Sei sulla pagina 1di 30

A Technical Seminar report on

Mobile Cloning

A Dissertation submitted in partial fulfillment of the academic


requirements for the award of the degree.

Bachelor of Technology

In

Computer Science & Engineering


Submitted by
B.SURYA TEJA
(17H55A0501)

Department of Computer Science & Engineering

CMR College of Engineering & Technology


(An Autonomous Institution under UGC &JNTUH, Approved by AICTE, Permanently Affiliated to JNTUH, Accredited by NAAC with ’A’ Grade.)

2016 – 2020
CMR COLLEGE OF ENGINEERING & TECHNOLOGY
KANDLAKOYA, MEDCHAL ROAD, HYDERABAD – 501401

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

CERTIFICATE

This is to certify that the Technical Seminar report entitled "MOBILE CLONING"
being submitted by B.SURYA TEJA (17H55A0501) in partial fulfillment for the
award of Bachelor of Technology in Computer Science & Engineering is a record
of bonafide work carried out his/her under my guidance and supervision.
The results embodies in this seminar report have not been submitted to any
other University or Institute for the award of any Degree.

Dr. K. VIJAYA KUMAR


Professor and HOD
Department of CSE
Acknowledgment

With great pleasure I want to take this opportunity to express my heartfelt gratitude to all the people
who helped in making this technical seminar work a grand success.

I acknowledge my special thanks to my Seminar Coordinators, Mrs. R. Suhasini (Associate


Professor), Mr. Dr.K. Loheswaran (Associate Professor) and Mr. G. Ravi Kumar (Assistant
Professor), Department of Computer Science and Engineering for their constant encouragement, valuable
guidance and help in the successful completion of the seminar.

I would like to thank Mr. Dr. K. Vijaya Kumar, Head of the Department of Computer Science
and Engineering, for his moral support throughout the period of my study in CMRCET.

I am highly indebted to Major Dr. V.A. Narayana, Principal CMRCET for giving permission
to carry out this technical seminar in a successful and fruitful way.

I would like to thank the Teaching & Non- teaching staff of Department of Computer Science and
Engineering for their co-operation

Finally, I express my sincere thanks to Mr. Ch. Gopal Reddy, Secretary, CMR Group of
Institutions, for his continuous care. I sincerely acknowledge and thank all those who gave support
directly and indirectly in completion of this technical seminar work.

B. Surya Teja
(17H55A0501)
TABLE OF CONTENTS

CHAPTER TITLE TITLE PAGE


NO. NO.

INDEX i

LIST OF FIGURES iii

1. INTRODUCTION 1

2. WORKING OF MOBILE PHONE 3

2.1 How Wireless Technology Works 3

3. CELL PHONE CLONING 4

4. STARTING OF CELL PHONE CLONING 6

4.1 Security of Fixed Cell Phone Network 7

4.2 Security Functions of GSM and CDMA 8

5. PROCEDURE OF PHONE CLONING 9

5.1 Patagonia 10

6. IMPACT OF CLONING 12

7. METHODS TO DETECT CLONED PHONES 13

ON NETWORK

8. PHONE AND ITS SECURITY 15

9. DETECTION OF MOBILE CLONING 16

10. ROLE OF SERVICE PROVIDERTO COMBACT 17

CLONNING FRAUD

11. PREVENTION OF MOBILE CLONING 18

11.1 Service Provider Have adopted Certain Measures 19

To Prevent Cellular Fraud

i
TABLE OF CONTENTS

CHAPTER TITLE TITLE PAGE


NO. NO.

12. FACTS AND FIGURE 20

13. FUTURE THREATS 22

14. CONCLUSION 23

15. REFERENCES 24

ii
List of Figures

FIGURE TITLE PAGE


NO. NO.

3.1 Cellular Phone Cloning 5

5.0 Subscriber Identification Module 9

5.1.1 Electronic Serial Number 10

5.2 Cellular Cloning 11

7.1 Duplicate Detection 14

12.1 Cloning Statistics 21

iii
ABSTRACT

Mobile communication has been readily available for several years, and is major business
today. It provides a valuable service to its users who are willing to pay a considerable premium
over a fixed line phone, to be able to walk and talk freely. Because of its usefulness and the money
involved in the business, it is subject to fraud. Unfortunately, the advance of security standards has
not kept pace with the dissemination of mobile communication.Some of the features of mobile
communication make it an alluring target for criminals. It is a relatively new invention, so not all
people are quite familiar with its possibilities, in good or in bad. Its newness also means intense
competition among mobile phone service providers as they are attracting customers. The major
threat to mobile phone is from cloning. Cell phone cloning is a technique wherein security data
from one cell phone is transferred into another phone. The other cell phone becomes the exact
replica of the original cell phone like a clone. As a result, while calls can be made from both phones,
only the original is billed. Though communication channels are equipped with security algorithms,
yet cloners get away with the help of loop holes in systems. So when one gets huge bills, the chances
are that the phone is being cloned.This paper describes about the cell phone cloning with
implementation in GSM and CDMA technology phones. It gives an insight into the security
mechanism in CDMA and GSM phones along with the loop holes in the systems and discusses on
the different ways of preventing this cloning. Moreover, the future threat of this fraud is being
elaborated.

1
CHAPTER-1:
INTRODUCTION:

Cloning is the creation of an organism that is an exact genetic copy of another. This means that
every single bit of DNA is the same between the two!

Remember Dolly the lamb, cloned from a six-year-old ewe in 1997, by a group of
researchers at the Roslin Institute in Scotland? While the debate on the ethics of cloning continues,
human race, for the first time, are faced with a more tangible and harmful version of cloning and
this time it is your cell phone that is the target.

Millions of cell phones users, be it GSM or CDMA, run at risk of having their phones cloned.
As a cell phone user if you have been receiving exorbitantly high bills for calls that were never
placed, chances are that your cell phone could be cloned. Unfortunately, there is no way the
subscriber can detect cloning. Events like call dropping or anomalies in monthly bills can act as
tickers. While mobile cloning is an emerging threat for Indian subscribers, it has been happening in
other telecom markets since the 1990s, though mostly with regard to CDMA phones.

According to media reports, recently the Delhi (India) police arrested a person with 20 cell-
phones, a laptop, a SIM scanner, and a writer. The accused was running an exchange illegally
wherein he cloned CDMA based cell phones. He used software named Patagonia for the cloning
and provided cheap international calls to Indian immigrants in West Asia.

2
CHAPTER-2:

WORKING OF MOBILE PHONE:

Cell phones send radio frequency transmissions through the air on two distinct channels, one
for voice communications and the other for control signals. When a cellular phone makes a call, it
normally transmits its Electronic Security Number (ESN), Mobile Identification Number (MIN),
its Station Class Mark (SCM) and the number called in a short burst of data. This burst is the short
buzz you hear after you press the SEND button and before the tower catches the data. These four
things are the components the cellular provider uses to ensure that the phone is programmed to be
billed and that it also has the identity of both the customer and the phone. MIN and ESN is
collectively known as the ‘Pair’ which is used for the cell phone identification.

When the cell site receives the pair signal, it determines if the requester is a legitimate registered
user by comparing the requestor's pair to a cellular subscriber list. Once the cellular telephone's pair
has been recognized, the cell site emits a control signal to permit the subscriber to place calls at will.
This process, known as Anonymous Registration, is carried out each time the telephone is turned
on or picked up by a new cell site.

2.1 How Wireless Technology Works

ESN - The ESN (Electronic Serial Number) is the serial number of your cellular telephone.The
ESN is transmitted to the cell site and used in conjuction with the NAM to verify that you are a
legitimate user of the cellular system.

MIN - The MIN (Mobile Identification Number) is simply the phone number of the
cellular telephone.

Each cellular phone has a unique pair of identifying numbers: the electronic serial
number(“ESN”) and the mobile identification number (“MIN”). The ESN is programmed into
the wireless phone’s microchip by the manufacturer at the time of production. The MIN is a
ten-digit phone number that is assigned by the wireless carrier to a customer when an account
is opened. The MIN can be changed by the carrier, but the ESN, by law, cannot be altered.
When a cellular phone is first turned on, it emits a radio signal that broadcasts these numbers
to the nearest cellular tower. The phone will continue to emit these signals at regular intervals,
remaining in contact with the nearest cellular tower. These emissions (called autonomous
registration) allow computers at the cellular carrier to know how to route incoming calls to
that phone, to verify that the account is valid so that outgoing calls can be made, and to provide
the foundation for proper billing of calls. This autonomous registration occurs whenever the
phone is on, regardless of whether a call is actually in progress.

3
CHAPTER-3:
CELL PHONE CLONING:

Cell phone cloning is copying the identity of one mobile telephone to another mobile telephone.

Usually this is done for the purpose of making fraudulent telephone calls. The bills for
thecalls go to the legitimate subscriber. The cloner is also able to make effectively anonymous
calls, which attracts another group of interested users.

Cloning is the process of taking the programmed information that is stored in a legitimate
mobile phone and illegally programming the identical information into another mobile phone.
The result is that the "cloned" phone can make and receive calls and the charges for those calls
are billed to the legitimate subscriber. The service provider network does not have a way to
differentiate between the legitimate phone and the "cloned" phone.

Cloning of mobile phones is the act of copying the subscriber information from one phone onto
the other for purposes of obtaining free calls. The other cell phone becomes the exact replica of
the original cell phone like a clone. As a result, while calls can be made from both phones, only
the original is billed.

Cloning occurs most frequently in areas of high cell phone usage -- valet parking lots,
airports, shopping malls, concert halls, sports stadiums, and high-congestion traffic areas in
metropolitan cities.

4
FIGURE 3.1CELLULAR PHONE CLONING

5
CHAPTER-4:

STARTING OF CELL PHONE CLONING:


The early 1990s were boom times for eavesdroppers. Any curious teenager with a £100
Tandy Scanner could listen in to nearly any analogue mobile phone call. As a result, Cabinet
Ministers, company chiefs and celebrities routinely found their most intimate conversations
published in the next day's tabloids

Cell phone cloning started with Motorola "bag" phones and reached its peak in the mid
90's with a commonly available modification for the Motorola "brick" phones, such as the
Classic, the Ultra Classic, and the Model 8000.

GSM – Global System for Mobile Communications. A digital cellular phone technology based
on TDMA GSM phones use a Subscriber Identity Module (SIM) card that contains user account
information. Any GSM phone becomes immediately programmed after plugging in the SIM
card, thus allowing GSM phones to be easily rented or borrowed.Operators who provide GSM
service are Airtel,Hutch etc.

6
CDMA - Code Division Multiple Access. A method for transmitting simultaneous signals over
a shared portion of the spectrum. There is no Subscriber Identity Module (SIM) card unlike in
GSM.Operators who provides CDMA service in India are Reliance and Tata Indicom.

Both GSM and CDMA handsets are prone to cloning. Technically, it is easier to clone a CDMA
handset over a GSM one, though cloning a GSM cell phone is not impossible. There are also
Internet sites that provide information on how one could go about hacking into cell-phones.

Cloning CDMA Cell Phones - Cellular telephone thieves monitor the radio frequency
spectrum and steal the cell phone pair as it is being anonymously registered with a cell site. The
technology uses spread-spectrum techniques to share bands with multiple conversations.
Subscriber information is also encrypted and transmitted digitally. CDMA handsets are
particularly vulnerable to cloning, according to experts. First generation mobile cellular networks
allowed fraudsters to pull subscription data (such as ESN and MIN) from the analog air interface
and use this data to clone phones. A device called as DDi, Digital Data Interface (which comes
in various formats from the more expensive stand-alone box, to a device which interfaces with
your 800 MHz capable scanner and a PC) can be used to get pairs by simply making the device
mobile and sitting in a busy traffic area (freeway overpass) and collect all the data you need. The
stolen ESN and EMIN were then fed into a new CDMA handset, whose existing program was
erased with the help of downloaded software. The buyer then programs them into new phones
which will have the same number as that of the original subscriber.

Cloning GSM Phones - GSM handsets, on the contrary, are safer, according to experts. Every
GSM phone has a 15 digit electronic serial number (referred to as the IMEI). It is not a particularly
secret bit of information and you don't need to take any care to keep it private. The important
information is the IMSI, which is stored on the removable SIM card that carries all your subscriber
information, roaming database and so on. GSM employs a fairlysophisticated asymmetric-key
cryptosystem for over-the-air transmission of subscriber information. Cloning a SIM using
information captured over-the-air is therefore difficult, though not impossible. As long as you don't
lose your SIM card, you're safe with GSM. GSM carriers use the COMP128 authentication
algorithm for the SIM, authentication center and network which make GSM a far secure
technology.GSM networks which are considered to be impregnable can also be hacked. The process
is simple: a SIM card is inserted into a reader. After connecting it to the computer using data cables,
the card details were transferred into the PC. Then, using freely available encryption software on
the Net, the card details can be encrypted on to a blank smart card. The result: A cloned cell phone
is ready for misuse.

4.1 SECURITY OF FIXED CELL PHONE NETWORK

The answer is yes. In spite of this, the security functions which prevent eavesdropping and
unauthorized user are emphasized by the mobile phone companies. The existing mobile

7
communication networks are not safer than the fixed Telephone networks. They only offer
protection against the new forms of abuse.

4.2 SECURITY FUNCTIONS OF THE GSM AND CDMA


As background to a better understanding of the attacks on the GSM and CDMA network the
following gives a brief introduction to the Security functions available in GSM. The following
functions exist: Access control by means of a personal smart card (called subscriber Identity
module, SIM) and PIN (personal identification number), Authentication of the users towards the
network carrier and generation of a session key in order to prevent abuse. Encryption of
communication on the radio interface, i.e. between mobile Station and base station, concealing the
users’ identity on the radio interface, i.e. a temporary valid Identity code (TMSI) is used for the
identification of a mobile user instead Of the IMSI.

8
CHAPTER – 5:

PROCEDURE OF PHONE CLONING


Cloning involved modifying or replacing the EPROM in the phone with a new chip which
would allow you to configure an ESN (Electronic serial number) via software. You would also
have to change the MIN (Mobile Identification Number). When you had successfully changed
the ESN/MIN pair, your phone was an effective clone of the other phone. Cloning required
access to ESN and MIN pairs. ESN/MIN pairs were discovered in several ways:

1. Sniffing the cellular


2. Trashing cellular companies or cellular resellers
3. Hacking cellular companies or cellular resellers

Cloning still works under the AMPS/NAMPS system, but has fallen in popularity as older
clone able phones are more difficult to find and newer phones have not been successfully
reverse- engineered.

Cloning has been successfully demonstrated under GSM, but the process is not easy and
it currently remains in the realm of serious hobbyists and researchers.

When placing a call, the phone transmits both the ESN and the MIN to the network. These
were, however, sent in the clear, so anyone with a suitable scanner could receive them. The
eavesdropped codes would then be programmed into another phone, effectively cloning the original
subscription. Any calls made on this cloned phone would be charged on the original customer. See
figure2.

Cellular thieves can capture ESN/MINs using devices such as cell phone ESN reader or
digital data interpreters (DDI). DDIs are devices specially manufactured to intercept
ESN/MINs. By simply sitting near busy roads where the volume of cellular traffic is high,
cellular thieves monitoring the radio wave transmissions from the cell phones of legitimate
subscribers can capture ESN/MIN pair. Numbers can be recorded by hand, one-by-one, or
stored in the box and later downloaded to a computer. ESN/MIN readers can also be used
from inside an offender’s home, office, or hotel room, increasing the difficulty of detection.

FIGURE 5.0 SUBSCRIBER IDENTIFICATION MODULE


9
5.1 PATAGONIA
Patagonia is software available in the market which is used to clone CDMA phone. Using this
software a cloner can take over the control of a CDMA phone i.e. cloning of phone. There are other
Software’s available in the market to clone GSM phone. This software’s are easily available in the
market. A SIM can be cloned again and again and they can be used at different places. Messages
and calls sent by cloned phones can be tracked. However, if the accused manages to also clone the
IMEI number of the handset, for which software’s are available, there is no way he can be traced.

FIGURE 5.1.1 ELECTRONIC SERIAL NUMBER

Do GSM sets run the risk of ‘cloning’?

Looking at the recent case, it is quite possible to clone both GSM and CDMA sets. The
accused in the Delhi case used software called Patagonia to clone only CDMA phones
(Reliance and Tata Indicom). However, there are software packages that can be used to clone
even GSM phones (e.g. Airtel, BSNL, Hutch, Idea). In order to clone a GSM phone,
knowledge of the International Mobile Equipment Identity (IMEI) or instrument number is
sufficient.

10
Figure 5.2 Cellular cloning.

11
CHAPTER 6:

IMPACT OF CLONING:

Each year, the mobile phone industry loses millions of dollars in revenue because of the
criminal actions of persons who are able to reconfigure mobile phones so that their calls are
billed to other phones owned by innocent third persons. Often these cloned phones are used
to place hundreds of calls, often long distance, even to foreign countries, resulting in thousands
of dollars in airtime and long distance charges. Cellular telephone companies do not require
their customers to pay for any charges illegally made to their account, no matterhow great the
cost. But some portion of the cost of these illegal telephone calls is passed along to cellular
telephone consumers as a whole.

Many criminals use cloned cellular telephones for illegal activities, because their calls
are not billed to them, and are therefore much more difficult to trace. His phenomenon is
especially prevalent in drug crimes. Drug dealers need to be in constant contact with their
sources of supply and their confederates on the streets. Traffickers acquire cloned phones at
a minimum cost, make dozens of calls, and then throw the phone away after as little as a days'
use. In the same way, criminals who pose a threat to our national security, such as terrorists,
have been known to use cloned phones to thwart law enforcement efforts aimed at tracking
their whereabouts.

12
CHAPTER -7:

METHODS TO DETECT CLONED PHONES ON NETWORK:


Several countermeasures were taken with varying success. Here are various methods to detect
cloned phones on the network:

Duplicate detection - The network sees the same phone in several places at the same time.
Reactions include shutting them all off so that the real customer will contact the operator
because he lost the service he is paying for, or tearing down connections so that the clone users
will switch to another clone but the real user will contact the operator.

Velocity trap - The mobile phone seems to be moving at impossible, or most unlikely
speeds. For example, if a call is first made in Helsinki, and five minutes later, another call is
made but this time in Tampere, there must be two phones with the same identity on the
network.

RF (Radio Frequency) - fingerprinting is originally a military technology. Even


nominally identical radio equipment has a distinguishing ``fingerprint'', so the network
software stores and compares fingerprints for all the phones that it sees. This way, it will spot
the clones with the same identity but different fingerprints.

Usage profiling. - Profiles of customers' phone usage are kept, and when discrepancies are
noticed, the customer is contacted. Credit card companies use the same method. For example,
if a customer normally makes only local network calls but is suddenly placing calls to foreign
countries for hours of airtime, it indicates a possible clone.

Call counting - Both the phone and the network keep track of calls made with the phone,
and should they differ more than the usually allowed one call, service is denied.

PIN codes - Prior to placing a call, the caller unlocks the phone by entering a PIN code and
then calls as usual. After the call has been completed, the user locks the phone by entering the
PIN code again. Operators may share PIN information to enable safer roaming.

13
Figure 7.1 Duplicate Detection

14
CHAPTER -8:

PHONE AND ITS SECURITY:

Too many users treat their mobile phones as gadgets rather than as business assets covered by corporate
security policy. Did you realize there's a lucrative black market in stolen and "cloned" Sim cards? This is possible
because Sims are not network specific and, though tamper-proof, their security is flawed. In fact, a Sim can be
cloned many times and the resulting cards used in numerous phones, each feeding illegally off the same bill.

But there are locking mechanisms on the cellular phones that require a PIN to access the
phone. This would dissuade some attackers, foil others, but might not work against a well
financed and equipped attacker. An 8-digit PIN requires approximately 50,000,000 guesses, but
there may be ways for sophisticated attackers to bypass it.

With the shift to GSM digital - which now covers almost the entire UK mobile sector - the
phone companies assure us that the bad old days are over. Mobile phones, they say, are secure
and privacy friendly.

This is not entirely true. While the amateur scanner menace has been largely exterminated,
there is now more potential than ever before for privacy invasion.

The alleged security of GSM relies on the myth that encryption - the mathematical scrambling of
our conversations - makes it impossible for anyone to intercept and understand our words. And
while this claim looks good on paper, it does not stand up to scrutiny.

The reality is that the encryption has deliberately been made insecure. Many encrypted calls can
therefore be intercepted and decrypted with a laptop computer.

15
CHAPTER -9:

DETECTION OF MOBILE CLONING:


• Frequent wrong number phone calls to your phone, or hang-ups.

• Difficulty in placing outgoing calls.

• Difficulty in retrieving voice mail messages.

• Incoming calls constantly receiving busy signals or wrong numbers. Unusualcalls


appearing on your phone bills.

16
CHAPTER -10:

ROLE OF SERVICE PROVIDER TO COMBAT CLONING FRAUD:

They are using many methods such as RF Fingerprinting, subscriber behavior profiling, and
Authentication. RF Fingerprinting is a method to uniquely identify mobile phones based on certain
unique radio frequency transmission characteristics that are essentially "fingerprints" of the radio
being used. Subscriber behavior profiling is used to predict possible fraudulent use of mobile
service based on the types of calls previously made by the subscriber.

Calls that are not typical of the subscriber's past usage are flagged as potentially fraudulent and
appropriate actions can be taken.

Authentication has advantages over these technologies in that it is the only industry standardized
procedure that is transparent to the user, a technology that can effectively combat roamer fraud,
and is a prevention system as opposed to a detection system.

17
CHAPTER -11:

PREVENTION OF MOBILE CLONING:

Uniquely identifies a mobile unit within a wireless carrier's network. The MIN often can be
dialed from other wireless or wire line networks. The number differs from the electronic serial
number (ESN), which is the unit number assigned by a phone manufacturer. MINs and ESNs can
be checked electronically to help prevent fraud.

.Mobiles should never be trusted for communicating/storing confidential information.

Always set a Pin that's required before the phone can be used.

Check that all mobile devices are covered by a corporate security policy.

Ensure one person is responsible for keeping tabs on who has what equipment and that they update
the central register. How do service providers handle reports of cloned phones?

Legitimate subscribers who have their phones cloned will receive bills with charges for calls they
didn't make. Sometimes these charges amount to several thousands of dollars in addition to the
legitimate charges.

Typically, the service provider will assume the cost of those additional fraudulent calls.

However, to keep the cloned phone from continuing to receive service, the service provider will
terminate the legitimate phone subscription. The subscriber is then required to activate a new
subscription with a different phone number requiring reprogramming of the phone, along with the
additional headaches that go along with phone number changes.

18
11.1 Service providers have adopted certain measures to prevent cellular fraud.

These include:

Blacklisting of stolen phones is another mechanism to prevent unauthorized use.

User verification using Personal Identification Number (PIN) codes is onemethod


for customer protection against cellular phone fraud.

Encryption: Encryption is regarded as the effective way to prevent cellular fraud.

Traffic analysis detects cellular fraud by using artificial intelligence software to


detect suspicious calling patterns, such as a sudden increase in the length of calls or
a sudden increase in the number of international calls.

Blocking: Blocking is used by service providers to protect themselves from high risk
callers.

19
CHAPTER -12:

FACTS AND FIGURES:

• Southwestern Bell claims wireless fraud costs the industry $650 million each year in the
US. Some federal agents in the US have called phone cloning an especially `popular’ crime
because it is hard to trace. In one case, more than 1,500 telephone calls were placed in a
single day by cellular phone thieves using the number of a single unsuspecting owner.

• A Home Office report in 2002 revealed that in London around 3,000 mobile phones were
stolen in one month alone which were used for cell phone cloning.

• Authorities, in the case, estimated the loss at $3,000 to $4,000 for each number used in cell
phone cloning.

• According to a school of thought, the Telecom Regulatory Authority of India (TRAI)


should issue a directive, which holds the operators responsible for duplications of mobile
phones.

• Qualcomm, which develops CDMA technology globally, says each instance of mobile
hacking is different and therefore there is very little an operator can do to prevent hacking.
“It’s like a virus hitting the computer. The software which is used to hack into the network
is different, so operators can only keep upgrading their security firewall as and when the
hackers strike,” says a Qualcomm executive.

20
FIGURE 12.1 CLONING STATISTICS

21
CHAPTER-13:
FUTURE THREATS:

Resolving subscriber fraud can be a long and difficult process for the victim. It may take
time to discover that subscriber fraud has occurred and an even longer time to prove that you did
not incur the debts. As described in this article there are many ways to abuse telecommunication
system, and to prevent abuse from occurring it is absolutely necessary to check out the weakness
and vulnerability of existing telecom systems. If it is planned to invest in new telecom equipment,
a security plan should be made and the system tested before being implemented. It is therefore
mandatory to keep in mind that a technique which is described as safe today can be the most
unsecure technique in the future.

22
CHAPTER-14:
CONCLUSION :

Presently the cellular phone industry relies on common law (fraud and theft) and in-house
counter measures to address cellular phone fraud.

Is in initial stages in India so preventive steps should be taken by the network provider and the
Government the enactment of legislation to prosecute crimes related to cellular phones is not
viewed as a priority, however. It is essential that intended mobile crime legislation be
comprehensive enough to incorporate cellular phone fraud, in particular "cloning fraud" as a
specific crime.

Existing cellular systems have a number of potential weaknesses that were considered. It is crucial
that businesses and staff take mobile phone security seriously.

Awareness and a few sensible precautions as part of the overall enterprise security policy will deter
all but the most sophisticated criminal. It is also mandatory to keep in mind that a technique which
is described as safe today can be the most unsecured technique in the future. Therefore it is
absolutely important to check the function of a security system once a year and if necessary update
or replace it. Finally, cell-phones have to go a long way in security before they can be used in
critical applications like m-commerce.

23
CHAPTER-15:
REFERENCES

[1] H. Karl and A. Willig ,Protocols and Architectures for Wireless Sensor Networks, John Wiley
and Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, England,2005.
[2] D. Culler, D. Estrin, and M. Srivastava, “Overview of Sensor Networks”, IEEE Computer, August
2004.
[3] K. Martinez, J. K. Hart and R. Ong, “Environmental sensor networks”, IEEE Computer Journal,
Vol. 37 (8), 50-56, August 2004.
[4] Mainwaring, D. Culler , J. Polastre , R. Szewczyk and J. Anderson, “Wireless sensor networks for
habitat monitoring”, Proceedings of the 1st ACM International workshop on Wireless sensor
networks applications, Atlanta, Georgia, USA, 88-97,2002. [5] IEEE journal for mobile communication.
[6] Mobile cloning mobiledia.com.
[7] “Underwater acoustic sensor networks: researchchallenges”, Ad Hoc Networks, Vol.
3(3), 257-279,May 2005.
[8] Y. Ma , M. Richards, M. Ghanem, Y. Guo and J.Hassards, “Air Pollution Monitoring and
Mining Basedon Sensor Grid in London”, Sensors 2008, Vol. 8(6),3601-3623.

24

Potrebbero piacerti anche