Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method

The problem of counterfeiting of telecommunication products is not confined only to the end products. It extends to accessories and components such as batteries, hardware, switches, adapters, USBs etc. Counterfeiting is real and it may be regarded as a social security. That is, a platform for iden...

Full description

Saved in:
Bibliographic Details
Main Authors: Amusa, Morufu, Bamidele, Oluwade
Format: Journal
Language:English
Published: 2020
Online Access:http://ur.aeu.edu.my/998/1/Amusa_Publication4-with-cover-page-v2.pdf
http://ur.aeu.edu.my/998/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-aeu-eprints.998
record_format eprints
spelling my-aeu-eprints.9982022-11-03T09:57:40Z http://ur.aeu.edu.my/998/ Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method Amusa, Morufu Bamidele, Oluwade The problem of counterfeiting of telecommunication products is not confined only to the end products. It extends to accessories and components such as batteries, hardware, switches, adapters, USBs etc. Counterfeiting is real and it may be regarded as a social security. That is, a platform for identifying adulterated products and promoting anticounterfeit activities is very important. Though a sole and absolute protection against counterfeiting is rare, there is need for deployment of a combination of technologies which will assist to mitigate the magnitude of this phenomenon significantly. This paper presents two authentication methods for detecting counterfeit and substandard telecommunication devices/products via the International Mobile Equipment Identity (IMEI) number. The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. This algorithm is generally used to validate identification numbers such as IMEI, debit/credit card numbers, social security numbers, national identification numbers etc. The second method is an authentication method earlier developed for counterfeit drugs, which is here adapted to counterfeit telecommunication products via IMEI. IMEI is a unique number embedded in a telecommunication device which serves as identity for the device. 2020 Journal PeerReviewed text en http://ur.aeu.edu.my/998/1/Amusa_Publication4-with-cover-page-v2.pdf Amusa, Morufu and Bamidele, Oluwade (2020) Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method. Africa Journal of Management of Information System, 2 (2). pp. 59-70.
institution Asia e University
building AEU Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Asia e University
content_source AEU University Repository
url_provider http://ur.aeu.edu.my/
language English
description The problem of counterfeiting of telecommunication products is not confined only to the end products. It extends to accessories and components such as batteries, hardware, switches, adapters, USBs etc. Counterfeiting is real and it may be regarded as a social security. That is, a platform for identifying adulterated products and promoting anticounterfeit activities is very important. Though a sole and absolute protection against counterfeiting is rare, there is need for deployment of a combination of technologies which will assist to mitigate the magnitude of this phenomenon significantly. This paper presents two authentication methods for detecting counterfeit and substandard telecommunication devices/products via the International Mobile Equipment Identity (IMEI) number. The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. This algorithm is generally used to validate identification numbers such as IMEI, debit/credit card numbers, social security numbers, national identification numbers etc. The second method is an authentication method earlier developed for counterfeit drugs, which is here adapted to counterfeit telecommunication products via IMEI. IMEI is a unique number embedded in a telecommunication device which serves as identity for the device.
format Journal
author Amusa, Morufu
Bamidele, Oluwade
spellingShingle Amusa, Morufu
Bamidele, Oluwade
Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
author_facet Amusa, Morufu
Bamidele, Oluwade
author_sort Amusa, Morufu
title Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
title_short Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
title_full Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
title_fullStr Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
title_full_unstemmed Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
title_sort detection of counterfeit telecommunication products using luhn checksum algorithm and an adapted imei authentication method
publishDate 2020
url http://ur.aeu.edu.my/998/1/Amusa_Publication4-with-cover-page-v2.pdf
http://ur.aeu.edu.my/998/
_version_ 1748706664705425408
score 13.211869