Advancements in Mobile Security: A Comprehensive Study of SIM Card Swapping and Cloning - Trends, Challenges and Innovative Solutions

Murugalakshmi S.*, Doreen Hepzibah Miriam D.**, C. R. Rene Robin***
* Shrimathi Devkunvar Nanalal Bhatt Vaishnav College for Women, Chennai, India.
** Computational Intelligence Research Foundation (CIRF), Chennai, India.
*** Sri Sairam Engineering College, Chennai, India.
Periodicity:January - June'2023
DOI : https://doi.org/10.26634/jmt.10.1.20103

Abstract

SIM card cloning is a cyber-attack that is increasing dramatically in number. The Subscriber Identity Module (SIM) holds the crucial user data required to establish a connection between several telecom companies. Concerns about user security and privacy are growing as the usage of smartphones and the Internet has increased worldwide in the technology industry. Therefore, it is imperative for all users to understand cybercrime and security. This study analyzed the emerging trends and challenges associated with these threats, highlighting real-world risks and repercussions through case studies. As mobile devices continue to play an integral role in our lives, they have become lucrative targets for cybercriminals seeking unauthorized access to personal and corporate data. Cybercrime that uses telecom technology to steal information and exploit victims, known as phishing is discussed. Innovative security solutions and best practices that aim to counteract SIM card vulnerabilities, protect user identities, and safeguard sensitive information are also discussed. By examining legal frameworks, preventive measures, and technological advancements, this study serves as a valuable resource for security professionals, policymakers, and individuals seeking to fortify mobile security defenses.

Keywords

Subscriber Identity Module (SIM), Technology, Banking Sector, Cybercrime, Telecom, Phishing.

How to Cite this Article?

Murugalakshmi, S., Miriam, D. D. H., and Robin, C. R. R. (2023). Advancements in Mobile Security: A Comprehensive Study of SIM Card Swapping and Cloning - Trends, Challenges and Innovative Solutions. i-manager’s Journal on Mobile Applications & Technologies, 10(1), 23-29. https://doi.org/10.26634/jmt.10.1.20103

References

[3]. Brenner, S. W. (2012). Bits, Bytes, and Bicycles: Theft and Cyber Theft. New England Law Review., 47, 817.
[4]. Ekeh, G. E., Afolabi, Y. I., Uche-Nwachi, E. O., Ekeh, L. K., & Eze-Udu, E. (2022). Awareness of BVN, SIM swap and clone frauds: Methods and controls. Science World Journal, 17(2), 200-206.
[5]. Ekeh, G. E., Afolabi, Y. I., Uche-Nwachi, E. O., Ekeh, L. K., & Eze-Udu, E. (2022). Awareness of BVN, SIM swap and clone frauds: Methods and controls. Science World Journal, 17(2), 200-206.
[9]. McGuire, M., & Dowling, S. (2013). Cyber crime: A review of the evidence. Summary of key findings and implications. Home Office Research Report, 75, 1-35.
[10]. Miriam, H., Doreen, D., Dahiya, D., & Rene Robin, C. R. (2023). Secured Cyber Security Algorithm for Healthcare System Using Blockchain Technology. Intelligent Automation & Soft Computing, 35(2).
[14]. Reddy, B. S., Shresta, S., Sathhvika, S., & Shreya, P. L. M. (2023). Detection of Electricity Theft Cyber-Attacks in Renewable Distributed Generation for Future IoT-based Smart Electric Meters. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 14(2), 64-77.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.