1 / 15

WIRELESS FRAUD

Learn about fraud cloning of SIM cards, GSM architecture, authentication processes, and effective prevention methods to secure wireless communication.

lgalbraith
Download Presentation

WIRELESS FRAUD

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. WIRELESS FRAUD Detection & Prevention

  2. Method of Fraud CLONING of SIM Card

  3. What is CLONING • scanning device that captures a valid customer numbers from the air during transmission. • numbers are then duplicated and programmed into another wireless phone, the cloned phone can then bill calls to original number.

  4. What is SIM • Subscriber Identity Module (SIM) • It is a smart cards of the size of a general credit card, also a smaller size of a plug-in type. • It contains the subscriber’s • information and identity • authentication key • encryption key.

  5. Authentication Key • It is used to authorize mobile service access and to avoid fraudulent access of cloned Mobile station.

  6. Encryption Key • It protects against the unauthorized listening.

  7. GSM • Global System for Mobile (GSM) A European system developed in 1982 for mobile TDMA, based on 2 objectives. It utilizes Open System Interconnections (OSI).

  8. GSM ARCHITECTURE • Mobile station (MS) • Base station subsystems • Network and switching subsystems (NSS) • Operation subsystems(OSS)

  9. In GSM Authentication is done by: • Registration • Dialed out call • Incoming call

  10. Registration

  11. Registration of a legal user M

  12. M requests for authentication from HLR and VLR1. • The request is sent to HLR. • HLR keep the current record of M and updates it. • Then VLR1 is sent info to VLR1 to update its current data of M • Finally VLR1 confirms M for registration. Which confirms that M is in LA1.

  13. An outgoing call of M

  14. An incoming call to M in period .

  15. CONCLUSION • If the legal users follows more uncertain movement patterns the chances increases of fraud events. • The increase number of making outgoing calls develops a pattern of the user which helps in detection of irregular pattern which can be easily detected. • By performing PLAU fraud detection is quick and up to great extent accurate and minimizes the probability of misrouted calls, and increase the security

More Related