Threats and Protection on E-Sim
Alex R Mathew

Alex R Mathew*, Bethany College, USA. 

Manuscript received on August 01, 2020. | Revised Manuscript received on August 05, 2020. | Manuscript published on September 30, 2020. | PP: 184-186 | Volume-9 Issue-3, September 2020. | Retrieval Number: 100.1/ijrte.C4358099320 | DOI: 10.35940/ijrte.C4358.099320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Threats involve various risks and threats are associated with the embedded SIM technology, for instance, the Internet of things (IoT) identity. IoT refers to the working capabilities enabling the allocation of unique identifiers (UID) to effectively connect with the related devices thus enhancing communication. An e-SIM application cannot produce reliable and actual data used to obtain the subscriber’s anticipated outcome. The SIM technology does not provide some reliable data that can be employed by the user to formulate some serious productive outcomes. Failure by the technology to process and automatically provide the user with the notification suppose of any infringement or hacking. SIM-jacking is the other notable threats facing the embedded universal integrated connectivity card (e-UICC). Incompetent Log Rhythm Al Engine influences the fraudster hacking experience due to failure protections within the operational surrounding. The e-SIM technology system lacks timely threat, risk, and other various vital operations predictability to react to the experienced unbearable operations challenges induced by the fraudsters. Similarly, the embedded SIM incurs the insider threats whereby the service providers fail to secure the much-needed privacy concerning an individual’s vital information. The situations of personal data leakage are witnessed within the system operations.The e-SIM hijacking enables the fraudsters to secretly obtain the victim’s vital data of the subscriber, hijack, and receive the information intended to the individual to his/her personal phone. The process results to complete mobile account operations by the hacker resulting to further access to the victim’s bank information and transfer of cash. The other threat experienced by e-SIM users is the provision of false information. The SIM subscribers normally fall into traps of the fraudsters by receiving short messages (SMS) citing assistance kind of news from the service providers, thus drawing the victim’s bank amount. Identity fraud and device poisoning are other additional threats encountered in the application of e-SIM. Generally, the entire process of fraud invasion and victimization influence the victim’s business decisions of the affected individuals. Protections focuses on the embedded SIM provides greater security in addition to a re-programmable technological system, unlike the physical SIM card. The subscriber’s personal information is not contained within the e-SIM but with the service providers, thus enhancing its effectiveness. An e-SIM enables the consumers to effectively shift carriers between the T-Mobile and Sprint without physical movement, thus supportive of security systems. Despite the security measures put into place, e-SIM like any other SIM card experiences information theft. Therefore, the service providers should encounter the emerging fraudster effects by proper monitoring of the network system to enable security restrictions. The system should induce strict conditions that enable the evaluation and differentiation between the IoT and the non-IoT devices during their operation. 
Keywords: Cellular network, Charging, IoT and non-IoT devices, and Security.