• DocumentCode
    831903
  • Title

    Potential fraudulent usage in mobile telecommunications networks

  • Author

    Lin, Yi-Bing ; Chen, Ming-Feng ; Rao, Herman C H

  • Author_Institution
    Dept. of Comput. Sci. & Inf. Eng, Nat. Chiao Tung Univ., Hsinchu, Taiwan
  • Volume
    1
  • Issue
    2
  • fYear
    2002
  • Firstpage
    123
  • Lastpage
    131
  • Abstract
    This paper investigates the fraudulent usage of mobile telecommunications services due to cloned subscriber identity modules (SIMs). In GSM or the Universal Mobile Telecommunication System (UMTS), a mobile phone or mobile station uses its SIM to gain network access through authentication. If the SIM of a legal user is cloned, then the cloned SIM can be used for GSM/UMTS authentication and fraudulent usage may occur. Under the existing GSM/UMTS mobility management and call setup procedures, we show how quickly the fraudulent usage can be detected. We also propose a simple solution to speed up the detection of potential fraudulent usage.
  • Keywords
    cellular radio; telecommunication network management; telecommunication security; GSM; SIM; UMTS; Universal Mobile Telecommunication System; authentication; call setup procedures; cloned subscriber identity module; legal user; mobile telecommunications networks; mobility management; network access; potential fraudulent usage; 3G mobile communication; Authentication; GSM; Intelligent networks; Law; Legal factors; Mobile handsets; Mobile radio mobility management; Smart cards; Telecommunication services;
  • fLanguage
    English
  • Journal_Title
    Mobile Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1536-1233
  • Type

    jour

  • DOI
    10.1109/TMC.2002.1038348
  • Filename
    1038348