This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Potential Fraudulent Usage in Mobile Telecommunications Networks
April-June 2002 (vol. 1 no. 2)
pp. 123-131

Abstract—This paper investigates the fraudulent usage of mobile telecommunications services due to cloned subscriber identity module (SIM). In GSM or Universal Mobile Telecommunication System (UMTS), a mobile phone or mobile station uses its SIM to gain network access through authentication. If the SIM of a legal user is cloned, then the cloned SIM can be used for GSM/UMTS authentication and fraudulent usage may occur. Under the existing GSM/UMTS mobility management and call setup procedures, we show how quickly the fraudulent usage can be detected. We also propose a simple solution to speed up the detection of potential fraudulent usage.

[1] 3GPP, Third Generation Partnership Project, Technical Specification Group Services and Systems Aspects, 3G Security, Security Architecture, Technical Specification 3G TS 33.102, V3.7.0 (2000-12), 2000.
[2] 3GPP, Third Generation Partnership Project, Technical Specification Group Core Network, Location Management Procedures, 3G TS 23.012, V4.0.0, 2001.
[3] 3GPP, Third Generation Partnership Project, Technical Specification Group Core Network, Mobile Radio Interface Layer 3 Specification, Core Network Protocols—Stage 3 (Release 5), 3GPP TS 24.008, V5.0.0, 2001.
[4] I.F. Akyildiz and J.S.M. Ho, “Dynamic Mobile User Location Update for Wireless PCS Networks,” ACM-Baltzer J. Wireless Neworks, vol. 1, no. 1, pp. 187-196, 1995.
[5] I.F. Akyildiz, J. McNair, J.S.M. Ho, H. Uzunalioglu, and W. Wang, “Mobility Management in Next Generation Wireless Systems,” Proc. IEEE, vol. 87, no. 8, pp. 1347-1385, Aug. 1999.
[6] I. Chlamtac, T. Liu, and J. Carruthers, “Location Management for Efficient Bandwidth Allocation and Call Admission Control,” Proc. IEEE Wireless Comm. and Networking Conf., Sept. 1999.
[7] Y. Fang, I. Chlamtac, and Y.-B. Lin, Portable Movement Modeling for PCS Networks IEEE Trans. Vehicular Technology, July 2000.
[8] Y. Fang and I. Chlamtac, “Teletraffic Analysis and Mobility Modeling for PCS Networks,” IEEE Trans. Comm., vol. 47, no. 7, pp. 1062-1072, July 1999.
[9] J.-M. Gil, C.Y. Park, C.-S. Hwang, D.-S. Park, J.G. Shon, and Y.-S. Jeong, “Restoration Scheme of Mobility Databases by Mobility Learning and Prediction in PCS Networks,” IEEE J. Selected Area in Comm., vol. 19, no. 10, 2001.
[10] ISO/IEC, “Information Technology-Security Techniques—Entity Authentication—Part 4: Mechanisms Using a Cryptographic Check Function,” Technical Report ISO/IEC 9798-4, ISO/IEC, 1999.
[11] N.L. Johnson, Continuous Univariate Distributions-1. John Wiley&Sons, 1970.
[12] N.L. Johnson, Continuous Univariate Distributions-2. John Wiley&Sons, 1970.
[13] F.P. Kelly, Reversibility and Stochastic Networks. John Wiley&Sons, 1979.
[14] E.D. Lazowska, J. Zahorjan, G.S. Graham, and K.C. Sevcik, Quantitative System Performance, Prentice Hall, pp 64-66, 1984.
[15] Y.-B. Lin, “Eliminating Overflow for Large-Scale Mobility Databases in Cellular Telephone Networks,” IEEE Trans. Computer, vol. 50, no. 4, pp. 356-370, Apr. 2001.
[16] Y.-B. Lin and Y.-K. Chen, “Reducing Authentication Signaling Traffic in Third Generation Mobile Network,” IEEE Trans. Wireless Comm., 2002. See alsohttp://liny.csie.nctu.edu.tw#jorunal.
[17] Y.-B. Lin and I. Chlamtac, Wireless and Mobile Network Architectures. John Wiley&Sons, 2001.
[18] Y.-B. Lin and P. Lin, “Performance Modeling of Location Tracking Systems,” ACM Mobile Computing and Comm. Rev., vol. 2, no. 3, pp. 24-27, 1998
[19] Y.-B. Lin, S. Mohan, N. Sollenberg, and H. Sherry, “An Improved Adaptive Algorithm for Reducing PCS Network Authentication Traffic,” IEEE Trans. Vehicular Technology, vol. 46, no. 3, pp. 588-596, 1997.
[20] S.M. Ross, Stochastic Processes. John Wiley&Sons, 1996.
[21] E.J. Watson, Laplace Transforms and Applications. Birkhauserk, 1981.
[22] V.W.W. Wong and V.C.M. Leung, “An Adaptive Distance-Based Location Update Algorithm for Next-Generation PCS Networks,” IEEE J. Selected Area in Comm., vol. 19, no. 10, 2001.

Index Terms:
Fraudulent usage, GSM, mobile network, mobility management, subscriber identity module (SIM), Universal Mobile Telecommunication System (UMTS).
Citation:
Yi-Bing Lin, Ming-Feng Chen, Herman C.-H. Rao, "Potential Fraudulent Usage in Mobile Telecommunications Networks," IEEE Transactions on Mobile Computing, vol. 1, no. 2, pp. 123-131, April-June 2002, doi:10.1109/TMC.2002.1038348
Usage of this product signifies your acceptance of the Terms of Use.