Nigeria: Cyber Space Security Vis a Vis Computerisation, Miniaturisation and Location-Based Authentication

The degree of insecurity occasioned by fraudulent practices in Nigeria has been of great concern economically, especially as it relates to overseas transactions. This paper was designed to mitigate this problem for Nigeria and countries with similar dispositions. Based on a survey involving field trip to Nigeria, the paper examines the general security situation in Nigeria and its mutual impacts with computerisation, miniaturisation and Location-Based Authentication (LBA). It was discovered that both computerisation and miniaturisation had some negative effects on cyber-security, as these were being exploited by fraudsters, especially using ‘advance fee fraud;’ popularly called 419. As a countermeasure, the research examined the possibility of using LBA and further digitisation of the GSM Mobile country codes down to City/Area codes along with GSM Mobile/Global Positioning System (GPS) authentications. Where necessary, these could be combined with the use of a web-based Secret Sharing Scheme for services with very high security demands. The anticipated challenges were also examined and considered to be of negligible impacts; especially roaming.

[1]  William C. Y. Lee Mobile Cellular Telecommunications: Analog and Digital Systems , 1995 .

[2]  George Danezis,et al.  SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.

[3]  Zhoujun Li,et al.  Different approaches for the formal definition of authentication property , 2003, 9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732).

[4]  Sadayuki Abeta Toward LTE commercial launch and future plan for LTE enhancements (LTE-Advanced) , 2010, 2010 IEEE International Conference on Communication Systems.

[5]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[6]  Peng Ning,et al.  Defending against Sybil attacks in sensor networks , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.

[7]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[8]  Chang-Tien Lu,et al.  Survey of fraud detection techniques , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.

[9]  Michel Barbeau,et al.  Rogue-base station detection in WiMax/802.16 wireless access networks , 2006, Ann. des Télécommunications.

[10]  G.E. Moore,et al.  Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.

[11]  Issa M. Khalil,et al.  UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks , 2010, Ad Hoc Networks.

[12]  Xiaodong Wang,et al.  Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks , 2008, 2008 International Conference on Computational Intelligence and Security.

[13]  Christopher Hadnagy,et al.  Social Engineering: The Art of Human Hacking , 2010 .

[14]  Ian F. Akyildiz,et al.  The evolution to 4G cellular systems: LTE-Advanced , 2010, Phys. Commun..

[15]  Jianping Hu,et al.  A novel service-oriented AAA architecture , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[16]  Wen-Chung Chang,et al.  Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.

[17]  Stefan Parkvall,et al.  Evolution of LTE toward IMT-advanced , 2011, IEEE Communications Magazine.

[18]  Brian Neil Levine,et al.  A Survey of Solutions to the Sybil Attack , 2006 .

[19]  Sanjay Kumar Madria,et al.  Sybil attack detection in a hierarchical sensor network , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[20]  Michel Barbeau,et al.  Detecting Impersonation Attacks in Future Wireless and Mobile Networks , 2005, MADNES.

[21]  A.H. Sayed,et al.  Network-based wireless location: challenges faced in developing techniques for accurate wireless location information , 2005, IEEE Signal Processing Magazine.

[22]  Timothy A. Thomas,et al.  LTE-advanced: next-generation wireless broadband technology [Invited Paper] , 2010, IEEE Wireless Communications.

[23]  Radek Kuchta,et al.  New Location-Based Authentication Techniques in the Access Management , 2010, 2010 6th International Conference on Wireless and Mobile Communications.

[24]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[25]  Olav Tirkkonen,et al.  LTE, the radio technology path towards 4G , 2010, Comput. Commun..

[26]  Jin Cao,et al.  A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.