Threats and Protection on E-Sim

Author:

Abstract

Threats involve various risks and threats are associated with the embedded SIM technology, for instance, the Internet of things (IoT) identity. IoT refers to the working capabilities enabling the allocation of unique identifiers (UID) to effectively connect with the related devices thus enhancing communication. An e-SIM application cannot produce reliable and actual data used to obtain the subscriber’s anticipated outcome. The SIM technology does not provide some reliable data that can be employed by the user to formulate some serious productive outcomes. Failure by the technology to process and automatically provide the user with the notification suppose of any infringement or hacking. SIM-jacking is the other notable threats facing the embedded universal integrated connectivity card (e-UICC). Incompetent Log Rhythm Al Engine influences the fraudster hacking experience due to failure protections within the operational surrounding. The e-SIM technology system lacks timely threat, risk, and other various vital operations predictability to react to the experienced unbearable operations challenges induced by the fraudsters. Similarly, the embedded SIM incurs the insider threats whereby the service providers fail to secure the much-needed privacy concerning an individual’s vital information. The situations of personal data leakage are witnessed within the system operations.The e-SIM hijacking enables the fraudsters to secretly obtain the victim’s vital data of the subscriber, hijack, and receive the information intended to the individual to his/her personal phone. The process results to complete mobile account operations by the hacker resulting to further access to the victim’s bank information and transfer of cash. The other threat experienced by e-SIM users is the provision of false information. The SIM subscribers normally fall into traps of the fraudsters by receiving short messages (SMS) citing assistance kind of news from the service providers, thus drawing the victim’s bank amount. Identity fraud and device poisoning are other additional threats encountered in the application of e-SIM. Generally, the entire process of fraud invasion and victimization influence the victim’s business decisions of the affected individuals. Protections focuses on the embedded SIM provides greater security in addition to a re-programmable technological system, unlike the physical SIM card. The subscriber's personal information is not contained within the e-SIM but with the service providers, thus enhancing its effectiveness. An e-SIM enables the consumers to effectively shift carriers between the T-Mobile and Sprint without physical movement, thus supportive of security systems. Despite the security measures put into place, e-SIM like any other SIM card experiences information theft. Therefore, the service providers should encounter the emerging fraudster effects by proper monitoring of the network system to enable security restrictions. The system should induce strict conditions that enable the evaluation and differentiation between the IoT and the non-IoT devices during their operation.

Publisher

Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP

Subject

Management of Technology and Innovation,General Engineering

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3