eSIM: Security Aspects for Privacy and Protection of Users
Keywords:
eSIM, GSMA(Global System Mobile Association), MNO, eUICC, SM-DP, SM-SR.Abstract
The developing world needs optimization of hardware components and higher performance of the devices. An innovative idea got implemented in 2012 which also provided additional range and storage benefits. But with advanced technology benefits, there are also cons of using it. The main con of eSIM was hijacking it and tampering it for gaining full access. eSIM has a specific encrypted link to a specific MNO which may give access to hackers to push a new profile in it but this has been already reported by GSMA. The security level of eSIM is as equal as a normal SIM[11][18][22]. The following security aspects have been elaborated in this paper.
References
- Evolution of the SIM to eSIM by Elaheh Vahidian in 2013.
- eSIM IoT Integration for IoT Devices by Mikaël DUBREUCQ – Director, Global Strategic Marketing.
- Analyzing trusted elements in mobile devices by Saurabh Kulkarni.
- Threats and Protection on E-Sim by Threats and Protection on E-Sim by Alex R Mathew.
- E-SIM for consumers—a game changer in mobile telecommunications? by Markus Meukel, Markus Schwarz, and Matthias Winter.
- eSIM on IoT : An Innovative Approach Towards Connectivity by Ms.Sayali Krishna , Mr. Bhaskar Mondal and Ms. Surabhi Thatte.
- M2M embedded subscriber identity module provisioning in networks without SMS service by Ken-Tristan Peterson.
- Accelerate celular IoT deployment with eSIM, ARM Limited 201 , whitepaper.
- Securing solutions Ensuring your peace of mind, life.augmented, whitepaper.
- eSIM, Whitepaper, 2018.
- eSIM: The Global Market Report, whitepaper, 2019.
- Kigen-How-Remote-SIM-Provisioning-Works-ebook, whitepaper.
- SIMs, eSIMs and Secure Elements, whitepaper, www.simalliance.org.
- https://www.thalesgroup.com/en/markets/digital-identity-and-security/mobile/secure-elements/embedded-secure-element, 6 Feb 2021, 13:20 IST.
- https://mobile-security.gi-de.com/esim 6 Feb 2021 13:20 IST.
- https://hellofuture.orange.com/en/how-increasing-the-confidence-in-the-esim-ecosystem-is-essential-for-its-adoption/ 6 Feb 2021 13:20 IST.
- https://www.gi-de.com/en/spotlight/connectivity/esim-technology-applications 6 Feb 2021 13:20 IST.
- https://www.truphone.com/us/about/newsroom/how-safe-is-the-esim/ 6 Feb 2021 13:20 IST.
- https://www.fiercewireless.com/tech/could-esim-technology-make-your-smartphone-less-secure 6 Feb 2021 13:20 IST.
- https://www.thalesgroup.com/en/markets/digital-identity-and-security/mobile/secure-elements/embedded-secure-element 6 Feb 2021 13:20 IST.
- https://www.forbes.com/uk/advisor/mobile-phones/esims/ 6 Feb 2021 13:20 IST
- https://www.usmobile.com/blog/esim/ 6 Feb 2021 13:20 IST
- Fig.1. eSim Security Architecture : https://i0.wp.com/www.gsma.com/esim/wp-content/uploads/2019/08/sim1.jpg?w=590&ssl=1.
- https://www.twilio.com/blog/what-is-esim 12 Feb 2021 17:15 IST.
- Fig.2.Using WIB(Wireless Internet Browser) for attacking victim https://thehackernews.com/images/-wDLPnOEOjik/XY5Yv_wLctI/AAAAAAAA1PA/jh8nreQjdrQPsANIk2SQB2Br8Ig0JcoOwCLcBGAsYHQ/s728-e100/sim-browser-toolkit-simjacker-vulnerability.png 18 Feb 2021 20:49 IST
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.