Security Management Against Cloned Cellular Telephones

  • Authors:
  • Mirela Sechi Moretti Annoni Notare;Fernando Augusto da Silva Cruz;Bernardo Gonçalves Riso;Carlos Becker Westphall

  • Affiliations:
  • -;-;-;-

  • Venue:
  • ICON '99 Proceedings of the 7th IEEE International Conference on Networks
  • Year:
  • 1999

Quantified Score

Hi-index 0.00

Visualization

Abstract

The present work describes a security management system against the frauds related with the cloning of cellular phones. The system intends to make this fraud a nonlucrative business, and then, to finish with it. The system uses of three main techniques: (1) The ISO 8807 Technique (FDT LOTOS) is used to specify and validate the system through the Eucalyptus software employment; (2) A Pattern Recognition Technique is used to classify the telephone users into classes in order to identify if a call does not correspond to the patterns of a specific user -through MatLab software employment; and (3) CORBA Technique is used for the implementation of this distributed system (i.e., manager and agents), by VisiBroker software employment.