Wireless communications: security management against cloned cellular phones
نویسندگان
چکیده
Digital Object Identifier : 10.1109/WCNC.1999.796970 This work presents the development of a distributed security management system for telecommunication networks. The system consists in reducing the use of cloned mobile telephones (same both number and series of a genuine phone a perfect copy) using three main techniques. (1) An ISO Formal Technique (LOTOS) is used to specify and validate the system through the Eucalyptus software employment. The validation process includes exhaustive and interactive simulations, testing and verifications in order to guarantee the correctness of the system. (2) A pattern recognition technique is used to classify the telephone users into classes. From this classification it is easier to identify if a call does not correspond to the patterns of a specific user, and thus identify whether a nongenuine caller made the call. MatLab software was employed to implement the classification algorithms. (3) A distributed object technique is used for the implementation of this distributed system (i.e., manager and agents), with CORBA support, considering TMN and ATM technologies, by VisiBroker and JDK software employment
منابع مشابه
Security and Fraud Detection in Mobile and Wireless Networks
The fusion of computer and telecommunication technologies has heralded the age of information superhighway over wireline and wireless networks. Mobile cellular communication systems and wireless networking technologies are growing at an ever-faster rate, and this is likely to continue in the foreseeable future. Wireless technology is presently being used to link portable computer equipment to c...
متن کاملAn overview of the security of wireless networks
Introduction More and more applications are being accessed through wireless systems, including commerce, medical, manufacturing, and others [Var00]. Wireless devices have become an extension of corporate databases and individuals. Their security compromises are as serious as any attack to the corporate database and may have damaging effects on the privacy of individuals and the protection of as...
متن کاملMobile and Wireless Communications Security
This article presents an overview of security issues for mobile and wireless communications. It describes the security requirements and architectural options for these networks. Subsequently three technologies are discussed in more detail: mobile phones (GSM and 3GSM), Wireless LAN (IEEE 802.11) and Personal Area Networks (Bluetooth). A critical evaluation is given of the strengths and weakness...
متن کاملWireless Networks
Future wireless networks will enable people on the move to communicate with anyone, anywhere, at any time, using a range of multimedia services. The exponential growth of cellular telephone and paging systems coupled with the proliferation of laptop and palmtop computers indicate a bright future for such networks, both as stand-alone systems and as part of the larger networking infrastructure. ...
متن کاملAn efficient solution for management of pre-distribution in wireless sensor networks
A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999