skip to main content
article
Free Access

Towards a fraud-prevention framework for software defined radio mobile devices

Authors Info & Claims
Published:01 August 2005Publication History
Skip Abstract Section

Abstract

The superior reconfigurability of software defined radio mobile devices has made it the most promising technology on the wireless network and in the communication industry. Despite several advantages, there are still a lot to discuss regarding security, for instance, the radio configuration data download, storage and installation, user's privacy, and cloning. The objective of this paper is to present a fraud-prevention framework for software defined radio mobile devices that enhances overall security through the use of new pieces of hardware, modules, and protocols. The framework offers security monitoring against malicious attacks and viruses, protects sensitive information, creates and protects an identity for the system, employs a secure protocol for radio configuration download, and finally, establishes an anticloning scheme, which besides guaranteeing that no units can be cloned over the air, also elevates the level of difficulty clone units if the attacker has physical access to the mobile device. Even if cloned units exist, the anticloning scheme is able to identify and deny services to those units. Preliminary experiments and proofs that analyze the correctness of the fraud-prevention framework are also presented.

References

  1. {1} B. Bing and N. Jayant, "A cellphone for all standards," IEEE Spectr., vol. 39, no. 5, pp. 34-39, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. {2} Software Defined Radio Forum website, http://www. sdrforum.org.Google ScholarGoogle Scholar
  3. {3} Java 2 Micro Edition Technology website, http://wireless. java.sun.com/j2me.Google ScholarGoogle Scholar
  4. {4} L. B. Michael, M. J. Mihaljevic, S. Haruyama, and R. Kohno, "A framework for secure download for software-defined radio," IEEE Commun. Mag., vol. 40, no. 7, pp. 88-96, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. {5} C. Castelluccia and F. Dupont, A Simple Privacy Extension for Mobile IPv6, The Internet Engineering Task Force, Internet Draft: Draft-Castellucia-MobileIP-Privacy, February 2001.Google ScholarGoogle Scholar
  6. {6} A. Escudero, "Location privacy in IPv6-tracking binding updates," in Proc. International Workshop on Interactive Distributed Multimedia Systems and Telecommunication (IDMS '01), Lancaster, UK, September 2001.Google ScholarGoogle Scholar
  7. {7} CMS 88 Cellular Mobile TelephoneSystem, EN/LZT 101908, Ericsson.Google ScholarGoogle Scholar
  8. {8} Global System for Mobile Communication, "The GSM security technical whitepaper for 2002," http://www. hackcanada.com/blackcrawl/.Google ScholarGoogle Scholar
  9. {9} UC Berkeley. Internet Security, Applications, Authentication and Cryptography Group, "GSM cloning," http://www.isaac.cs.berkeley.edu/isaac/gsm.html.Google ScholarGoogle Scholar
  10. {10} Overview of the Universal Mobile Telecommunication System. DRAFT, July 2002, http://www.umtsworld.com/ technology/overview.htm.Google ScholarGoogle Scholar
  11. {11} M. B. Frederick, "Cellular telephone fraud anit-fraud system," US Patent 5,448,760, September 1995.Google ScholarGoogle Scholar
  12. {12} M. S. M. Annoni Notare, F. A. da Silva Cruz, B. Goncalves Riso, and C. B. Westphall, "Wireless communications: security management against clonedcellular phones," in Proc. IEEE Wireless Communications and Networking Conference (WCNC '99), vol. 3, pp. 1412-1416 , New Orleans, La, USA, September 1999.Google ScholarGoogle Scholar
  13. {13} The Trusted Computing Group, http://www.trusted-computinggroup. org.Google ScholarGoogle Scholar
  14. {14} The TCG PC Specific Implementation Specification, http:// www.trustedcomputinggroup.org/downloads/.Google ScholarGoogle Scholar
  15. {15} The RC5 encryption algorithm, http://www.secinf.net/ cryptography/The_RC5_Encryption_Algorithm.html.Google ScholarGoogle Scholar
  16. {16} RSA encryption, http://mathworld.wolfram.com/RSA-Encryption. html.Google ScholarGoogle Scholar
  17. {17} Federal Communications Commission. Authorization and use of software defined radio: first report and order, September 2001, http://www.fcc.gov/Bureaus/Engineering Technology/Notices/2000/fcc00430.txt.Google ScholarGoogle Scholar
  18. {18} Intel, "Intel wireless trusted platform: security for mobile devices," http://www.intel.com/design/pca/application-sprocessors/whitepapers/300868.htm.Google ScholarGoogle Scholar
  19. {19} A. Brawerman, D. Blough, and B. Bing, "Securing the download of radio configuration files for software defined radio devices," in Proc. ACM International Workshop on Mobility Management and Wireless Access (MobiWac '04), pp. 98-105, Philadelphia, Pa, USA, September-October 2004. Google ScholarGoogle Scholar
  20. {20} US Secret Service Financial Crimes Division, http://www. secretservice.gov/financial_crimes.shtml#Telecommunications.Google ScholarGoogle Scholar
  21. {21} A. O. Freier, P. Karlton, and P. C. Kocher, The SSL protocol Version 3.0, http://home.netscape.com/eng/ssl3.Google ScholarGoogle Scholar

Index Terms

  1. Towards a fraud-prevention framework for software defined radio mobile devices

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader