Skip to main content
Log in

Cloning SIM Cards Usability Reduction in Mobile Networks

  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

Abstract

This paper studies the probability of using cloning subscriber identity module (SIM) cards in Universal Mobile Telecommunications Systems. It also explores how the mobile system can discover the cloning SIM cards as soon as possible and how to reduce the probability of using cloning SIM cards in mobile networks. The illegal mobile station attached to mobile networks can be detected by a Normal Location Area Update, a periodic area location update, and by outgoing calls that are issued from genuine mobiles. An analytical model is developed to investigate the effects of a location area update and outgoing calls issued by genuine mobiles on the use of illegal mobiles. Mobility management, such as registration, cancellation, and outgoing and incoming procedures for legal and illegal users are investigated and analysed. An analytical model to investigate the effect of outgoing call arrival rates, and location area residence time on the detected illegal user has been presented. This paper seeks to increase the security of communication by avoiding fraud of cloned mobile phones by proposing a solution to speed up the detection of cloning SIM cards.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. AL-Saraireh, J.: Efficient and secure authentication and key agreement protocol. J UbiComp A, Int (2011). doi:10.5121/iju2011.2201

    Google Scholar 

  2. AL-Saraireh, J.: Security performance analysis and enhancement of authentication protocol in Wireless Mobile Networks. J Am Sci 7(5), 599–610 (2011)

    Google Scholar 

  3. Taheri, J., Zomaya, A.Y.: A simulation tool for mobility management experiments. Int J Pervasive Comput Commun A (2009). doi:10.1108/17427370910991893

    Google Scholar 

  4. Kara, N.: Mobility management approaches for mobile IP networks: performance comparison and use recommendations. IEEE Trans Mobile Comput 8(10), 1312–1325 (2009). doi:10.1109/TMC.2009.36

    Article  Google Scholar 

  5. Taheri J, Zomaya AY (2008) Bio-inspired Algorithms for Mobility Management. Int. Sympos Parallel Archit Algorith Netw 216–223. doi:10.1109/I-SPAN.2008.26

  6. Bhadauria V, Sharma S (2011) A comparative study of location management schemes: challenges and guidelines. Int J Comput Sci Eng (IJCSE) 3(7)

  7. Lin, Y.-B., Chen, M.-F., Rao, H.C.-H.: Potential fraudulent usage in mobile telecommunications networks. IEEE Trans Mob Comput 1(2), 123–131 (2002). doi:10.1109/TMC.2002.1038348

    Article  Google Scholar 

  8. Park D, Oh M, Looi M (1998) A Fraud Detection Method Using IS-41C Protocols and Its Application To the Third Generation Wireless Systems. IEEE Global Telecommunication Conference, GLOBECOM’ 98. The Bridge to Global Integration 4, 1984–1989. doi:10.1109/GLOCOM.1998.775888

  9. Galiano HL, Ling LL (1998) An analysis of signaling traffic for authentication and privacy protocols in cellular and PCS systems. Telecommunications Symposium, 1998. ITS’98 Proceedings. SBT/IEEE international 1:329–334. doi: 10.1109/ITS.1998.713141

  10. Notare M, Cruz F, Riso B, Westphall C (1999) Wireless communications: security management against cloned cellular phones. IEEE wireless communications and networking conference, WCNC’1999 3:1412–1416 (1999). doi:10.1109/WCNC.1999.796970

  11. Lin, Y., Chlamtac, I.: Wireless and mobile network architecture. Wiley, New Jersey (2001)

    Google Scholar 

  12. Xiao Y, Fang Y, Lin Y-B (2003) Implicit deregistration in 3G cellular networks. IEEE international conference on communications ICC’03 2:944–948. doi:10.1109/ICC.2003.1204480

  13. Lin, Y.-B., Pang, A.-C., Rao, H.C.-H.: Impact of mobility on mobile telecommunications networks. Wirel Commun Mob Comput 5(7), 713–732 (2005). doi:10.1002/wcm.338

    Article  Google Scholar 

  14. Muratore, F.: UMTS: mobile communications for the future. Wiley, London (2001)

    Book  Google Scholar 

  15. Ross, S.: Stochastic processes. Wiley, London (1983)

    MATH  Google Scholar 

  16. Ross, S.: Introduction to probability and statistics for engineering and scientists, 3rd edn. Elsevier Academic Press, Amsterdam (2004)

    Google Scholar 

  17. Fang, Y., Chlamtac, I., Fei, H.-R.: Analytical results for optimal choice of location update interval for mobility database failure restoration in PCS Networks. IEEE Trans Parallel Distrib Syst 11(6), 615–624 (2000)

    Article  Google Scholar 

  18. Fang, Y., Chlamtac, I., Lin, Y.-B.: Channel occupancy times and handoff rate for mobile computing and PCS Networks. IEEE Trans Comput 47(6), 679–692 (1998). doi:10.1109/12.689647

    Article  Google Scholar 

  19. Watson, E.J.: Laplace transforms and applications. Van Nostrand Reinhold, New York (1981)

    MATH  Google Scholar 

  20. Fang, Y., Chlamtac, I., Lin, Y.-B.: Portable movement modeling for PCS networks. IEEE Trans Vehicular Technol 49(4), 1356–1363 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mustafa A. Al-Fayoumi.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Al-Fayoumi, M.A., Shilbayeh, N.F. Cloning SIM Cards Usability Reduction in Mobile Networks. J Netw Syst Manage 22, 259–279 (2014). https://doi.org/10.1007/s10922-013-9299-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10922-013-9299-8

Keywords

Navigation