DocumentCode
831903
Title
Potential fraudulent usage in mobile telecommunications networks
Author
Lin, Yi-Bing ; Chen, Ming-Feng ; Rao, Herman C H
Author_Institution
Dept. of Comput. Sci. & Inf. Eng, Nat. Chiao Tung Univ., Hsinchu, Taiwan
Volume
1
Issue
2
fYear
2002
Firstpage
123
Lastpage
131
Abstract
This paper investigates the fraudulent usage of mobile telecommunications services due to cloned subscriber identity modules (SIMs). In GSM or the Universal Mobile Telecommunication System (UMTS), a mobile phone or mobile station uses its SIM to gain network access through authentication. If the SIM of a legal user is cloned, then the cloned SIM can be used for GSM/UMTS authentication and fraudulent usage may occur. Under the existing GSM/UMTS mobility management and call setup procedures, we show how quickly the fraudulent usage can be detected. We also propose a simple solution to speed up the detection of potential fraudulent usage.
Keywords
cellular radio; telecommunication network management; telecommunication security; GSM; SIM; UMTS; Universal Mobile Telecommunication System; authentication; call setup procedures; cloned subscriber identity module; legal user; mobile telecommunications networks; mobility management; network access; potential fraudulent usage; 3G mobile communication; Authentication; GSM; Intelligent networks; Law; Legal factors; Mobile handsets; Mobile radio mobility management; Smart cards; Telecommunication services;
fLanguage
English
Journal_Title
Mobile Computing, IEEE Transactions on
Publisher
ieee
ISSN
1536-1233
Type
jour
DOI
10.1109/TMC.2002.1038348
Filename
1038348
Link To Document