Application of Embedded SIM Technology to Provide Information Security in Cellular Networks
Abstract
The article describe the general classification of threats to information security of cellular operators’ networks, the main security threats to subscriber devices in the networks of cellular operators, embedded SIM technology and the possibility of using this technology to ensure the security of subscriber devices. The statistics on the registered cases of the implementation of threats to information security on subscriber devices is analyzed. A high-level architecture for the protection of subscriber devices using eSIM technology is proposed.
References
1. IT threat evolution Q2 2017. Statistics. Available at: https://securelist.com/it-threat-evolution-q2-2017-statistics/79432/ (accessed 28.09.2017).
2. SGP.02 v3.2 — Remote Provisioning Architecture for Embedded UICC Technical Specification. Available at: https://www.gsma.com/newsroom/all-documents/sgp-02-v3-2-remote-provisioning-architecture-for-embedded-uicc-technicalspecification/ (accessed 28.09.2017).
3. Remote Provisioning Architecture for Embedded UICC technical specification. Version 3.2: official document SGP.02. GSM Association, 2017. 309 p.
Review
For citations:
Shelkov A.S. Application of Embedded SIM Technology to Provide Information Security in Cellular Networks. Digital Transformation. 2017;(1):18-23. (In Russ.)