General requirements and security architecture for mobile phone anti-cloning measures

@article{Gepko2015GeneralRA,
  title={General requirements and security architecture for mobile phone anti-cloning measures},
  author={I. Gepko},
  journal={IEEE EUROCON 2015 - International Conference on Computer as a Tool (EUROCON)},
  year={2015},
  pages={1-6}
}
  • I. Gepko
  • Published 2015
  • Computer Science
  • IEEE EUROCON 2015 - International Conference on Computer as a Tool (EUROCON)
  • The impressive number of counterfeit and stolen mobile phones as well as the emergence of applications where the authentication of mobile terminal is needed shows the critical importance of reliable protection of the mobile device identity. [...] Key Method We introduced “provable experience” authentication factor of mobile device which is dual with respect to the “social network” authentication factor of user. A novel method of multi-factor authentication of mobile device is proposed based on this, which…Expand Abstract
    5 Citations
    A New Design Approach for Mobile Devices Security against IMEI Tampering and Cloning
    • PDF
    Mobile phone multi-factor authentication with robustness of clone detection
    • S. Zhuk, I. Gepko
    • Computer Science
    • 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET)
    • 2016
    • 2
    Policy Framework and Recommendations to Minimize the Usage of Stolen and Counterfeit or Substandard Mobile Communication Devices
    IoT Technologies for Augmented Human: a Survey
    • 2
    • PDF

    References

    SHOWING 1-9 OF 9 REFERENCES
    Partitioning attacks: or how to rapidly clone some GSM cards
    • 108
    • PDF
    A Method of Risk Assessment for Multi-Factor Authentication
    • 46
    • PDF
    Multi-factor authentication mechanisms using a mobile device
    • Multi-factor authentication mechanisms using a mobile device
    • 2014
    Security Principles Related to Handset Theft 3 Available: http://www.gsma.com/publicpolicy/security-principles- related-to-handset-theft
    • Security Principles Related to Handset Theft 3 Available: http://www.gsma.com/publicpolicy/security-principles- related-to-handset-theft
    • 2005
    3GPP terminal identity security: levels, requirements and mechanisms
    • 3GPP TSG SA WG3 Meeting #9: Doc. S3-99510
    • 1999
    2015-03) Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Numbering, addressing and identification
    • 2015-03) Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Numbering, addressing and identification