Skip to main content

Nigeria: Cyber Space Security Vis a Vis Computerisation, Miniaturisation and Location-Based Authentication

  • Conference paper
  • First Online:
Book cover Wireless Internet (WICON 2014)

Abstract

The degree of insecurity occasioned by fraudulent practices in Nigeria has been of great concern economically, especially as it relates to overseas transactions. This paper was designed to mitigate this problem for Nigeria and countries with similar dispositions. Based on a survey involving field trip to Nigeria, the paper examines the general security situation in Nigeria and its mutual impacts with computerisation, miniaturisation and Location-Based Authentication (LBA). It was discovered that both computerisation and miniaturisation had some negative effects on cyber-security, as these were being exploited by fraudsters, especially using ‘advance fee fraud;’ popularly called 419. As a countermeasure, the research examined the possibility of using LBA and further digitisation of the GSM Mobile country codes down to City/Area codes along with GSM Mobile/Global Positioning System (GPS) authentications. Where necessary, these could be combined with the use of a web-based Secret Sharing Scheme for services with very high security demands. The anticipated challenges were also examined and considered to be of negligible impacts; especially roaming.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. The Tech Terms Computer Dictionary. http://www.techterms.com/definition/cyberspace. Accessed 28 September 2014

  2. Oxford Dictionaries. http://www.oxforddictionaries.com/definition/english/cyberspace. Accessed 28 September 2014

  3. Adeka, M.I.U., Shepherd, S.J Abd-Alhameed, R.A.: Cryptography and Computer Communications Security: Extending the Security Perimeter through a Web of Trus MPhil-PhD Transfer Report, School of Engineering and Informatics, University of Bradford, Bradford (UK), (Ongoing: 2011-)

    Google Scholar 

  4. Rouse, M.: Peripherals Glossary (2007). http://whatis.techtarget.com/definition/digitization. Accessed 28 September 2014

  5. Moore, G.E.: Cramming More Components onto Integrated Circuits, ed. McGraw-Hill, New York (1965)

    Google Scholar 

  6. Adeka, M., Shepherd, S., Abd-Alhameed, R.: Extending the security perimeter through a web of trust: the impact of GPS technology on location-based authentication techniques. In: Proceedings of the Fifth International Conference on Internet Technologies and Applications (ITA 2013), pp. 465–473 (2013)

    Google Scholar 

  7. Aslam, H.D., Azhar, M.S., Yasmeen, K., Farhan, H.M., Badar, M., Habib, A.T.: Effects of globalization on developing countries. J. Am. Sci 8(8), 222–227 (2012)

    Google Scholar 

  8. Core ICT Indicators-ITU ed, 2005. http://www.itu.int/pub/D-IND-ICT_CORE-2010/en. Accessed 28. September 2014

  9. Hadnagy, C.: Social engineering: The art of human hacking: John Wiley & Sons, 2010

    Google Scholar 

  10. Chawki, M.: Nigeria tackles advance free fraud. J. Inf. Law Technol. 1(1), 1–20 (2009)

    Google Scholar 

  11. Ehimen, O., Bola, A.: Cybercrime in Nigeria. Bus Intell. J. 3, 93–98 (2010)

    Google Scholar 

  12. Ashaolu, D.: Combating Cybercrimes in Nigeria Upcoming cyberlaw textbook. Prentice Hall Publishers, Upper Saddle River (2011)

    Google Scholar 

  13. EFCC, EFCC Annual Report September 2013

    Google Scholar 

  14. N.P. (SFU), Fraudulent Crime Statistics (EFCC/NFIU)–2012–2014 (2014)

    Google Scholar 

  15. Internet World Statistics. http://www.internetworldstats.com/af/ng.htm. Accessed 28 September 2014

  16. Nigerian Communications Commission. http://ncc.gov.ng/index.php?option=com_content&view=article&id=125:subscriber-statistics&catid=65:industry-information&Itemid=73. Accessed 28.September 2014

  17. Rinne, M., Tirkkonen, O.: LTE, the radio technology path towards 4G. Comput. Commun. 33, 1894–1906 (2010)

    Article  Google Scholar 

  18. Akyildiz, I.F., Gutierrez-Estevez, D.M., Reyes, E.C.: The evolution to 4G cellular systems: LTE-Advanced. Phys.Commun. 3, 217–244 (2010)

    Article  Google Scholar 

  19. Sayed, A.H., Tarighat, A., Khajehnouri, N.: Network-based wireless location: challenges faced in developing techniques for accurate wireless location information. Sig. Process. Mag. IEEE 22, 24–40 (2005)

    Article  Google Scholar 

  20. Ghosh, A., Ratasuk, R., Mondal, B., Mangalvedhe, N., Thomas, T.: LTE-advanced: next-generation wireless broadband technology [Invited Paper]. Wireless Communications, IEEE 17, 10–22 (2010)

    Article  Google Scholar 

  21. Abeta, S.: Toward LTE commercial launch and future plan for LTE enhancements (LTE-Advanced). IEEE Int. Conf Commun. Syst. (ICCS) 2010, 146–150 (2010)

    Google Scholar 

  22. Technical Standards: National Numbering Plan. http://www.ncc.gov.ng/index.php?option=com_content&view=category&id=75&Itemid=102. Accessed 2 October 2013)

  23. Country Codes, Phone Codes, Dialing Codes, Telephone Codes, ISO Country Codes. http://countrycode.org/. Accessed 2 October 2013

  24. John, M.: Location Services Part 2: LTE Release 9 Features, LTE University, 2011

    Google Scholar 

  25. Area Code History. http://www.area-codes.com/area-code-history.asp. Accessed 2 October 2013

  26. Jaros, D., Kuchta, R.: New location-based authentication techniques in the access management. In: 2010 6th International Conference on Wireless and Mobile Communications (ICWMC), pp. 426–430 (2010)

    Google Scholar 

  27. Song, Z., Li, Z., Dou, W.: Different approaches for the formal definition of authentication property. In: The 9th Asia-Pacific Conference on Communications, APCC 2003, pp. 854–858 (2003)

    Google Scholar 

  28. He, R., Yuan, M., Hu, J., Zhang, H., Kan, Z Ma, J.: A novel service-oriented AAA architecture. In: 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications PIMRC 2003, pp. 2833–2837 (2003)

    Google Scholar 

  29. Kou, Y., Detecting the sybil attack cooperativelyLu, C-T., Sirwongwattana, S., Huang, Y-P.: Survey of fraud detection techniques. In: 2004 IEEE International Conference on Networking, Sensing and Control, pp. 749–754 (2004)

    Google Scholar 

  30. Cell Phone Fraud. Available: http://www.fcc.gov/guides/cell-phone-fraud. Accessed 2 October 2013

  31. Demirbas, M., Song, Y.: An RSSI-based scheme for sybil attack detection in wireless sensor networks. Proceedings of the 2006 International Symposium on World of Wireless. Mobile and Multimedia Networks, pp. 564–570. IEEE Computer Society, Washington DC (2006)

    Google Scholar 

  32. Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  33. Ssu, K.-F., Wang, W.-T., Chang, W.-C.: Detecting Sybil attacks in Wireless Sensor Networks using neighboring information. Comput. Netw. 53, 3042–3056 (2009)

    Article  MATH  Google Scholar 

  34. Yin, J., Madria, S. K.: Sybil attack detection in a hierarchical sensor network In: Third International Conference on Security and Privacy in Communications Networks and the Workshops (SecureComm 2007), pp. 494–503 (2007)

    Google Scholar 

  35. Zhang, Q., Wang, P., Reeves, D. S., Ning, P.: Defending against sybil attacks in sensor networks. In: 25th IEEE International Conference on Distributed Computing Systems Workshops 2005, pp. 185–191. IEEE Computer Society, Washington DC (2005)

    Google Scholar 

  36. Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: Defending against sybil attacks via social networks. ACM SIGCOMM Comput. Commun. Rev. 36(4), 267–278 (2006)

    Article  Google Scholar 

  37. Khalil, I., Bagchi, S., Rotaru, C.N., Shroff, N.B.: Unmask: utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. Ad Hoc Netw. 8, 148–164 (2010)

    Article  Google Scholar 

  38. Levine, B.N., Shields, C., Margolin, N.B.: A Survey of Solutions to the Sybil Attack. University of Massachusetts Amherst, Amherst, MA (2006)

    Google Scholar 

  39. Lv, S., Wang, X., Zhao, X., Zhou, X.: Detecting the sybil attack cooperatively in wireless sensor networks. In: International Conference on Computational Intelligence and Security, CIS 2008, pp. 442–446 (2008)

    Google Scholar 

  40. Danezis, G., Mittal, P.: SybilInfer: Detecting sybil nodes using social networks. In: NDSS (2009)

    Google Scholar 

  41. Cao, J., Ma, M., Li, H., Zhang, Y.: A survey on security aspects for lte and lte-a networks. IEEE Commun. Surv. Tutorials 16(1), 283–302 (2014)

    Article  Google Scholar 

  42. Barbeau, M., Robert, J.-M.: Rogue-base station detection in WiMax/802.16 wireless access networks. Ann. Des. Telecommun. 61(11–12), 1300–1313 (2006)

    Article  Google Scholar 

  43. Barbeau, M., Hall, J., An, H.-C.: Detecting impersonation attacks in future wireless and mobile networks. In: Burmester, M., Yasinsac, A. (eds.) MADNES 2005. LNCS, vol. 4074, pp. 80–95. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  44. Parkvall, S., Furuskär, A., Dahlman, E.: Evolution of lte towards imt-advanced. http://www.ericsson.com/res/docs/2013/evolution-of-lte-towards-imt-advanced.pdf. Accessed 2 October 2013

  45. Lee, W.C.: Mobile Cellular Telecommunications: Analog and Digital Systems. McGraw-Hill Professional, New York (1995)

    Google Scholar 

Download references

Acknowledgments

The role of the Petroleum Technology Development Fund (PTDF, Nigeria) for sponsoring the main PhD Programme, which produced this paper, is hereby acknowledged. The same is true of the Nigerian Army which approved the programme. The authors also appreciate the contributions of the various staffs and departments of the School of Engineering and Informatics, University of Bradford, UK.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Adeka .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Adeka, M. et al. (2015). Nigeria: Cyber Space Security Vis a Vis Computerisation, Miniaturisation and Location-Based Authentication. In: Mumtaz, S., Rodriguez, J., Katz, M., Wang, C., Nascimento, A. (eds) Wireless Internet. WICON 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 146. Springer, Cham. https://doi.org/10.1007/978-3-319-18802-7_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18802-7_43

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18801-0

  • Online ISBN: 978-3-319-18802-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics