Abstract
The degree of insecurity occasioned by fraudulent practices in Nigeria has been of great concern economically, especially as it relates to overseas transactions. This paper was designed to mitigate this problem for Nigeria and countries with similar dispositions. Based on a survey involving field trip to Nigeria, the paper examines the general security situation in Nigeria and its mutual impacts with computerisation, miniaturisation and Location-Based Authentication (LBA). It was discovered that both computerisation and miniaturisation had some negative effects on cyber-security, as these were being exploited by fraudsters, especially using ‘advance fee fraud;’ popularly called 419. As a countermeasure, the research examined the possibility of using LBA and further digitisation of the GSM Mobile country codes down to City/Area codes along with GSM Mobile/Global Positioning System (GPS) authentications. Where necessary, these could be combined with the use of a web-based Secret Sharing Scheme for services with very high security demands. The anticipated challenges were also examined and considered to be of negligible impacts; especially roaming.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
The Tech Terms Computer Dictionary. http://www.techterms.com/definition/cyberspace. Accessed 28 September 2014
Oxford Dictionaries. http://www.oxforddictionaries.com/definition/english/cyberspace. Accessed 28 September 2014
Adeka, M.I.U., Shepherd, S.J Abd-Alhameed, R.A.: Cryptography and Computer Communications Security: Extending the Security Perimeter through a Web of Trus MPhil-PhD Transfer Report, School of Engineering and Informatics, University of Bradford, Bradford (UK), (Ongoing: 2011-)
Rouse, M.: Peripherals Glossary (2007). http://whatis.techtarget.com/definition/digitization. Accessed 28 September 2014
Moore, G.E.: Cramming More Components onto Integrated Circuits, ed. McGraw-Hill, New York (1965)
Adeka, M., Shepherd, S., Abd-Alhameed, R.: Extending the security perimeter through a web of trust: the impact of GPS technology on location-based authentication techniques. In: Proceedings of the Fifth International Conference on Internet Technologies and Applications (ITA 2013), pp. 465–473 (2013)
Aslam, H.D., Azhar, M.S., Yasmeen, K., Farhan, H.M., Badar, M., Habib, A.T.: Effects of globalization on developing countries. J. Am. Sci 8(8), 222–227 (2012)
Core ICT Indicators-ITU ed, 2005. http://www.itu.int/pub/D-IND-ICT_CORE-2010/en. Accessed 28. September 2014
Hadnagy, C.: Social engineering: The art of human hacking: John Wiley & Sons, 2010
Chawki, M.: Nigeria tackles advance free fraud. J. Inf. Law Technol. 1(1), 1–20 (2009)
Ehimen, O., Bola, A.: Cybercrime in Nigeria. Bus Intell. J. 3, 93–98 (2010)
Ashaolu, D.: Combating Cybercrimes in Nigeria Upcoming cyberlaw textbook. Prentice Hall Publishers, Upper Saddle River (2011)
EFCC, EFCC Annual Report September 2013
N.P. (SFU), Fraudulent Crime Statistics (EFCC/NFIU)–2012–2014 (2014)
Internet World Statistics. http://www.internetworldstats.com/af/ng.htm. Accessed 28 September 2014
Nigerian Communications Commission. http://ncc.gov.ng/index.php?option=com_content&view=article&id=125:subscriber-statistics&catid=65:industry-information&Itemid=73. Accessed 28.September 2014
Rinne, M., Tirkkonen, O.: LTE, the radio technology path towards 4G. Comput. Commun. 33, 1894–1906 (2010)
Akyildiz, I.F., Gutierrez-Estevez, D.M., Reyes, E.C.: The evolution to 4G cellular systems: LTE-Advanced. Phys.Commun. 3, 217–244 (2010)
Sayed, A.H., Tarighat, A., Khajehnouri, N.: Network-based wireless location: challenges faced in developing techniques for accurate wireless location information. Sig. Process. Mag. IEEE 22, 24–40 (2005)
Ghosh, A., Ratasuk, R., Mondal, B., Mangalvedhe, N., Thomas, T.: LTE-advanced: next-generation wireless broadband technology [Invited Paper]. Wireless Communications, IEEE 17, 10–22 (2010)
Abeta, S.: Toward LTE commercial launch and future plan for LTE enhancements (LTE-Advanced). IEEE Int. Conf Commun. Syst. (ICCS) 2010, 146–150 (2010)
Technical Standards: National Numbering Plan. http://www.ncc.gov.ng/index.php?option=com_content&view=category&id=75&Itemid=102. Accessed 2 October 2013)
Country Codes, Phone Codes, Dialing Codes, Telephone Codes, ISO Country Codes. http://countrycode.org/. Accessed 2 October 2013
John, M.: Location Services Part 2: LTE Release 9 Features, LTE University, 2011
Area Code History. http://www.area-codes.com/area-code-history.asp. Accessed 2 October 2013
Jaros, D., Kuchta, R.: New location-based authentication techniques in the access management. In: 2010 6th International Conference on Wireless and Mobile Communications (ICWMC), pp. 426–430 (2010)
Song, Z., Li, Z., Dou, W.: Different approaches for the formal definition of authentication property. In: The 9th Asia-Pacific Conference on Communications, APCC 2003, pp. 854–858 (2003)
He, R., Yuan, M., Hu, J., Zhang, H., Kan, Z Ma, J.: A novel service-oriented AAA architecture. In: 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications PIMRC 2003, pp. 2833–2837 (2003)
Kou, Y., Detecting the sybil attack cooperativelyLu, C-T., Sirwongwattana, S., Huang, Y-P.: Survey of fraud detection techniques. In: 2004 IEEE International Conference on Networking, Sensing and Control, pp. 749–754 (2004)
Cell Phone Fraud. Available: http://www.fcc.gov/guides/cell-phone-fraud. Accessed 2 October 2013
Demirbas, M., Song, Y.: An RSSI-based scheme for sybil attack detection in wireless sensor networks. Proceedings of the 2006 International Symposium on World of Wireless. Mobile and Multimedia Networks, pp. 564–570. IEEE Computer Society, Washington DC (2006)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Ssu, K.-F., Wang, W.-T., Chang, W.-C.: Detecting Sybil attacks in Wireless Sensor Networks using neighboring information. Comput. Netw. 53, 3042–3056 (2009)
Yin, J., Madria, S. K.: Sybil attack detection in a hierarchical sensor network In: Third International Conference on Security and Privacy in Communications Networks and the Workshops (SecureComm 2007), pp. 494–503 (2007)
Zhang, Q., Wang, P., Reeves, D. S., Ning, P.: Defending against sybil attacks in sensor networks. In: 25th IEEE International Conference on Distributed Computing Systems Workshops 2005, pp. 185–191. IEEE Computer Society, Washington DC (2005)
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: Defending against sybil attacks via social networks. ACM SIGCOMM Comput. Commun. Rev. 36(4), 267–278 (2006)
Khalil, I., Bagchi, S., Rotaru, C.N., Shroff, N.B.: Unmask: utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. Ad Hoc Netw. 8, 148–164 (2010)
Levine, B.N., Shields, C., Margolin, N.B.: A Survey of Solutions to the Sybil Attack. University of Massachusetts Amherst, Amherst, MA (2006)
Lv, S., Wang, X., Zhao, X., Zhou, X.: Detecting the sybil attack cooperatively in wireless sensor networks. In: International Conference on Computational Intelligence and Security, CIS 2008, pp. 442–446 (2008)
Danezis, G., Mittal, P.: SybilInfer: Detecting sybil nodes using social networks. In: NDSS (2009)
Cao, J., Ma, M., Li, H., Zhang, Y.: A survey on security aspects for lte and lte-a networks. IEEE Commun. Surv. Tutorials 16(1), 283–302 (2014)
Barbeau, M., Robert, J.-M.: Rogue-base station detection in WiMax/802.16 wireless access networks. Ann. Des. Telecommun. 61(11–12), 1300–1313 (2006)
Barbeau, M., Hall, J., An, H.-C.: Detecting impersonation attacks in future wireless and mobile networks. In: Burmester, M., Yasinsac, A. (eds.) MADNES 2005. LNCS, vol. 4074, pp. 80–95. Springer, Heidelberg (2006)
Parkvall, S., Furuskär, A., Dahlman, E.: Evolution of lte towards imt-advanced. http://www.ericsson.com/res/docs/2013/evolution-of-lte-towards-imt-advanced.pdf. Accessed 2 October 2013
Lee, W.C.: Mobile Cellular Telecommunications: Analog and Digital Systems. McGraw-Hill Professional, New York (1995)
Acknowledgments
The role of the Petroleum Technology Development Fund (PTDF, Nigeria) for sponsoring the main PhD Programme, which produced this paper, is hereby acknowledged. The same is true of the Nigerian Army which approved the programme. The authors also appreciate the contributions of the various staffs and departments of the School of Engineering and Informatics, University of Bradford, UK.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Adeka, M. et al. (2015). Nigeria: Cyber Space Security Vis a Vis Computerisation, Miniaturisation and Location-Based Authentication. In: Mumtaz, S., Rodriguez, J., Katz, M., Wang, C., Nascimento, A. (eds) Wireless Internet. WICON 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 146. Springer, Cham. https://doi.org/10.1007/978-3-319-18802-7_43
Download citation
DOI: https://doi.org/10.1007/978-3-319-18802-7_43
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18801-0
Online ISBN: 978-3-319-18802-7
eBook Packages: Computer ScienceComputer Science (R0)