CFP last date
20 January 2025
Reseach Article

The Approaches to Prevent Cell Phone Cloning in CDMA Enviornment

by Aaruni Goel, Madhup Sharma, Paresh Pathak
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 45 - Number 21
Year of Publication: 2012
Authors: Aaruni Goel, Madhup Sharma, Paresh Pathak
10.5120/7073-9599

Aaruni Goel, Madhup Sharma, Paresh Pathak . The Approaches to Prevent Cell Phone Cloning in CDMA Enviornment. International Journal of Computer Applications. 45, 21 ( May 2012), 16-19. DOI=10.5120/7073-9599

@article{ 10.5120/7073-9599,
author = { Aaruni Goel, Madhup Sharma, Paresh Pathak },
title = { The Approaches to Prevent Cell Phone Cloning in CDMA Enviornment },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 45 },
number = { 21 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 16-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume45/number21/7073-9599/ },
doi = { 10.5120/7073-9599 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:38:11.022672+05:30
%A Aaruni Goel
%A Madhup Sharma
%A Paresh Pathak
%T The Approaches to Prevent Cell Phone Cloning in CDMA Enviornment
%J International Journal of Computer Applications
%@ 0975-8887
%V 45
%N 21
%P 16-19
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The rapid growth of mobile communication has changed the vision of cellular phones security. An easy accessibility condition causes cellular phones to be vulnerable against numerous and potentially devastating threats from hackers. Up to the moment, researchers have developed Intrusion Detection Systems (IDS) capable of detecting attacks in several available environments. Intrusion Prevention Systems (IPS) evolved after that to resolve ambiguities in passive network monitoring by placing detection systems on the line of attack. This paper presents an overview cellular phones security based upon CDMA technology specially on cell phone cloning.

References
  1. Krueger, C. (2011, February 11). Man found guilty of lesser charge in murder recorded on cell phone. St. Petersburg Times.
  2. Rehault, F. (2010). Windows mobile advanced forensics: An alternative to existing tools. Journal of Digital Investigation, 7(1–2).
  3. Mislan, R. , Casey, E. , & Kessler, G. (2010). The growing need for on-scene triage of mobile devices. Journal of Digital Investigation, 6.
  4. Murphy, C. (2009). The fraternal clone method for CDMA cell phones. Small Scale Digital DeviceForensicsJournal, 3(1). Available from http://www. ssddfj. org/papers/SSDDFJ_V3_1_Murphy. pdf.
  5. Moore, H. D. (2007, September 25). A root shell in my pocket (and maybe yours). Available from http://blog. metasploit. com/2007/09/root-shell-in-my-pocket-and-maybe-yours. html.
  6. Rick Ayers, Wayne Jansen, Ludovic Moenner, Aurelien Delaitre, Cell Phone Forensic Tools: An Overview and Analysis Update, NIST Interagency Report (IR) 7387, March 2007, http://csrc. nist. gov/publications/nistir/nistir-7387. pdf
  7. Ken Hutchiunson, Wireless Intrusion Detection Systems, SANS Institute, October 2004
  8. . Bruce Potter, Wireless Intrusion Detection, Network Security Volume 2004, Issue 4
  9. Chris Bennett, Challenges of Mobile Security, SearchCIO. com, TechTarget, December 17, 2003,
  10. Fluhrer, Mantin and Shamir, Weaknesses in the Key Scheduling Algorithm of RC-4, 2001
  11. Spread spectrum access methods for wireless communications. R. Kohno, R. Meidan, and L. Milstein, IEEE Communication Magazine, Jan. 1995.
  12. On the capacity of a cellular CDMA system. K. Gilhousen, I. Jacobs, R. Padovani, A. viterbi, L. Weaver, and C. Wheatley, IEEE Trans. on Vehicular Technology, May 1991. http://searchcio. techtarget. com/tip/0,289483,sid182_gci952382,00. html .
  13. IEEE 802. 11 Standards Website, http://ieee802. org/11/
Index Terms

Computer Science
Information Sciences

Keywords

Spread Spectrum Soft Handoff Multipath Cave (cellular Authentication And Voice Encryption) A-key