Lin et al., 2002 - Google Patents
Potential fraudulent usage in mobile telecommunications networksLin et al., 2002
- Document ID
- 15625601161210135558
- Author
- Lin Y
- Chen M
- Rao H
- Publication year
- Publication venue
- IEEE Transactions on Mobile Computing
External Links
Snippet
This paper investigates the fraudulent usage of mobile telecommunications services due to cloned subscriber identity modules (SIMs). In GSM or the Universal Mobile Telecommunication System (UMTS), a mobile phone or mobile station uses its SIM to gain …
- 238000000034 method 0 abstract description 11
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/50—Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/06—Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Supervisory, monitoring, management, i.e. operation, administration, maintenance or testing arrangements
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W68/00—Notification of users, e.g. alerting for incoming communication or change of service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q3/00—Selecting arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lee et al. | Extension of authentication protocol for GSM | |
EP1221272B1 (en) | A method and system for protecting a user identifier | |
CN106302927A (en) | The voice call platform that two-way number is hidden | |
US10051428B2 (en) | Subscriber location database | |
Al-Tawil et al. | A new authentication protocol for GSM networks | |
Lin et al. | Potential fraudulent usage in mobile telecommunications networks | |
Gope et al. | Anonymous and expeditious mobile user authentication scheme for glomonet environments | |
Fang | General modeling and performance analysis for location management in wireless mobile networks | |
EP3148185A1 (en) | Accessing method, system and storage medium for video conference | |
Abdelkader et al. | Secure authentication approach based new mobility management schemes for mobile communication | |
CN104618898B (en) | A kind of method of the IP short message encryption and decryption of based on SMS overIMS and IP short message encrypting and deciphering systems | |
CN113902025A (en) | Fraud phone identification method and system | |
Stach et al. | Performance of an enhanced GSM protocol supporting non-repudiation of service | |
Al-Fayoumi et al. | Cloning SIM cards usability reduction in mobile networks | |
US9942767B2 (en) | Reducing fraudulent activity associated with mobile networks | |
Kesdogan et al. | Secure location information management in cellular radio systems | |
Dittler et al. | ANOTEL: Cellular networks with location privacy | |
CN115758403A (en) | Data encryption and decryption method and device, storage medium and electronic equipment | |
US10271270B2 (en) | Reducing fraudulent activity associated with mobile networks | |
Wu et al. | GROSS: One-time Secret Sharing Can Make Group-based Authentication More Efficient | |
Yousef | GSM-security: a survey and evaluation of the current situation | |
CN117459634B (en) | Method, system and medium for improving cross-data center blacklist interface access performance | |
Lin et al. | Reducing call routing cost for femtocells | |
da Costa | Next Generation Machine Learning Based Real Time Fraud Detection | |
RU2684488C1 (en) | Secure data transmission system |