[go: up one dir, main page]

Lin et al., 2002 - Google Patents

Potential fraudulent usage in mobile telecommunications networks

Lin et al., 2002

Document ID
15625601161210135558
Author
Lin Y
Chen M
Rao H
Publication year
Publication venue
IEEE Transactions on Mobile Computing

External Links

Snippet

This paper investigates the fraudulent usage of mobile telecommunications services due to cloned subscriber identity modules (SIMs). In GSM or the Universal Mobile Telecommunication System (UMTS), a mobile phone or mobile station uses its SIM to gain …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/50Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/38Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/06Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Supervisory, monitoring, management, i.e. operation, administration, maintenance or testing arrangements
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W68/00Notification of users, e.g. alerting for incoming communication or change of service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2215/00Metering arrangements; Time controlling arrangements; Time indicating arrangements

Similar Documents

Publication Publication Date Title
Lee et al. Extension of authentication protocol for GSM
EP1221272B1 (en) A method and system for protecting a user identifier
CN106302927A (en) The voice call platform that two-way number is hidden
US10051428B2 (en) Subscriber location database
Al-Tawil et al. A new authentication protocol for GSM networks
Lin et al. Potential fraudulent usage in mobile telecommunications networks
Gope et al. Anonymous and expeditious mobile user authentication scheme for glomonet environments
Fang General modeling and performance analysis for location management in wireless mobile networks
EP3148185A1 (en) Accessing method, system and storage medium for video conference
Abdelkader et al. Secure authentication approach based new mobility management schemes for mobile communication
CN104618898B (en) A kind of method of the IP short message encryption and decryption of based on SMS overIMS and IP short message encrypting and deciphering systems
CN113902025A (en) Fraud phone identification method and system
Stach et al. Performance of an enhanced GSM protocol supporting non-repudiation of service
Al-Fayoumi et al. Cloning SIM cards usability reduction in mobile networks
US9942767B2 (en) Reducing fraudulent activity associated with mobile networks
Kesdogan et al. Secure location information management in cellular radio systems
Dittler et al. ANOTEL: Cellular networks with location privacy
CN115758403A (en) Data encryption and decryption method and device, storage medium and electronic equipment
US10271270B2 (en) Reducing fraudulent activity associated with mobile networks
Wu et al. GROSS: One-time Secret Sharing Can Make Group-based Authentication More Efficient
Yousef GSM-security: a survey and evaluation of the current situation
CN117459634B (en) Method, system and medium for improving cross-data center blacklist interface access performance
Lin et al. Reducing call routing cost for femtocells
da Costa Next Generation Machine Learning Based Real Time Fraud Detection
RU2684488C1 (en) Secure data transmission system