Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
The problem of counterfeiting of telecommunication products is not confined only to the end products. It extends to accessories and components such as batteries, hardware, switches, adapters, USBs etc. Counterfeiting is real and it may be regarded as a social security. That is, a platform for iden...
Saved in:
Main Authors: | , |
---|---|
Format: | Journal |
Language: | English |
Published: |
2020
|
Online Access: | http://ur.aeu.edu.my/998/1/Amusa_Publication4-with-cover-page-v2.pdf http://ur.aeu.edu.my/998/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-aeu-eprints.998 |
---|---|
record_format |
eprints |
spelling |
my-aeu-eprints.9982022-11-03T09:57:40Z http://ur.aeu.edu.my/998/ Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method Amusa, Morufu Bamidele, Oluwade The problem of counterfeiting of telecommunication products is not confined only to the end products. It extends to accessories and components such as batteries, hardware, switches, adapters, USBs etc. Counterfeiting is real and it may be regarded as a social security. That is, a platform for identifying adulterated products and promoting anticounterfeit activities is very important. Though a sole and absolute protection against counterfeiting is rare, there is need for deployment of a combination of technologies which will assist to mitigate the magnitude of this phenomenon significantly. This paper presents two authentication methods for detecting counterfeit and substandard telecommunication devices/products via the International Mobile Equipment Identity (IMEI) number. The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. This algorithm is generally used to validate identification numbers such as IMEI, debit/credit card numbers, social security numbers, national identification numbers etc. The second method is an authentication method earlier developed for counterfeit drugs, which is here adapted to counterfeit telecommunication products via IMEI. IMEI is a unique number embedded in a telecommunication device which serves as identity for the device. 2020 Journal PeerReviewed text en http://ur.aeu.edu.my/998/1/Amusa_Publication4-with-cover-page-v2.pdf Amusa, Morufu and Bamidele, Oluwade (2020) Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method. Africa Journal of Management of Information System, 2 (2). pp. 59-70. |
institution |
Asia e University |
building |
AEU Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Asia e University |
content_source |
AEU University Repository |
url_provider |
http://ur.aeu.edu.my/ |
language |
English |
description |
The problem of counterfeiting of telecommunication products is not confined only to the end products. It extends to
accessories and components such as batteries, hardware, switches, adapters, USBs etc. Counterfeiting is real and it
may be regarded as a social security. That is, a platform for identifying adulterated products and promoting anticounterfeit activities is very important. Though a sole and absolute protection against counterfeiting is rare, there is need for deployment of a combination of technologies which will assist to mitigate the magnitude of this phenomenon significantly. This paper presents two authentication methods for detecting counterfeit and
substandard telecommunication devices/products via the International Mobile Equipment Identity (IMEI) number.
The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10
algorithm. This algorithm is generally used to validate identification numbers such as IMEI, debit/credit card
numbers, social security numbers, national identification numbers etc. The second method is an authentication
method earlier developed for counterfeit drugs, which is here adapted to counterfeit telecommunication products via
IMEI. IMEI is a unique number embedded in a telecommunication device which serves as identity for the device. |
format |
Journal |
author |
Amusa, Morufu Bamidele, Oluwade |
spellingShingle |
Amusa, Morufu Bamidele, Oluwade Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method |
author_facet |
Amusa, Morufu Bamidele, Oluwade |
author_sort |
Amusa, Morufu |
title |
Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method |
title_short |
Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method |
title_full |
Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method |
title_fullStr |
Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method |
title_full_unstemmed |
Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method |
title_sort |
detection of counterfeit telecommunication products using luhn checksum algorithm and an adapted imei authentication method |
publishDate |
2020 |
url |
http://ur.aeu.edu.my/998/1/Amusa_Publication4-with-cover-page-v2.pdf http://ur.aeu.edu.my/998/ |
_version_ |
1748706664705425408 |
score |
13.211869 |