首页 | 本学科首页   官方微博 | 高级检索  
     


Potential fraudulent usage in mobile telecommunications networks
Authors:Yi-Bing Lin Ming-Feng Chen Rao  HC-H
Affiliation:Dept. of Comput. Sci. & Inf. Eng, Nat. Chiao Tung Univ., Hsinchu;
Abstract:This paper investigates the fraudulent usage of mobile telecommunications services due to cloned subscriber identity modules (SIMs). In GSM or the Universal Mobile Telecommunication System (UMTS), a mobile phone or mobile station uses its SIM to gain network access through authentication. If the SIM of a legal user is cloned, then the cloned SIM can be used for GSM/UMTS authentication and fraudulent usage may occur. Under the existing GSM/UMTS mobility management and call setup procedures, we show how quickly the fraudulent usage can be detected. We also propose a simple solution to speed up the detection of potential fraudulent usage.
Keywords:
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号