Mathew, Alex R. (2022) Threats and Protection on E-sim: A Prospective Study. In: Novel Perspectives of Engineering Research Vol. 8. B P International, pp. 76-81. ISBN 978-93-5547-391-2
Full text not available from this repository.Abstract
Threats include a variety of risks, and threats are associated with embedded SIM technology, such as Internet of things (IoT) identity. IoT refers to the working capabilities that enable the allocation of unique identifiers (UID) in order to effectively connect with the related devices, thereby improving communication. An e-SIM application cannot generate reliable and accurate data that can be used to predict the subscriber's outcome. SIM technology does not provide any reliable data that the user can use to formulate some serious productive outcomes.Failure of the technology to process and automatically notify the user implies that there has been an infringement or hacking. Another significant threat to the embedded universal integrated connectivity card(e-UICC) is SIM-jacking. Due to failure protections within the operational environment, incompetent Log Rhythm Al Engine influences the fraudster hacking experience. The e-SIM technology system lacks timely threat, risk, and other vital operations predictability to respond to the fraudsters' experienced unbearable operations challenges. Similarly, the embedded SIM exposes service providers to insider threats by failing to ensure the much-needed privacy of an individual's vital information. Situations of personal data leakage have been observed during system operations.The e-SIM hijacking enables the fraudsters to secretly obtain the victim’s vital data of the subscriber, hijack, and receive the information intended to the individual to his/her personal phone. The process results to complete mobile account operations by the hacker resulting to further access to the victim’s bank information and transfer of cash. The other threat experienced by e-SIM users is the provision of false information. SIM subscribers are commonly duped into falling into the traps of fraudsters by receiving short messages (SMS) claiming assistance from service providers, thereby draining the victim's bank account. Other risks associated with the use of e-SIM include identity fraud and device poisoning. In general, the entire process of fraud invasion and victimisation influences the affected individuals' business decisions.
Protection focuses on the embedded SIM, which provides greater security as well as a reprogrammable technological system, as opposed to the physical SIM card. The subscriber's personal information is not stored in the e-SIM, but rather with the service providers, which increases its effectiveness. An e-SIM allows consumers to switch carriers between T-Mobile and Sprint without physically moving, which is beneficial to security systems. Despite the security measures put into place, e-SIM like any other SIM card experiences information theft. As a result, service providers should prepare for emerging fraudster effects by properly monitoring the network system and enabling security restrictions. During operation, the system should impose strict conditions that allow for the evaluation and differentiation of IoT and non-IoT devices.
Item Type: | Book Section |
---|---|
Subjects: | STM Open Academic > Engineering |
Depositing User: | Unnamed user with email admin@eprint.stmopenacademic.com |
Date Deposited: | 12 Oct 2023 06:10 |
Last Modified: | 12 Oct 2023 06:10 |
URI: | http://publish.sub7journal.com/id/eprint/1270 |