Wangiri Fraud

This Text Needs To Be changed. We are moving quickly towards a world where any device can connect to the Internet. But there are plenty of opportunities for fraud.

Embedded SIMs if left unattended for long periods, are susceptible to tampering. The large number of terminals makes them prone to DoS attacks, or being used to launch such attacks.

The IoT Fraud Challenge

We are moving quickly towards a world where any device can connect to the Internet. But there are plenty of opportunities for fraud.

Embedded SIMs if left unattended for long periods, are susceptible to tampering. The large number of terminals makes them prone to DoS attacks, or being used to launch such attacks.

IoT Known Behaviour Module

IoT devices often exhibit specific behaviours. These behaviours are encoded into profiles that encapsulate inter-device relationships, location, movement, and activity characteristics of the service. XINTEC will monitor devices against these profiles to ensure they behave according to expectations. Any abnormal behaviour associated with a device or group(s) of devices will trigger alarms.

IoT Known Behaviour Module Example

An e-Bike fleet will accept financial transactions and report their location every few minutes over a data connection. They will operate within a limited area and only expect to achieve a reasonable maximum speed of 50km/h, for example. The embedded SIMs are fixed to a single e-Bike (meaning there is no change of the IMEI value) and communicate only with the operations support platform. The characteristics of the e-Bike fleet are encoded into a XINTEC profile.

The XINTEC platform monitors the activity of the bikes, raising alarms, e.g.:

• E-bike traveling above reasonable speed threshold indicating it may be carried in another vehicle

• E-Bike movement without associated financial transaction

• E-Bike failed to report location

• Data communication to unsupported APN

• Inappropriate use of communication service