By Topic

A fraud detection method using IS-41C protocols and its application to the third generation wireless systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Park, D.G. ; Wireless Commun. Res. Lab., Korea Telecom, Seoul, South Korea ; Oh, M.N. ; Looi, M.

Wireless fraud, in particular that caused by cloning, has become a global problem in public wireless mobile communications services. To overcome this problem, many kinds of detection technologies such as profiling, RF fingerprinting, PIN, and call history counter have been proposed. However, these still do not provide a high degree of fraud detection. The proposed detection mechanism in this paper is based on a challenge-response protocol, and can detect the occurrence of mobile cloning with a high degree of confidence while requiring minimal system resources

Published in:

Global Telecommunications Conference, 1998. GLOBECOM 1998. The Bridge to Global Integration. IEEE  (Volume:4 )

Date of Conference:

1998