Visible to the public Secure Protocol for Subscriber Identity Module

TitleSecure Protocol for Subscriber Identity Module
Publication TypeConference Paper
Year of Publication2017
AuthorsPradhan, A., Marimuthu, K., Niranchana, R., Vijayakumar, P.
Conference Name2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)
ISBN Number978-1-5090-4799-4
Keywordsauthentication, authorisation, banking information, Carrier, composability, current SIM model, data privacy, ECC, Elliptic curve cryptography, HLR, IMSI, Internet, message authentication, Metrics, Mobile communication, Mobile handsets, modern mobile communication, Poles and towers, Protocols, pubcrawl, ransomware, resilience, Resiliency, secure protocol, service provider, short messaging service, SIM, Social Engineering, stolen SIM, subscriber Identity Module, user contacts, user credentials, user sensitive information, VLR
Abstract

Subscriber Identity Module (SIM) is the backbone of modern mobile communication. SIM can be used to store a number of user sensitive information such as user contacts, SMS, banking information (some banking applications store user credentials on the SIM) etc. Unfortunately, the current SIM model has a major weakness. When the mobile device is lost, an adversary can simply steal a user's SIM and use it. He/she can then extract the user's sensitive information stored on the SIM. Moreover, The adversary can then pose as the user and communicate with the contacts stored on the SIM. This opens up the avenue to a large number of social engineering techniques. Additionally, if the user has provided his/her number as a recovery option for some accounts, the adversary can get access to them. The current methodology to deal with a stolen SIM is to contact your particular service provider and report a theft. The service provider then blocks the services on your SIM, but the adversary still has access to the data which is stored on the SIM. Therefore, a secure scheme is required to ensure that only legal users are able to access and utilize their SIM.

URLhttp://ieeexplore.ieee.org/document/8057564/
DOI10.1109/ICRTCCM.2017.74
Citation Keypradhan_secure_2017