Security management against cloned cellular telephones
- 25 August 2005
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
The present work describes a security management system against the frauds related with the cloning of cellular telephones. The system intends to make this fraud a nonlucrative business, and then, to finish it. The system uses three main techniques: (1) the ISO 8807 technique (FDT LOTOS) is used to specify and validate the system through Eucalyptus software employment; (2) a pattern recognition technique is used to classify the telephone users into classes in order to identify if a call does not correspond to the patterns of a specific user through the MatLab software employment; and (3) the CORBA technique is used for the implementation of this distributed system (i.e., manager and agents), using VisiBroker software.Keywords
This publication has 2 references indexed in Scilit:
- Safety and security of programmable network infrastructuresIEEE Communications Magazine, 1998
- Network security: it's time to take it seriouslyComputer, 1998