Skip to main content

2015 | OriginalPaper | Buchkapitel

Nigeria: Cyber Space Security Vis a Vis Computerisation, Miniaturisation and Location-Based Authentication

verfasst von : Muhammad Adeka, Mohammad Ngala, Mohammad Bin-Melha, E. Ibrahim, Simon J. Shepherd, Issa T. E. Elfergani, Ash S. Hussaini, Fauzi Elmegri, Raed Abd-Alhameed

Erschienen in: Wireless Internet

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The degree of insecurity occasioned by fraudulent practices in Nigeria has been of great concern economically, especially as it relates to overseas transactions. This paper was designed to mitigate this problem for Nigeria and countries with similar dispositions. Based on a survey involving field trip to Nigeria, the paper examines the general security situation in Nigeria and its mutual impacts with computerisation, miniaturisation and Location-Based Authentication (LBA). It was discovered that both computerisation and miniaturisation had some negative effects on cyber-security, as these were being exploited by fraudsters, especially using ‘advance fee fraud;’ popularly called 419. As a countermeasure, the research examined the possibility of using LBA and further digitisation of the GSM Mobile country codes down to City/Area codes along with GSM Mobile/Global Positioning System (GPS) authentications. Where necessary, these could be combined with the use of a web-based Secret Sharing Scheme for services with very high security demands. The anticipated challenges were also examined and considered to be of negligible impacts; especially roaming.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Adeka, M.I.U., Shepherd, S.J Abd-Alhameed, R.A.: Cryptography and Computer Communications Security: Extending the Security Perimeter through a Web of Trus MPhil-PhD Transfer Report, School of Engineering and Informatics, University of Bradford, Bradford (UK), (Ongoing: 2011-) Adeka, M.I.U., Shepherd, S.J Abd-Alhameed, R.A.: Cryptography and Computer Communications Security: Extending the Security Perimeter through a Web of Trus MPhil-PhD Transfer Report, School of Engineering and Informatics, University of Bradford, Bradford (UK), (Ongoing: 2011-)
5.
Zurück zum Zitat Moore, G.E.: Cramming More Components onto Integrated Circuits, ed. McGraw-Hill, New York (1965) Moore, G.E.: Cramming More Components onto Integrated Circuits, ed. McGraw-Hill, New York (1965)
6.
Zurück zum Zitat Adeka, M., Shepherd, S., Abd-Alhameed, R.: Extending the security perimeter through a web of trust: the impact of GPS technology on location-based authentication techniques. In: Proceedings of the Fifth International Conference on Internet Technologies and Applications (ITA 2013), pp. 465–473 (2013) Adeka, M., Shepherd, S., Abd-Alhameed, R.: Extending the security perimeter through a web of trust: the impact of GPS technology on location-based authentication techniques. In: Proceedings of the Fifth International Conference on Internet Technologies and Applications (ITA 2013), pp. 465–473 (2013)
7.
Zurück zum Zitat Aslam, H.D., Azhar, M.S., Yasmeen, K., Farhan, H.M., Badar, M., Habib, A.T.: Effects of globalization on developing countries. J. Am. Sci 8(8), 222–227 (2012) Aslam, H.D., Azhar, M.S., Yasmeen, K., Farhan, H.M., Badar, M., Habib, A.T.: Effects of globalization on developing countries. J. Am. Sci 8(8), 222–227 (2012)
9.
Zurück zum Zitat Hadnagy, C.: Social engineering: The art of human hacking: John Wiley & Sons, 2010 Hadnagy, C.: Social engineering: The art of human hacking: John Wiley & Sons, 2010
10.
Zurück zum Zitat Chawki, M.: Nigeria tackles advance free fraud. J. Inf. Law Technol. 1(1), 1–20 (2009) Chawki, M.: Nigeria tackles advance free fraud. J. Inf. Law Technol. 1(1), 1–20 (2009)
11.
Zurück zum Zitat Ehimen, O., Bola, A.: Cybercrime in Nigeria. Bus Intell. J. 3, 93–98 (2010) Ehimen, O., Bola, A.: Cybercrime in Nigeria. Bus Intell. J. 3, 93–98 (2010)
12.
Zurück zum Zitat Ashaolu, D.: Combating Cybercrimes in Nigeria Upcoming cyberlaw textbook. Prentice Hall Publishers, Upper Saddle River (2011) Ashaolu, D.: Combating Cybercrimes in Nigeria Upcoming cyberlaw textbook. Prentice Hall Publishers, Upper Saddle River (2011)
13.
Zurück zum Zitat EFCC, EFCC Annual Report September 2013 EFCC, EFCC Annual Report September 2013
14.
Zurück zum Zitat N.P. (SFU), Fraudulent Crime Statistics (EFCC/NFIU)–2012–2014 (2014) N.P. (SFU), Fraudulent Crime Statistics (EFCC/NFIU)–2012–2014 (2014)
17.
Zurück zum Zitat Rinne, M., Tirkkonen, O.: LTE, the radio technology path towards 4G. Comput. Commun. 33, 1894–1906 (2010)CrossRef Rinne, M., Tirkkonen, O.: LTE, the radio technology path towards 4G. Comput. Commun. 33, 1894–1906 (2010)CrossRef
18.
Zurück zum Zitat Akyildiz, I.F., Gutierrez-Estevez, D.M., Reyes, E.C.: The evolution to 4G cellular systems: LTE-Advanced. Phys.Commun. 3, 217–244 (2010)CrossRef Akyildiz, I.F., Gutierrez-Estevez, D.M., Reyes, E.C.: The evolution to 4G cellular systems: LTE-Advanced. Phys.Commun. 3, 217–244 (2010)CrossRef
19.
Zurück zum Zitat Sayed, A.H., Tarighat, A., Khajehnouri, N.: Network-based wireless location: challenges faced in developing techniques for accurate wireless location information. Sig. Process. Mag. IEEE 22, 24–40 (2005)CrossRef Sayed, A.H., Tarighat, A., Khajehnouri, N.: Network-based wireless location: challenges faced in developing techniques for accurate wireless location information. Sig. Process. Mag. IEEE 22, 24–40 (2005)CrossRef
20.
Zurück zum Zitat Ghosh, A., Ratasuk, R., Mondal, B., Mangalvedhe, N., Thomas, T.: LTE-advanced: next-generation wireless broadband technology [Invited Paper]. Wireless Communications, IEEE 17, 10–22 (2010)CrossRef Ghosh, A., Ratasuk, R., Mondal, B., Mangalvedhe, N., Thomas, T.: LTE-advanced: next-generation wireless broadband technology [Invited Paper]. Wireless Communications, IEEE 17, 10–22 (2010)CrossRef
21.
Zurück zum Zitat Abeta, S.: Toward LTE commercial launch and future plan for LTE enhancements (LTE-Advanced). IEEE Int. Conf Commun. Syst. (ICCS) 2010, 146–150 (2010) Abeta, S.: Toward LTE commercial launch and future plan for LTE enhancements (LTE-Advanced). IEEE Int. Conf Commun. Syst. (ICCS) 2010, 146–150 (2010)
24.
Zurück zum Zitat John, M.: Location Services Part 2: LTE Release 9 Features, LTE University, 2011 John, M.: Location Services Part 2: LTE Release 9 Features, LTE University, 2011
26.
Zurück zum Zitat Jaros, D., Kuchta, R.: New location-based authentication techniques in the access management. In: 2010 6th International Conference on Wireless and Mobile Communications (ICWMC), pp. 426–430 (2010) Jaros, D., Kuchta, R.: New location-based authentication techniques in the access management. In: 2010 6th International Conference on Wireless and Mobile Communications (ICWMC), pp. 426–430 (2010)
27.
Zurück zum Zitat Song, Z., Li, Z., Dou, W.: Different approaches for the formal definition of authentication property. In: The 9th Asia-Pacific Conference on Communications, APCC 2003, pp. 854–858 (2003) Song, Z., Li, Z., Dou, W.: Different approaches for the formal definition of authentication property. In: The 9th Asia-Pacific Conference on Communications, APCC 2003, pp. 854–858 (2003)
28.
Zurück zum Zitat He, R., Yuan, M., Hu, J., Zhang, H., Kan, Z Ma, J.: A novel service-oriented AAA architecture. In: 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications PIMRC 2003, pp. 2833–2837 (2003) He, R., Yuan, M., Hu, J., Zhang, H., Kan, Z Ma, J.: A novel service-oriented AAA architecture. In: 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications PIMRC 2003, pp. 2833–2837 (2003)
29.
Zurück zum Zitat Kou, Y., Detecting the sybil attack cooperativelyLu, C-T., Sirwongwattana, S., Huang, Y-P.: Survey of fraud detection techniques. In: 2004 IEEE International Conference on Networking, Sensing and Control, pp. 749–754 (2004) Kou, Y., Detecting the sybil attack cooperativelyLu, C-T., Sirwongwattana, S., Huang, Y-P.: Survey of fraud detection techniques. In: 2004 IEEE International Conference on Networking, Sensing and Control, pp. 749–754 (2004)
31.
Zurück zum Zitat Demirbas, M., Song, Y.: An RSSI-based scheme for sybil attack detection in wireless sensor networks. Proceedings of the 2006 International Symposium on World of Wireless. Mobile and Multimedia Networks, pp. 564–570. IEEE Computer Society, Washington DC (2006) Demirbas, M., Song, Y.: An RSSI-based scheme for sybil attack detection in wireless sensor networks. Proceedings of the 2006 International Symposium on World of Wireless. Mobile and Multimedia Networks, pp. 564–570. IEEE Computer Society, Washington DC (2006)
32.
Zurück zum Zitat Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)CrossRef Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)CrossRef
33.
Zurück zum Zitat Ssu, K.-F., Wang, W.-T., Chang, W.-C.: Detecting Sybil attacks in Wireless Sensor Networks using neighboring information. Comput. Netw. 53, 3042–3056 (2009)MATHCrossRef Ssu, K.-F., Wang, W.-T., Chang, W.-C.: Detecting Sybil attacks in Wireless Sensor Networks using neighboring information. Comput. Netw. 53, 3042–3056 (2009)MATHCrossRef
34.
Zurück zum Zitat Yin, J., Madria, S. K.: Sybil attack detection in a hierarchical sensor network In: Third International Conference on Security and Privacy in Communications Networks and the Workshops (SecureComm 2007), pp. 494–503 (2007) Yin, J., Madria, S. K.: Sybil attack detection in a hierarchical sensor network In: Third International Conference on Security and Privacy in Communications Networks and the Workshops (SecureComm 2007), pp. 494–503 (2007)
35.
Zurück zum Zitat Zhang, Q., Wang, P., Reeves, D. S., Ning, P.: Defending against sybil attacks in sensor networks. In: 25th IEEE International Conference on Distributed Computing Systems Workshops 2005, pp. 185–191. IEEE Computer Society, Washington DC (2005) Zhang, Q., Wang, P., Reeves, D. S., Ning, P.: Defending against sybil attacks in sensor networks. In: 25th IEEE International Conference on Distributed Computing Systems Workshops 2005, pp. 185–191. IEEE Computer Society, Washington DC (2005)
36.
Zurück zum Zitat Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: Defending against sybil attacks via social networks. ACM SIGCOMM Comput. Commun. Rev. 36(4), 267–278 (2006)CrossRef Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: Defending against sybil attacks via social networks. ACM SIGCOMM Comput. Commun. Rev. 36(4), 267–278 (2006)CrossRef
37.
Zurück zum Zitat Khalil, I., Bagchi, S., Rotaru, C.N., Shroff, N.B.: Unmask: utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. Ad Hoc Netw. 8, 148–164 (2010)CrossRef Khalil, I., Bagchi, S., Rotaru, C.N., Shroff, N.B.: Unmask: utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. Ad Hoc Netw. 8, 148–164 (2010)CrossRef
38.
Zurück zum Zitat Levine, B.N., Shields, C., Margolin, N.B.: A Survey of Solutions to the Sybil Attack. University of Massachusetts Amherst, Amherst, MA (2006) Levine, B.N., Shields, C., Margolin, N.B.: A Survey of Solutions to the Sybil Attack. University of Massachusetts Amherst, Amherst, MA (2006)
39.
Zurück zum Zitat Lv, S., Wang, X., Zhao, X., Zhou, X.: Detecting the sybil attack cooperatively in wireless sensor networks. In: International Conference on Computational Intelligence and Security, CIS 2008, pp. 442–446 (2008) Lv, S., Wang, X., Zhao, X., Zhou, X.: Detecting the sybil attack cooperatively in wireless sensor networks. In: International Conference on Computational Intelligence and Security, CIS 2008, pp. 442–446 (2008)
40.
Zurück zum Zitat Danezis, G., Mittal, P.: SybilInfer: Detecting sybil nodes using social networks. In: NDSS (2009) Danezis, G., Mittal, P.: SybilInfer: Detecting sybil nodes using social networks. In: NDSS (2009)
41.
Zurück zum Zitat Cao, J., Ma, M., Li, H., Zhang, Y.: A survey on security aspects for lte and lte-a networks. IEEE Commun. Surv. Tutorials 16(1), 283–302 (2014)CrossRef Cao, J., Ma, M., Li, H., Zhang, Y.: A survey on security aspects for lte and lte-a networks. IEEE Commun. Surv. Tutorials 16(1), 283–302 (2014)CrossRef
42.
Zurück zum Zitat Barbeau, M., Robert, J.-M.: Rogue-base station detection in WiMax/802.16 wireless access networks. Ann. Des. Telecommun. 61(11–12), 1300–1313 (2006)CrossRef Barbeau, M., Robert, J.-M.: Rogue-base station detection in WiMax/802.16 wireless access networks. Ann. Des. Telecommun. 61(11–12), 1300–1313 (2006)CrossRef
43.
Zurück zum Zitat Barbeau, M., Hall, J., An, H.-C.: Detecting impersonation attacks in future wireless and mobile networks. In: Burmester, M., Yasinsac, A. (eds.) MADNES 2005. LNCS, vol. 4074, pp. 80–95. Springer, Heidelberg (2006)CrossRef Barbeau, M., Hall, J., An, H.-C.: Detecting impersonation attacks in future wireless and mobile networks. In: Burmester, M., Yasinsac, A. (eds.) MADNES 2005. LNCS, vol. 4074, pp. 80–95. Springer, Heidelberg (2006)CrossRef
45.
Zurück zum Zitat Lee, W.C.: Mobile Cellular Telecommunications: Analog and Digital Systems. McGraw-Hill Professional, New York (1995) Lee, W.C.: Mobile Cellular Telecommunications: Analog and Digital Systems. McGraw-Hill Professional, New York (1995)
Metadaten
Titel
Nigeria: Cyber Space Security Vis a Vis Computerisation, Miniaturisation and Location-Based Authentication
verfasst von
Muhammad Adeka
Mohammad Ngala
Mohammad Bin-Melha
E. Ibrahim
Simon J. Shepherd
Issa T. E. Elfergani
Ash S. Hussaini
Fauzi Elmegri
Raed Abd-Alhameed
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-18802-7_43

Premium Partner