The Community for Technology Leaders
Green Image
ABSTRACT
<p><b>Abstract</b>—This paper investigates the fraudulent usage of mobile telecommunications services due to cloned <it>subscriber identity module</it> (SIM). In GSM or <it>Universal Mobile Telecommunication System</it> (UMTS), a mobile phone or mobile station uses its SIM to gain network access through authentication. If the SIM of a legal user is cloned, then the cloned SIM can be used for GSM/UMTS authentication and fraudulent usage may occur. Under the existing GSM/UMTS mobility management and call setup procedures, we show how quickly the fraudulent usage can be detected. We also propose a simple solution to speed up the detection of potential fraudulent usage.</p>
INDEX TERMS
Fraudulent usage, GSM, mobile network, mobility management, subscriber identity module (SIM), Universal Mobile Telecommunication System (UMTS).
CITATION
Herman C.-H. Rao, Yi-Bing Lin, Ming-Feng Chen, "Potential Fraudulent Usage in Mobile Telecommunications Networks", IEEE Transactions on Mobile Computing, vol. 1, no. , pp. 123-131, April-June 2002, doi:10.1109/TMC.2002.1038348
98 ms
(Ver )