Abstract
Threats involve various risks and threats are
associated with the embedded SIM technology, for instance, the
Internet of things (IoT) identity. IoT refers to the working
capabilities enabling the allocation of unique identifiers (UID) to
effectively connect with the related devices thus enhancing
communication. An e-SIM application cannot produce reliable
and actual data used to obtain the subscriber’s anticipated
outcome. The SIM technology does not provide some reliable data
that can be employed by the user to formulate some serious
productive outcomes. Failure by the technology to process and
automatically provide the user with the notification suppose of
any infringement or hacking. SIM-jacking is the other notable
threats facing the embedded universal integrated connectivity
card (e-UICC). Incompetent Log Rhythm Al Engine influences
the fraudster hacking experience due to failure protections within
the operational surrounding. The e-SIM technology system lacks
timely threat, risk, and other various vital operations predictability
to react to the experienced unbearable operations challenges
induced by the fraudsters. Similarly, the embedded SIM incurs the
insider threats whereby the service providers fail to secure the
much-needed privacy concerning an individual’s vital
information. The situations of personal data leakage are
witnessed within the system operations.The e-SIM hijacking
enables the fraudsters to secretly obtain the victim’s vital data of
the subscriber, hijack, and receive the information intended to the
individual to his/her personal phone. The process results to
complete mobile account operations by the hacker resulting to
further access to the victim’s bank information and transfer of
cash. The other threat experienced by e-SIM users is the provision
of false information. The SIM subscribers normally fall into traps
of the fraudsters by receiving short messages (SMS) citing
assistance kind of news from the service providers, thus drawing
the victim’s bank amount. Identity fraud and device poisoning are
other additional threats encountered in the application of e-SIM.
Generally, the entire process of fraud invasion and victimization
influence the victim’s business decisions of the affected
individuals. Protections focuses on the embedded SIM provides
greater security in addition to a re-programmable technological
system, unlike the physical SIM card. The subscriber's personal
information is not contained within the e-SIM but with the service
providers, thus enhancing its effectiveness. An e-SIM enables the
consumers to effectively shift carriers between the T-Mobile and
Sprint without physical movement, thus supportive of security
systems. Despite the security measures put into place, e-SIM like
any other SIM card experiences information theft. Therefore, the
service providers should encounter the emerging fraudster effects
by proper monitoring of the network system to enable security
restrictions. The system should induce strict conditions that
enable the evaluation and differentiation between the IoT and the
non-IoT devices during their operation.
Publisher
Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Subject
Management of Technology and Innovation,General Engineering
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献