
FEATURED IoT STORIES

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption, is leading the charge to dominate the next decade’s discussion around business IT. Below, we’ll discuss the current boom, what’s driving it, where it’s going,

Read more

Talking Heads: The M2M Doctor is in the House

Posted on: December 26, 2013

Mobile health is M2M at its most rewarding. So says, Dan MacDuffie CEO of Wyless (left). And he should know, his managed services company has achieved 50% yearon- year growth recently and a growing portion of that is in mHealth and Wellness services. He’s certain we’re standing on the threshold of a new generation of health services that cut delivery costs, extend the reach

Read more

Talking Heads: mHealth gains ground as one-stop shops and M2M with ‘wired safety net’ bring efficient patient monitoring

Posted on: December 23, 2013

For years analysts have touted mobile healthcare as a huge opportunity for those offering machine-to-machine communication (M2M) services. Truth be told, the progress so far has been patchy, at best. So M2M Now asked Alexander Bufalino, SEVP Global Marketing at Telit, to describe the hurdles in the way of M2M mHealth, how they are now being overcome and what

Read more

Unlocking the total value of M2M

Posted on: December 19, 2013

Do you ever wonder why people and organisations invest in machine-to-machine communications (M2M) and the Internet of Things (IoT), asks Fred Yentz? Reasons may differ somewhat across industry segments but in most cases they fall in one or more of three categories: To make money, to save money or to be compliant. ILS Technology is squarely focused on helping

Read more

Paving the way to the Internet of Things

Posted on: December 17, 2013

Combining the ARM computing engine with location-awareness and wireless connectivity It’s set to be the Perfect Storm: The rapid growth of high-speed cellular networks and the introduction of IP version 6 which has enough IP addresses for every grain of sand on Earth. Add to this mix the proliferation of the ARM embedded computing architecture, now the de facto global

Read more

What’s the ‘real deal’ on the Internet of Things?

Posted on: December 16, 2013

The ‘Internet of Things’ buzzword appears to have picked up steam during the past several months as large players such as GE and Cisco have touted their stories on the growing number of connected devices. But, as Alex Brisbourne of KORE asks, how different, if at all, is the Internet of Things when compared with other connected device markets,

Read more

M2M Now Magazine December 2013 Edition

Posted on: December 5, 2013

M2M Now magazine explores the evolving opportunities and challenges facing CSPs across this sector. Our exclusive interviews pass on some key lessons learned by those who have taken the first steps in next gen Machine to Machine (M2M) services. In the latest issue: TALKING HEADS: Alexander Bufalino of Telit tells how one-stop shops and M2M with a ‘wired

Read more