Abstract
This paper studies the probability of using cloning subscriber identity module (SIM) cards in Universal Mobile Telecommunications Systems. It also explores how the mobile system can discover the cloning SIM cards as soon as possible and how to reduce the probability of using cloning SIM cards in mobile networks. The illegal mobile station attached to mobile networks can be detected by a Normal Location Area Update, a periodic area location update, and by outgoing calls that are issued from genuine mobiles. An analytical model is developed to investigate the effects of a location area update and outgoing calls issued by genuine mobiles on the use of illegal mobiles. Mobility management, such as registration, cancellation, and outgoing and incoming procedures for legal and illegal users are investigated and analysed. An analytical model to investigate the effect of outgoing call arrival rates, and location area residence time on the detected illegal user has been presented. This paper seeks to increase the security of communication by avoiding fraud of cloned mobile phones by proposing a solution to speed up the detection of cloning SIM cards.
Similar content being viewed by others
References
AL-Saraireh, J.: Efficient and secure authentication and key agreement protocol. J UbiComp A, Int (2011). doi:10.5121/iju2011.2201
AL-Saraireh, J.: Security performance analysis and enhancement of authentication protocol in Wireless Mobile Networks. J Am Sci 7(5), 599–610 (2011)
Taheri, J., Zomaya, A.Y.: A simulation tool for mobility management experiments. Int J Pervasive Comput Commun A (2009). doi:10.1108/17427370910991893
Kara, N.: Mobility management approaches for mobile IP networks: performance comparison and use recommendations. IEEE Trans Mobile Comput 8(10), 1312–1325 (2009). doi:10.1109/TMC.2009.36
Taheri J, Zomaya AY (2008) Bio-inspired Algorithms for Mobility Management. Int. Sympos Parallel Archit Algorith Netw 216–223. doi:10.1109/I-SPAN.2008.26
Bhadauria V, Sharma S (2011) A comparative study of location management schemes: challenges and guidelines. Int J Comput Sci Eng (IJCSE) 3(7)
Lin, Y.-B., Chen, M.-F., Rao, H.C.-H.: Potential fraudulent usage in mobile telecommunications networks. IEEE Trans Mob Comput 1(2), 123–131 (2002). doi:10.1109/TMC.2002.1038348
Park D, Oh M, Looi M (1998) A Fraud Detection Method Using IS-41C Protocols and Its Application To the Third Generation Wireless Systems. IEEE Global Telecommunication Conference, GLOBECOM’ 98. The Bridge to Global Integration 4, 1984–1989. doi:10.1109/GLOCOM.1998.775888
Galiano HL, Ling LL (1998) An analysis of signaling traffic for authentication and privacy protocols in cellular and PCS systems. Telecommunications Symposium, 1998. ITS’98 Proceedings. SBT/IEEE international 1:329–334. doi: 10.1109/ITS.1998.713141
Notare M, Cruz F, Riso B, Westphall C (1999) Wireless communications: security management against cloned cellular phones. IEEE wireless communications and networking conference, WCNC’1999 3:1412–1416 (1999). doi:10.1109/WCNC.1999.796970
Lin, Y., Chlamtac, I.: Wireless and mobile network architecture. Wiley, New Jersey (2001)
Xiao Y, Fang Y, Lin Y-B (2003) Implicit deregistration in 3G cellular networks. IEEE international conference on communications ICC’03 2:944–948. doi:10.1109/ICC.2003.1204480
Lin, Y.-B., Pang, A.-C., Rao, H.C.-H.: Impact of mobility on mobile telecommunications networks. Wirel Commun Mob Comput 5(7), 713–732 (2005). doi:10.1002/wcm.338
Muratore, F.: UMTS: mobile communications for the future. Wiley, London (2001)
Ross, S.: Stochastic processes. Wiley, London (1983)
Ross, S.: Introduction to probability and statistics for engineering and scientists, 3rd edn. Elsevier Academic Press, Amsterdam (2004)
Fang, Y., Chlamtac, I., Fei, H.-R.: Analytical results for optimal choice of location update interval for mobility database failure restoration in PCS Networks. IEEE Trans Parallel Distrib Syst 11(6), 615–624 (2000)
Fang, Y., Chlamtac, I., Lin, Y.-B.: Channel occupancy times and handoff rate for mobile computing and PCS Networks. IEEE Trans Comput 47(6), 679–692 (1998). doi:10.1109/12.689647
Watson, E.J.: Laplace transforms and applications. Van Nostrand Reinhold, New York (1981)
Fang, Y., Chlamtac, I., Lin, Y.-B.: Portable movement modeling for PCS networks. IEEE Trans Vehicular Technol 49(4), 1356–1363 (2000)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Al-Fayoumi, M.A., Shilbayeh, N.F. Cloning SIM Cards Usability Reduction in Mobile Networks. J Netw Syst Manage 22, 259–279 (2014). https://doi.org/10.1007/s10922-013-9299-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10922-013-9299-8