Open Access Open Access  Restricted Access Subscription or Fee Access

Mobile Phone Cloning and Computing

M. Monisha, S. Sivachandiran

Abstract


Mobile communication has been eagerly available for several years, and is main business today. It provides a valuable service to its users who are willing to pay a sizable premium over a fixed line phone, to be able to march and talk freely. Because of its usefulness and the cash involved in the professional, it is subject to fraud. Unfortunately, the advance of security standards has not kept miss with the dissemination of mobile communication.

Some of the features of mobile communication make it an pleasing target for felons. It is a reasonably new invention, so not all persons are fairly aware with its chances, in good or in bad. Its newness also means intense fight among mobile phone service providers as they are drawing consumers. The major hazard to mobile phone is from cloning. Cell phone cloning is a method wherein hideaway data from one cell phone is transferred into added phone. The other cell phone becomes the exact replica of the creative cell phone like a clone. As a outcome, while calls can be made from together phones, only the unusual is billed. Though message channels are armed with security algorithms, yet cloners get away with the help of circle pigpens in systems. So when one gets colossal fliers, the chances are that the phone is being cloned.

 This paper terms about the cell phone cloning with execution in GSM   and CDMA knowledge phones. It gives an dream into the security mechanism in CDMA and GSM phones along with the hoop holes in the systems and discusses on the dissimilar ways of avoiding this cloning. Moreover, the upcoming risk of this fraud is being enlarged.


Keywords


CDMA, Cloning, GSM, Phone

Full Text:

PDF

References


H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4.

B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.

E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be published.

Crucial Cloud Hosting, (2014). Cloud Computing in Education: Introducing Classroom Innovation. Whitepaper by http://www.crucial.com.au.2-7.

Ahmad, N. and Habib, K. (2010).Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution.Blekinge Institute of Technology. 41-50

Entrust (2007). Understanding Digital Certificates & Secure Sockets Layer: A Fundamental Requirement for Internet Transactions. „Author‟.4.

Ellen Messmer (2012). Gartner: Growth in Cloud Computing to shape 2013 security trends, Network World [Online]. Available: http://www.networkworld.com/news/2012/120612-gartner-cloud-security-264873.html

SachdevAbhaThakral,and MohitBhansali."Addressing the Cloud Computing Security Menace." IJRET, Volume 2, Issue 2, pp. 126-130, Feb 2013.

Chen, Yao, and RaduSion. "On securing untrusted clouds with cryptography. “Proceedings of the 9th annualACM workshop on Privacy in the electronic society.ACM, 2010.

Ellen Messmer (2012). Gartner: Growth in Cloud Computing to shape 2013 security trends, Network World [Online]. Available: http://www.networkworld.com/news/2012/120612-gartner-cloud-security-264873.html

SachdevAbhaThakral,and MohitBhansali."Addressing the Cloud Computing Security Menace." IJRET, Volume 2, Issue 2, pp. 126-130, Feb 2013.

Chen, Yao, and RaduSion. "On securing untrusted clouds with cryptography. “Proceedings of the 9th annualACM workshop on Privacy in the electronic society.ACM, 2010.

G. R. Faulhaber, “Design of service systems with priority reservation,” in Conf. Rec. 1995 IEEE Int. Conf. Communications, pp. 3–8.

W. D. Doyle, “Magnetization reversal in films with biaxial anisotropy,” in 1987 Proc. INTERMAG Conf., pp. 2.2-1–2.2-6.

G. W. Juette and L. E. Zeffanella, “Radio noise currents n short sections on bundle conductors (Presented Conference Paper style),” presented at the IEEE Summer power Meeting, Dallas, TX, June 22–27, 1990, Paper 90 SM 690-0 PWRS.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.