Publicité

MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT

13 Dec 2015
Publicité

Contenu connexe

Publicité
Publicité

MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT

  1. APPROACHES TO PREVENT CELL PHONE CLONING IN CDMA ENVIRONMENT ANISHA JOHNY S7 CS A RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY,KAKKANAD 12/13/2015 1
  2. Introduction  The rapid growth of mobile communication has changed the vision of cellular phones security.  An easy accessibility condition causes cellular phones to be vulnerable against numerous and potentially devastating threats from hackers.  In this seminar I presents an overview of cellular phones security based upon CDMA technology specially on cell phone cloning. 12/13/2015 2
  3. CDMA ??? 12/13/2015 3
  4. CDMA Technology  CDMA- Code Division Multiple Access :uses spread spectrum technique.  Enables many wireless devices to transmit at the same time and on the same frequency.  2G and 3G mobile telecommunications standard.  Developed by Qualcomm. Service providers in India are Reliance Telecom and Tata Indicom  Utilized to send and receive voice transmission, data transmission and various other types signalling managements.  Working: unique precise identity 12/13/2015 4
  5. Advantages of CDMA Technology  Phone call clarity is better.  Call rates are low as in comparison with existing GSM technology.  Well matched with other cellular technologies  Helpful in national and international roaming.  Prevents interference and destruction of service caused due to multipath  Engages in Soft hand-off 12/13/2015 5
  6. Disadvantages of CDMA Technology  Security flaws:  Cell phone tracking and interception is easier.  A cell phone can be turned on without the knowledge of customer.  A cell phone can be cloned by anybody so that one pretend himself to be genuine.  Phones cannot be swapped 12/13/2015 6
  7. Cell phone working  When a call is done through cell phone four important components are transmitted:  Radio frequencies with the help of two separate channels one for voice and another for control signalling information.  Electronic Serial Number (ESN)  Mobile Identification Number(MIN)  Station Class mark(SCM) 12/13/2015 7
  8. Cell phone working(Cont..)  After receiving this ESN and MIN, cell service provider verifies them with their genuine subscriber list.  If this pair is genuine then a control signal is generated and permits the customer to make the call.  The successfully registering this way is known as Anonymous Registration. 12/13/2015 8
  9. Cell Phone Cloning ??? 12/13/2015 9
  10. Cell Phone Cloning  Cell phone cloning is copying the identity of one mobile phone to another mobile phone.  Process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone.  Thus, "cloned" phone can make and receive anonymous calls and the charges for those calls are billed to the legitimate subscriber.  The service provider network does not have a way to differentiate between the legitimate phone and the "cloned" phone. 12/13/2015 10
  11. Cloning methodology  Alteration of EPROM that help to configure ESN/MIN via software  By sniffing or hacking cell phone service provider, ESN/MIN data is retrieved by hackers during anonymous registration. These are used to make calls by cloner even while the actual user makes a call.  Number Assignment Module(NAM): It’s the EPROM which stores ESN and MIN. NAM characteristics is cloned during a call  Station Class Mark(SCM)  System IDentification for Home System(SIDH): Part of NAM module that can be changed to decide where the billing has to be forwarded.12/13/2015 11
  12. Preventive Measures  Operator knows if there is same ESN/MIN combinations are traced from different places. If so happens operator should switch off all phones having same pairs.  Frequent checking of monthly bills  Distance is another important factor to identify threats.  Radio Frequency Fingerprinting(RFF)  Cellular Authentication and Voice Encryption(CAVE) security protocols 12/13/2015 12
  13. Preventive Measures(Cont..)  Try to avoid cell phones in busy traffic areas because there is a chance of monitoring calls by hackers using a scanner , which registers the frequency in which mobile phones operate in its immediate surroundings.  User authentication using Personal Identification Number(PIN): secret numeric password between user and MSC.  Pattern recognition techniques: used to classify the cell phone according to their usage logs. Such logs contain the relevant characteristics for every call made by the user. From this, it is easier to identify if a call does not correspond to the patterns of a specific user .  Pattern Recognition techniques are used by the Mat Lab tool employment. 12/13/2015 13
  14. Preventive Measures(Cont..)  Advices for subscribers as a sign of caution includes:  Difficulty in placing outgoing calls  Difficulty in retrieving voice mail messages  Incoming calls constantly receiving busy signals or wrong numbers  Frequent wrong number phone calls  Unusual calls appearing on phone bills 12/13/2015 14
  15. Conclusion  Existing cellular systems have a number of potential weaknesses that need to be considered.  Awareness and a few sensible precautions will stop these criminal activities to an extent.  Keep in mind that technique which is safe today can be the most unsecured one in future  So it’s important to check function of a security system once a year and update it or replace it 12/13/2015 15
  16. References  International Journal of Computer Applications(0975-8887), Volume 45-No.21,May 2012  International Journal of advances in computing & communications, Volume 1, 2013  Murphy, C. (2009). The fraternal clone method for CDMA cell phones. Small Scale Digital DeviceForensicsJournal, 3(1). Available from http://www.ssddfj.org/papers/SSDDFJ_V3_1_Murphy.pdf.  Chris Bennett, Challenges of Mobile Security, SearchCIO.com, TechTarget, December 17, 2003  Spread spectrum access methods for wireless communications. R. Kohno, R. Meidan, and L. Milstein, IEEE Communication Magazine, Jan. 1995. 12/13/2015 16
  17. Thank You!!! 12/13/2015 17
  18. Questions??? 12/13/2015 18
Publicité