150 likes | 163 Views
Learn about fraud cloning of SIM cards, GSM architecture, authentication processes, and effective prevention methods to secure wireless communication.
E N D
WIRELESS FRAUD Detection & Prevention
Method of Fraud CLONING of SIM Card
What is CLONING • scanning device that captures a valid customer numbers from the air during transmission. • numbers are then duplicated and programmed into another wireless phone, the cloned phone can then bill calls to original number.
What is SIM • Subscriber Identity Module (SIM) • It is a smart cards of the size of a general credit card, also a smaller size of a plug-in type. • It contains the subscriber’s • information and identity • authentication key • encryption key.
Authentication Key • It is used to authorize mobile service access and to avoid fraudulent access of cloned Mobile station.
Encryption Key • It protects against the unauthorized listening.
GSM • Global System for Mobile (GSM) A European system developed in 1982 for mobile TDMA, based on 2 objectives. It utilizes Open System Interconnections (OSI).
GSM ARCHITECTURE • Mobile station (MS) • Base station subsystems • Network and switching subsystems (NSS) • Operation subsystems(OSS)
In GSM Authentication is done by: • Registration • Dialed out call • Incoming call
M requests for authentication from HLR and VLR1. • The request is sent to HLR. • HLR keep the current record of M and updates it. • Then VLR1 is sent info to VLR1 to update its current data of M • Finally VLR1 confirms M for registration. Which confirms that M is in LA1.
CONCLUSION • If the legal users follows more uncertain movement patterns the chances increases of fraud events. • The increase number of making outgoing calls develops a pattern of the user which helps in detection of irregular pattern which can be easily detected. • By performing PLAU fraud detection is quick and up to great extent accurate and minimizes the probability of misrouted calls, and increase the security