SlideShare a Scribd company logo
1 of 22
Visvesvaraya Technological University
Jnana Sangama, Belgaum
Seminar On
SNIFFERS
Under the guidance of By,
Department of Information Science and Engineering
Rajiv Gandhi Institute of Technology
Cholanagar, R T Nagar Post, Bangalore-32
SNIFFER FOR
DETECTING LOST
MOBILE PHONES
Presented by,
CONTENTS
• Introduction
• What sniffer is ?
• IMEI
• Designing for the sniffer
 Sniffer base station
 Unidirectional Antenna
 Software Tracking
• Working of sniffer device
• Advantages
• Conclusion
• References
DEPT OF ISE RGIT,B'LORE 3
INTRODUCTION
• The main scope is to detect the lost mobiles.
• Each and every day thousands of mobiles get
misplaced or lost, though effective way for the
blocking of the lost mobile.
• To prevent unauthorized person from making and
receiving the calls has been done by the
manufacturers of the mobile with the help of IMEI
number.
DEPT OF ISE RGIT,B'LORE 4
CONT’D….
• For the detection of lost mobile SNIFFER plays a vital role .
• The sniffer device has to be designed precisely and size should
be reduced for easy mobility for the purpose of detection .
DEPT OF ISE RGIT,B'LORE 5
What a SNIFFER is?
• The sniffer is basically a transceiver that works in the frequency
which is in the special unused range that is operated by the
service provided or it can designed to operate at a frequency
that is of much different frequency than the one that is being
used.
DEPT OF ISE RGIT,B'LORE 6
INTRODUCTION TO IMEI
• Each mobile device has a globally unique IMEI
(International Mobile Equipment Identity)
• IMEI (International Mobile Equipment Identity)
numbering system is a 15 digit unique code that is
used to identify the GSM phone
• To know the IMEI number the *#06# has to be
pressed, the number will be displayed in the LCD
screen
DEPT OF ISE RGIT,B'LORE 7
CONT’D….
• When a phone is switched on, this unique IMEI number is
transmitted and checked against a data base of black
listed or grey listed phones in the network’s EIR
• Grey listing will allow the phone to be used, but it can be
tracked to see who has it (via the SIM information).
• Black listing the phone from being used on any network
where there is an EIR match.
DEPT OF ISE RGIT,B'LORE 8
DESIGNING FOR THE SNIFFER
• The sniffer device can be called as a mobile base station that
includes the following important components:
 Sniffer base station
 Unidirectional antenna
 Tracking software
DEPT OF ISE RGIT,B'LORE 9
SNIFFER BASE STATION
• The sniffer is a small base station, it includes transceiver section.
• It should operate at a frequency that is much different from the
frequency of the current cell in which the operation of detection
is being carried out.
DEPT OF ISE RGIT,B'LORE 10
UNIDIRECTIONAL ANTENNA
• The directional antenna acts as the eyes for the sniffer for the
purpose of the detecting the lost mobile phones.
• Antenna is a device which works at specified frequencies range
for transmitting or receiving the data signal.
• In general, antennas transmit power depending on lobe pattern
which varies from one antenna to the other.
DEPT OF ISE RGIT,B'LORE 11
DEPT OF ISE RGIT,B'LORE 12
RADIATION
PATTERN
SOFTWARE FOR THE TRACKING
• The software is used for the tracking of the lost mobile phone
• The programming is done with C or Java. However the C is most
preferred as it is easily embedded with the chips.
DEPT OF ISE RGIT,B'LORE 13
WORKING OF SNIFFERS
• The working of sniffers is of two phases
Before Sniffer increases the frequency
After Sniffer increases the frequency
DEPT OF ISE RGIT,B'LORE 14
BEFORE SNIFFER INCREASES THE
FREQUENCY
DEPT OF ISE RGIT,B'LORE 15
AFTER SNIFFER INCREASES THE
FREQUENCY
DEPT OF ISE RGIT,B'LORE 16
EXPLANATION
• From the above figure we have clearly observed the racing of
the lost mobile.
• We have identified the lost mobile using IMEI.
But,
• The location where it is present can be known by seeing at the
output of the software.
DEPT OF ISE RGIT,B'LORE 17
ADVANTAGES
• This method is used for finding the lost mobiles effectively
• Cost effective
• low power consumption
• Easy to design
DEPT OF ISE RGIT,B'LORE 18
CONCLUSION
• There are certain boundary conditions that have to be qualified
for the identification of lost mobile like the power of the mobile
should be good enough, the mobile phone should not be in the
shadow region but however this method using modern
technologies and devices.
DEPT OF ISE RGIT,B'LORE 19
REFERENCES
• Schiller, “Mobile Communication”, Pearson Education
1 Edition, 7th reprint -2003.
• John D Kraus, “Electromagnetic”, TMH
• Jordan et al, “Electromagnetic waves and radiation
system” , Printice Hall
• www.gsmworld.com
• http://ericsson.com
DEPT OF ISE RGIT,B'LORE 20
DEPT OF ISE RGIT,B'LORE 21
DEPT OF ISE RGIT,B'LORE 22

More Related Content

What's hot (20)

Eye phone .1
Eye phone .1Eye phone .1
Eye phone .1
 
Eye phone
Eye phoneEye phone
Eye phone
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Touchless touchscreen technology
Touchless touchscreen technologyTouchless touchscreen technology
Touchless touchscreen technology
 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar Presentation
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Mobile Jammer ppt
 
silent sound technology
silent sound technologysilent sound technology
silent sound technology
 
Touchless touch screen
Touchless touch screenTouchless touch screen
Touchless touch screen
 
Silent sound technology
Silent sound technologySilent sound technology
Silent sound technology
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics
 
Medical mirror
Medical mirror Medical mirror
Medical mirror
 
Outes
OutesOutes
Outes
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Report
 
Eye Ring ppt
Eye Ring pptEye Ring ppt
Eye Ring ppt
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
Digital jewellery ppt
Digital jewellery pptDigital jewellery ppt
Digital jewellery ppt
 
Eye phone report in ieee format
Eye phone report in ieee formatEye phone report in ieee format
Eye phone report in ieee format
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
Eye phone
Eye phoneEye phone
Eye phone
 
DakNet PPT
DakNet PPTDakNet PPT
DakNet PPT
 

Viewers also liked

Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein TechnologyPapun Papun
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer vilss
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology pptdeepakmarndi
 
Sniffer for-detecting-lost-mobiles
Sniffer for-detecting-lost-mobilesSniffer for-detecting-lost-mobiles
Sniffer for-detecting-lost-mobilesRuqeya Afshan
 
Sniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost MobilesSniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost MobilesSumaiya Arjumand
 
When Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
When Attention is not Scarce – Detecting Boredom from Mobile Phone UsageWhen Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
When Attention is not Scarce – Detecting Boredom from Mobile Phone UsageMartin Pielot
 
SOS transmission through cellular phones to help accident victims
SOS transmission through cellular phones to help accident victimsSOS transmission through cellular phones to help accident victims
SOS transmission through cellular phones to help accident victimsAkhil Kumar
 

Viewers also liked (17)

Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
Smart note-taker
Smart note-takerSmart note-taker
Smart note-taker
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer
 
Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology ppt
 
Sniffer for-detecting-lost-mobiles
Sniffer for-detecting-lost-mobilesSniffer for-detecting-lost-mobiles
Sniffer for-detecting-lost-mobiles
 
Seminar on sniffers
Seminar on sniffersSeminar on sniffers
Seminar on sniffers
 
venkat (1)
venkat (1)venkat (1)
venkat (1)
 
Sniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost MobilesSniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost Mobiles
 
Sos ppt
Sos pptSos ppt
Sos ppt
 
When Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
When Attention is not Scarce – Detecting Boredom from Mobile Phone UsageWhen Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
When Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
 
Blue brain
Blue brainBlue brain
Blue brain
 
DRM Powerpoint
DRM PowerpointDRM Powerpoint
DRM Powerpoint
 
SOS transmission through cellular phones to help accident victims
SOS transmission through cellular phones to help accident victimsSOS transmission through cellular phones to help accident victims
SOS transmission through cellular phones to help accident victims
 
Wireless usb
Wireless usbWireless usb
Wireless usb
 

Similar to Sniffer for detecting lost mobiles

sniffer technology.pptx
sniffer technology.pptxsniffer technology.pptx
sniffer technology.pptxDivyaDewkathe
 
Snifferforthemobilephones 120304120929-phpapp02
Snifferforthemobilephones 120304120929-phpapp02Snifferforthemobilephones 120304120929-phpapp02
Snifferforthemobilephones 120304120929-phpapp02Anjali Verma
 
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)Edwin Manuel
 
GSM controlled robot with obstacle avoidance using IR sensors
GSM controlled robot with obstacle avoidance using IR sensorsGSM controlled robot with obstacle avoidance using IR sensors
GSM controlled robot with obstacle avoidance using IR sensorsRahul Sidhu
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 
SPY Mobile Software
SPY Mobile SoftwareSPY Mobile Software
SPY Mobile SoftwarePooja Seo
 
project presentation on cell phone operated land rover
project presentation on cell phone operated land roverproject presentation on cell phone operated land rover
project presentation on cell phone operated land roversunanda kothari
 
SNIFFER FOR DETECTING LOST MOBILE ppt arya
SNIFFER FOR DETECTING LOST MOBILE ppt  aryaSNIFFER FOR DETECTING LOST MOBILE ppt  arya
SNIFFER FOR DETECTING LOST MOBILE ppt aryayidegev626
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
Snifferfordetectinglostmobile 130811054537-phpapp01
Snifferfordetectinglostmobile 130811054537-phpapp01Snifferfordetectinglostmobile 130811054537-phpapp01
Snifferfordetectinglostmobile 130811054537-phpapp01puja kumari
 
Caller ID Android Application
 Caller ID Android Application Caller ID Android Application
Caller ID Android ApplicationSmitakshi Sen
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Mobile devices hardware characteristics
Mobile devices hardware characteristicsMobile devices hardware characteristics
Mobile devices hardware characteristicsHectorMolarGamboa
 
IOT Based Smart Parking and Damage Detection Using RFID
IOT Based Smart Parking and Damage Detection Using RFIDIOT Based Smart Parking and Damage Detection Using RFID
IOT Based Smart Parking and Damage Detection Using RFIDMaheshMoses
 
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...Yole Developpement
 

Similar to Sniffer for detecting lost mobiles (20)

sniffer technology.pptx
sniffer technology.pptxsniffer technology.pptx
sniffer technology.pptx
 
Snifferforthemobilephones 120304120929-phpapp02
Snifferforthemobilephones 120304120929-phpapp02Snifferforthemobilephones 120304120929-phpapp02
Snifferforthemobilephones 120304120929-phpapp02
 
Sniffer
SnifferSniffer
Sniffer
 
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
 
GSM controlled robot with obstacle avoidance using IR sensors
GSM controlled robot with obstacle avoidance using IR sensorsGSM controlled robot with obstacle avoidance using IR sensors
GSM controlled robot with obstacle avoidance using IR sensors
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
SPY Mobile Software
SPY Mobile SoftwareSPY Mobile Software
SPY Mobile Software
 
project presentation on cell phone operated land rover
project presentation on cell phone operated land roverproject presentation on cell phone operated land rover
project presentation on cell phone operated land rover
 
SNIFFER FOR DETECTING LOST MOBILE ppt arya
SNIFFER FOR DETECTING LOST MOBILE ppt  aryaSNIFFER FOR DETECTING LOST MOBILE ppt  arya
SNIFFER FOR DETECTING LOST MOBILE ppt arya
 
car accident.pptx
car accident.pptxcar accident.pptx
car accident.pptx
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Snifferfordetectinglostmobile 130811054537-phpapp01
Snifferfordetectinglostmobile 130811054537-phpapp01Snifferfordetectinglostmobile 130811054537-phpapp01
Snifferfordetectinglostmobile 130811054537-phpapp01
 
Caller ID Android Application
 Caller ID Android Application Caller ID Android Application
Caller ID Android Application
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile devices hardware characteristics
Mobile devices hardware characteristicsMobile devices hardware characteristics
Mobile devices hardware characteristics
 
IOT Based Smart Parking and Damage Detection Using RFID
IOT Based Smart Parking and Damage Detection Using RFIDIOT Based Smart Parking and Damage Detection Using RFID
IOT Based Smart Parking and Damage Detection Using RFID
 
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
 

Recently uploaded

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Sniffer for detecting lost mobiles

  • 1. Visvesvaraya Technological University Jnana Sangama, Belgaum Seminar On SNIFFERS Under the guidance of By, Department of Information Science and Engineering Rajiv Gandhi Institute of Technology Cholanagar, R T Nagar Post, Bangalore-32
  • 2. SNIFFER FOR DETECTING LOST MOBILE PHONES Presented by,
  • 3. CONTENTS • Introduction • What sniffer is ? • IMEI • Designing for the sniffer  Sniffer base station  Unidirectional Antenna  Software Tracking • Working of sniffer device • Advantages • Conclusion • References DEPT OF ISE RGIT,B'LORE 3
  • 4. INTRODUCTION • The main scope is to detect the lost mobiles. • Each and every day thousands of mobiles get misplaced or lost, though effective way for the blocking of the lost mobile. • To prevent unauthorized person from making and receiving the calls has been done by the manufacturers of the mobile with the help of IMEI number. DEPT OF ISE RGIT,B'LORE 4
  • 5. CONT’D…. • For the detection of lost mobile SNIFFER plays a vital role . • The sniffer device has to be designed precisely and size should be reduced for easy mobility for the purpose of detection . DEPT OF ISE RGIT,B'LORE 5
  • 6. What a SNIFFER is? • The sniffer is basically a transceiver that works in the frequency which is in the special unused range that is operated by the service provided or it can designed to operate at a frequency that is of much different frequency than the one that is being used. DEPT OF ISE RGIT,B'LORE 6
  • 7. INTRODUCTION TO IMEI • Each mobile device has a globally unique IMEI (International Mobile Equipment Identity) • IMEI (International Mobile Equipment Identity) numbering system is a 15 digit unique code that is used to identify the GSM phone • To know the IMEI number the *#06# has to be pressed, the number will be displayed in the LCD screen DEPT OF ISE RGIT,B'LORE 7
  • 8. CONT’D…. • When a phone is switched on, this unique IMEI number is transmitted and checked against a data base of black listed or grey listed phones in the network’s EIR • Grey listing will allow the phone to be used, but it can be tracked to see who has it (via the SIM information). • Black listing the phone from being used on any network where there is an EIR match. DEPT OF ISE RGIT,B'LORE 8
  • 9. DESIGNING FOR THE SNIFFER • The sniffer device can be called as a mobile base station that includes the following important components:  Sniffer base station  Unidirectional antenna  Tracking software DEPT OF ISE RGIT,B'LORE 9
  • 10. SNIFFER BASE STATION • The sniffer is a small base station, it includes transceiver section. • It should operate at a frequency that is much different from the frequency of the current cell in which the operation of detection is being carried out. DEPT OF ISE RGIT,B'LORE 10
  • 11. UNIDIRECTIONAL ANTENNA • The directional antenna acts as the eyes for the sniffer for the purpose of the detecting the lost mobile phones. • Antenna is a device which works at specified frequencies range for transmitting or receiving the data signal. • In general, antennas transmit power depending on lobe pattern which varies from one antenna to the other. DEPT OF ISE RGIT,B'LORE 11
  • 12. DEPT OF ISE RGIT,B'LORE 12 RADIATION PATTERN
  • 13. SOFTWARE FOR THE TRACKING • The software is used for the tracking of the lost mobile phone • The programming is done with C or Java. However the C is most preferred as it is easily embedded with the chips. DEPT OF ISE RGIT,B'LORE 13
  • 14. WORKING OF SNIFFERS • The working of sniffers is of two phases Before Sniffer increases the frequency After Sniffer increases the frequency DEPT OF ISE RGIT,B'LORE 14
  • 15. BEFORE SNIFFER INCREASES THE FREQUENCY DEPT OF ISE RGIT,B'LORE 15
  • 16. AFTER SNIFFER INCREASES THE FREQUENCY DEPT OF ISE RGIT,B'LORE 16
  • 17. EXPLANATION • From the above figure we have clearly observed the racing of the lost mobile. • We have identified the lost mobile using IMEI. But, • The location where it is present can be known by seeing at the output of the software. DEPT OF ISE RGIT,B'LORE 17
  • 18. ADVANTAGES • This method is used for finding the lost mobiles effectively • Cost effective • low power consumption • Easy to design DEPT OF ISE RGIT,B'LORE 18
  • 19. CONCLUSION • There are certain boundary conditions that have to be qualified for the identification of lost mobile like the power of the mobile should be good enough, the mobile phone should not be in the shadow region but however this method using modern technologies and devices. DEPT OF ISE RGIT,B'LORE 19
  • 20. REFERENCES • Schiller, “Mobile Communication”, Pearson Education 1 Edition, 7th reprint -2003. • John D Kraus, “Electromagnetic”, TMH • Jordan et al, “Electromagnetic waves and radiation system” , Printice Hall • www.gsmworld.com • http://ericsson.com DEPT OF ISE RGIT,B'LORE 20
  • 21. DEPT OF ISE RGIT,B'LORE 21
  • 22. DEPT OF ISE RGIT,B'LORE 22