The Community for Technology Leaders
Green Image
ABSTRACT
<p><b>Abstract</b>—This paper investigates the fraudulent usage of mobile telecommunications services due to cloned <it>subscriber identity module</it> (SIM). In GSM or <it>Universal Mobile Telecommunication System</it> (UMTS), a mobile phone or mobile station uses its SIM to gain network access through authentication. If the SIM of a legal user is cloned, then the cloned SIM can be used for GSM/UMTS authentication and fraudulent usage may occur. Under the existing GSM/UMTS mobility management and call setup procedures, we show how quickly the fraudulent usage can be detected. We also propose a simple solution to speed up the detection of potential fraudulent usage.</p>
INDEX TERMS
Fraudulent usage, GSM, mobile network, mobility management, subscriber identity module (SIM), Universal Mobile Telecommunication System (UMTS).
CITATION

H. C. Rao, Y. Lin and M. Chen, "Potential Fraudulent Usage in Mobile Telecommunications Networks," in IEEE Transactions on Mobile Computing, vol. 1, no. , pp. 123-131, 2002.
doi:10.1109/TMC.2002.1038348
94 ms
(Ver 3.3 (11022016))