Quantitative system performance: computer system analysis using queueing network models
Quantitative system performance: computer system analysis using queueing network models
Dynamic mobile user location update for wireless PCS networks
Wireless Networks
Eliminating Overflow for Large-Scale Mobility Databases in Cellular Telephone Networks
IEEE Transactions on Computers
Wireless and Mobile Network Architectures
Wireless and Mobile Network Architectures
Performance modeling of location tracking systems
ACM SIGMOBILE Mobile Computing and Communications Review
Reducing authentication signaling traffic in third-generation mobile network
IEEE Transactions on Wireless Communications
An adaptive distance-based location update algorithm for next-generation PCS networks
IEEE Journal on Selected Areas in Communications
Restoration scheme of mobility databases by mobility learning and prediction in PCS networks
IEEE Journal on Selected Areas in Communications
Security and privacy issues for the network of the future
Security and Communication Networks
Cloning SIM Cards Usability Reduction in Mobile Networks
Journal of Network and Systems Management
Hi-index | 0.00 |
This paper investigates the fraudulent usage of mobile telecommunications services due to cloned subscriber identity module (SIM). In GSM or Universal Mobile Telecommunication System (UMTS), a mobile phone or mobile station uses its SIM to gain network access through authentication. If the SIM of a legal user is cloned, then the cloned SIM can be used for GSM/UMTS authentication and fraudulent usage may occur. Under the existing GSM/UMTS mobility management and call setup procedures, we show how quickly the fraudulent usage can be detected. We also propose a simple solution to speed up the detection of potential fraudulent usage.