SlideShare a Scribd company logo
GSM SECURITY
OUTLINE
 INTRODUCTION
 Security goals & concerns
 Security mechanisms
 LITERATURE REVIEW
 Literature review comparison table
 SHORTCOMINGS
 CONCLUSION
 REFERENCES
2
INTRODUCTION
3
 The acronym GSM stands for Global System for Mobile, the term
"global" was preferred due to the intended adoption of this standard in
every continent of the world.
 GSM is a wireless communication that uses digital technology for
mobile communications whose signal transmission is divided by time,
mostly known as Time Division Multiple Access (TDMA).
 Security Goals & Concerns :
 Operators
 Bills right people
 Avoid fraud
 Protect Services
 Customers
 Privacy
 Anonymity
 Four Principles of GSM Security Mechanism:
 User Authentication
(Ability of mobile equipment to prove that it has access to a
particular account with the operator)
 Ciphering of data and signal
(User data are protected against interception by means of ciphering.)
 Confidentiality of user data identity
(TMSI is used instead of IMSI which prevents an eavesdropper from
identifying of subscriber)
 SIM as security module
(PIN code security)
IMSI: International Mobile Subscriber Identity
TMSI: Temporary Mobile Subscriber Identity
SECURITY MECHANISMS
LITERATURE REVIEW
5
LITERATURE REVIEW(1/2)
6
 Title: ”Advanced Vehicle Security System”, IEEE
transaction 2015.
Author: Pritpal Singh, Tanjot Sethi, Bunil K. B., Bibhuti B. B.
 Objective: To design and develop an advance and robust
security system for vehicles that can prevent theft and provide
information on accidents.
 Keywords: GPS, GSM, Tracking
HARDWARE DESIGN(Cont.1/2)
7
 (A) GSM Model:
Fig. 1. System
Architecture [1]
Fig. 2. Block diagram for detecting thief
movement[1]
HARDWARE DESIGN(Cont.1/2)
8
Fig. 3. Block diagram for switching different systems using DTMF decoder[1]
HARDWARE DESIGN(Cont.1/2)
9
 (B) GPS Model :
Fig. 4. Block diagram of GPS tracking system[1]
RESULTS(Cont.1/2)
10
Fig. 6. MSG sent in case of accident to
one of the family member[1]
Fig. 5. Offline tracking of vehicle
using GSM[1]
LITERATURE REVIEW(2/2)
11
 Title: “Anti-Theft Vehicle Tracking and
Immobilization System ”, IEEE transaction 2014.
Author: Kingshuk Mukherjee
 Objective: In this paper a simple and economical solution to
the problem has been presented. This scheme can be
assembled and used even by private car owners and provides
reasonable protection against vehicle theft.
 Keywords: Anti-theft, Vehicle tracking, Immobilization
LITERATURE REVIEW(Cont.2/2)
12
 (I) Flow Chart:
Fig. 7. System
[2]
LITERATURE REVIEW(Cont.2/2)
13
(I) Flow Chart (Cont..):
Fig. 7. System
[2]
14
 A. Hardware implementation:
The system can be broadly divided into three parts:
 The GSM modem
 The GPS module
 The Immobilization Circuitry
DESIGN & IMPLEMENTATION(Cont.)
DESIGN & IMPLEMENTATION(Cont.)
15
 B. Software implementation:
The software part covers the code that has to be fed into the
Arduino microcontroller. Its outline is as follows:
 1. READ MSG FROM GSM MODEM
 2. IF MESSAGE = "TRACK"
 READ LOCATION • SEND LOCATION
 3. IF MESSAGE = "IMMOBILIZE"
 OPEN FUEL INJECTOR CIRCUIT BY ACTIVATING RELAY
 SEND "IMMOBILIZATION SUCCESSFUL" MSG TO OWNER'S
 4. IF MESSAGE = "REVERSE"
 CLOSE FUEL INJECTOR CIRCUIT BY DEACTIVATING RELAY
 SEND "IMMOBILIZATION REVERSED"MESSAGE TO OWNER
 5. ANY OTHER MESSAGE ("INVALID MSG, TRY AGAIN“)
 6. END C.
LITERATURE REVIEW(Cont.2/2)
 C. Results and Observations:
Working of the three functions as seen from the owner’s
mobile phone:
 The functioning time heavily
depended on the GSM network
speed and connectivity.
16
Fig. 8. Screenshot of owner’s
mobile showing working[2]
LITERATURE REVIEW COMPARISON
TABLE
17
Sr.
No.
Paper Title Method Used Advantages Disadvantages
1. Advanced Vehicle
Security System
8051 Microcontroller If some one design anything
commercial by both arduino
and 8051, the model 8051
will be much cheaper.
Bit complex designing then
arduino.
2- Anti-Theft Vehicle
Tracking and
Immobilization System
Arduino
Microcontroller
The whole point of the
"Arduino Platform" is to
allow for easy and fast
prototyping.
Open source platform, other
limitation is accidental one.
SHORTCOMINGS
18
 Shortcomings of the system:
 It was observed that with a longer antenna, the tracking could
take place faster. For cloudy/rainy weather, it took longer to
track the vehicle.
 Even though the connectivity is now near universal, the
strength of the network differs and is weaker in rural areas.
 If the stolen vehicle is kept under a concrete cover or shade,
which will then prevent the GPS module from being able to
track it.
 If the thief is able to detect and destroy the Anti-theft module
before it can be used.
CONCLUSION
19
 Tracking system is getting to be progressively vital in expansive
urban areas and it is more secured than different frameworks.
 The advance vehicle security system is one of the essential systems
that homogenize both GPS and GSM systems.
 This framework intended for clients in transport business, provides
real-time information such as location, speed, etc.
 The main focus has been to keep this system simple and cost
effective, without compromising on its reliability.
 On an average it costs around $60 to $70 to build this module. If
implemented on a wide scale, this system will drastically reduce the
threat of vehicle theft and save vehicle owners thousands in
insurance money and other losses.
REFERENCES
20
1. Pritpal Singh, Tanjot Sethi, Bunil K. B., Bibhuti B. B., ”Advanced Vehicle
Security System” © 2015 IEEE
2. Kingshuk Mukherjee , “Anti-Theft Vehicle Tracking and Immobilization System”
©2014 IEEE
3. Ammar Yasir Korkusuz, “Security in the GSM Network”, Bogazici University,
2012
4. GSM: Security, Services, and the SIM Klaus Vedder, LNCS 1528, pp. 224-240,
Springer
5. http://resources.infosecinstitute.com/introduction-to-gsm-security/
21

More Related Content

What's hot

Gsm security
Gsm securityGsm security
Gsm security
maicuong8
 
Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8
RUpaliLohar
 
Presentation one-gsm
Presentation one-gsmPresentation one-gsm
Presentation one-gsm
Abu Sadat Mohammed Yasin
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
jyothsnapaidi
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
Naveen Kumar
 
GSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE TechnologiesGSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE TechnologiesEngr.MEESHU SHARKER
 
Rk 3 gsm network
Rk 3 gsm networkRk 3 gsm network
Rk 3 gsm network
Azri Randy
 
Total GSM Concept
Total GSM ConceptTotal GSM Concept
Total GSM Concept
Tempus Telcosys
 
GSM Introduction
GSM IntroductionGSM Introduction
GSM Introduction
Tempus Telcosys
 
GSM Technology and security impact
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impact
Ahmad Sharifi
 
Introduction to SIM and USIM
Introduction to SIM and USIMIntroduction to SIM and USIM
Introduction to SIM and USIM
Naveen Jakhar, I.T.S
 
ppt on GSM architechture
ppt on GSM architechtureppt on GSM architechture
ppt on GSM architechture
Hina Saxena
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecturesumit singh
 
3 gpp r15-5g-sim-card-definition-final
3 gpp r15-5g-sim-card-definition-final3 gpp r15-5g-sim-card-definition-final
3 gpp r15-5g-sim-card-definition-final
TRAN QUOC TUAN
 

What's hot (20)

Cryptography in GSM
Cryptography in GSMCryptography in GSM
Cryptography in GSM
 
Gsm security
Gsm securityGsm security
Gsm security
 
Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8
 
Presentation one-gsm
Presentation one-gsmPresentation one-gsm
Presentation one-gsm
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
 
GSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE TechnologiesGSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE Technologies
 
Gsm
GsmGsm
Gsm
 
Gsm Security and Attacks
Gsm Security and AttacksGsm Security and Attacks
Gsm Security and Attacks
 
Rk 3 gsm network
Rk 3 gsm networkRk 3 gsm network
Rk 3 gsm network
 
Rk 3 gsm network @guddu
Rk 3 gsm network @gudduRk 3 gsm network @guddu
Rk 3 gsm network @guddu
 
Total GSM Concept
Total GSM ConceptTotal GSM Concept
Total GSM Concept
 
GSM Introduction
GSM IntroductionGSM Introduction
GSM Introduction
 
Gsm fundamentals
Gsm fundamentalsGsm fundamentals
Gsm fundamentals
 
GSM Technology and security impact
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impact
 
Introduction to SIM and USIM
Introduction to SIM and USIMIntroduction to SIM and USIM
Introduction to SIM and USIM
 
ppt on GSM architechture
ppt on GSM architechtureppt on GSM architechture
ppt on GSM architechture
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM Architecture
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
3 gpp r15-5g-sim-card-definition-final
3 gpp r15-5g-sim-card-definition-final3 gpp r15-5g-sim-card-definition-final
3 gpp r15-5g-sim-card-definition-final
 

Viewers also liked

anti theft vehicular security system
anti theft vehicular security systemanti theft vehicular security system
anti theft vehicular security system
Akshay Gaikwad
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
balu008
 
Anti theft System 9988885480
Anti theft System 9988885480Anti theft System 9988885480
Anti theft System 9988885480
Profusion India Consulting
 
ANTI-VEHICLE TRACKING SYSTEM USING SMARTPHONE APPLICATION
ANTI-VEHICLE TRACKING SYSTEM USING SMARTPHONE APPLICATION ANTI-VEHICLE TRACKING SYSTEM USING SMARTPHONE APPLICATION
ANTI-VEHICLE TRACKING SYSTEM USING SMARTPHONE APPLICATION
DrunkenSoul
 
antivehicle theft system
antivehicle theft systemantivehicle theft system
antivehicle theft systemsuvransu das
 
auto theft Project1
auto theft Project1auto theft Project1
auto theft Project1
Akshay Gaikwad
 
EAS Retail Anti Theft Systems
EAS Retail Anti Theft Systems EAS Retail Anti Theft Systems
EAS Retail Anti Theft Systems
Profusion India Consulting
 
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionOpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
Luca Bongiorni
 
5. telecomm & network security
5. telecomm & network security5. telecomm & network security
5. telecomm & network security7wounders
 
GSM Based Anti theft system
GSM Based Anti theft systemGSM Based Anti theft system
GSM Based Anti theft system
Kshitij Rokde
 
Strategyzing big data in telco industry
Strategyzing big data in telco industryStrategyzing big data in telco industry
Strategyzing big data in telco industry
Parviz Iskhakov
 
REAL-TIME VEHICLE LOCKING AND TRACKING SYSTEM USING GSM AND GPS TECHNOLOGY-A...
REAL-TIME VEHICLE  LOCKING AND TRACKING SYSTEM USING GSM AND GPS TECHNOLOGY-A...REAL-TIME VEHICLE  LOCKING AND TRACKING SYSTEM USING GSM AND GPS TECHNOLOGY-A...
REAL-TIME VEHICLE LOCKING AND TRACKING SYSTEM USING GSM AND GPS TECHNOLOGY-A...Sandeep Kunsoth
 
Final ppt on automatic solar traking system
Final ppt on automatic solar traking systemFinal ppt on automatic solar traking system
Final ppt on automatic solar traking system
SHASHIKANT GARUD
 
anti theft alarm for bikes by vinod and venu
anti theft alarm for bikes by vinod and venuanti theft alarm for bikes by vinod and venu
anti theft alarm for bikes by vinod and venu
venu13
 
Development of anti theft security system
Development of anti theft security systemDevelopment of anti theft security system
Development of anti theft security system96452128
 

Viewers also liked (17)

anti theft vehicular security system
anti theft vehicular security systemanti theft vehicular security system
anti theft vehicular security system
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
 
Anti theft System 9988885480
Anti theft System 9988885480Anti theft System 9988885480
Anti theft System 9988885480
 
ANTI-VEHICLE TRACKING SYSTEM USING SMARTPHONE APPLICATION
ANTI-VEHICLE TRACKING SYSTEM USING SMARTPHONE APPLICATION ANTI-VEHICLE TRACKING SYSTEM USING SMARTPHONE APPLICATION
ANTI-VEHICLE TRACKING SYSTEM USING SMARTPHONE APPLICATION
 
antivehicle theft system
antivehicle theft systemantivehicle theft system
antivehicle theft system
 
auto theft Project1
auto theft Project1auto theft Project1
auto theft Project1
 
my anti t.a.s
my anti t.a.smy anti t.a.s
my anti t.a.s
 
EAS Retail Anti Theft Systems
EAS Retail Anti Theft Systems EAS Retail Anti Theft Systems
EAS Retail Anti Theft Systems
 
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionOpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
 
5. telecomm & network security
5. telecomm & network security5. telecomm & network security
5. telecomm & network security
 
GSM Based Anti theft system
GSM Based Anti theft systemGSM Based Anti theft system
GSM Based Anti theft system
 
Strategyzing big data in telco industry
Strategyzing big data in telco industryStrategyzing big data in telco industry
Strategyzing big data in telco industry
 
REAL-TIME VEHICLE LOCKING AND TRACKING SYSTEM USING GSM AND GPS TECHNOLOGY-A...
REAL-TIME VEHICLE  LOCKING AND TRACKING SYSTEM USING GSM AND GPS TECHNOLOGY-A...REAL-TIME VEHICLE  LOCKING AND TRACKING SYSTEM USING GSM AND GPS TECHNOLOGY-A...
REAL-TIME VEHICLE LOCKING AND TRACKING SYSTEM USING GSM AND GPS TECHNOLOGY-A...
 
Final ppt on automatic solar traking system
Final ppt on automatic solar traking systemFinal ppt on automatic solar traking system
Final ppt on automatic solar traking system
 
anti theft alarm for bikes by vinod and venu
anti theft alarm for bikes by vinod and venuanti theft alarm for bikes by vinod and venu
anti theft alarm for bikes by vinod and venu
 
Development of anti theft security system
Development of anti theft security systemDevelopment of anti theft security system
Development of anti theft security system
 
ANTI THEFT PPT
ANTI THEFT PPTANTI THEFT PPT
ANTI THEFT PPT
 

Similar to GSM Security

ADVANCED BIKE SECURITY SYSTEM USING GSM AND GPS
ADVANCED BIKE SECURITY SYSTEM USING GSM AND GPSADVANCED BIKE SECURITY SYSTEM USING GSM AND GPS
ADVANCED BIKE SECURITY SYSTEM USING GSM AND GPS
EG TECHNOLOGIES
 
Gsm anti theft system
Gsm anti theft systemGsm anti theft system
Gsm anti theft systemAshu0711
 
IRJET- Vehicle Security System using IoT Application
IRJET-  	  Vehicle Security System using IoT ApplicationIRJET-  	  Vehicle Security System using IoT Application
IRJET- Vehicle Security System using IoT Application
IRJET Journal
 
B1803050722
B1803050722B1803050722
B1803050722
IOSR Journals
 
Vehicle anti theft system based on an embedded
Vehicle anti theft system based on an embeddedVehicle anti theft system based on an embedded
Vehicle anti theft system based on an embedded
eSAT Publishing House
 
Vehicle anti theft system based on an embedded platform
Vehicle anti theft system based on an embedded platformVehicle anti theft system based on an embedded platform
Vehicle anti theft system based on an embedded platform
eSAT Journals
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
IJSRD
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
IJSRD
 
Design and implementation of vehicle tracking system using gps
Design and implementation of vehicle tracking system using gpsDesign and implementation of vehicle tracking system using gps
Design and implementation of vehicle tracking system using gps
Alexander Decker
 
11.design and implementation of vehicle tracking system using gps
11.design and implementation of vehicle tracking system using gps11.design and implementation of vehicle tracking system using gps
11.design and implementation of vehicle tracking system using gpsAlexander Decker
 
Anti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 finalAnti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 final
Ashu0711
 
Cm35495498
Cm35495498Cm35495498
Cm35495498
IJERA Editor
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communicationardhita banu adji
 
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint VerificationAnti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
IJAEMSJORNAL
 
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMEVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
IJNSA Journal
 
IRJET- Automative Impregnable Driving System
IRJET-  	  Automative Impregnable Driving SystemIRJET-  	  Automative Impregnable Driving System
IRJET- Automative Impregnable Driving System
IRJET Journal
 
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS Sensor
IRJET Journal
 
Vehicle tracking and locking system based on GSM and GPS
Vehicle tracking and locking system based on GSM and GPSVehicle tracking and locking system based on GSM and GPS
Vehicle tracking and locking system based on GSM and GPS
Ashutha K
 
External ppt
External pptExternal ppt
External ppt
darshangowda679
 

Similar to GSM Security (20)

ADVANCED BIKE SECURITY SYSTEM USING GSM AND GPS
ADVANCED BIKE SECURITY SYSTEM USING GSM AND GPSADVANCED BIKE SECURITY SYSTEM USING GSM AND GPS
ADVANCED BIKE SECURITY SYSTEM USING GSM AND GPS
 
Gsm anti theft system
Gsm anti theft systemGsm anti theft system
Gsm anti theft system
 
IRJET- Vehicle Security System using IoT Application
IRJET-  	  Vehicle Security System using IoT ApplicationIRJET-  	  Vehicle Security System using IoT Application
IRJET- Vehicle Security System using IoT Application
 
new Algorithm1
new Algorithm1new Algorithm1
new Algorithm1
 
B1803050722
B1803050722B1803050722
B1803050722
 
Vehicle anti theft system based on an embedded
Vehicle anti theft system based on an embeddedVehicle anti theft system based on an embedded
Vehicle anti theft system based on an embedded
 
Vehicle anti theft system based on an embedded platform
Vehicle anti theft system based on an embedded platformVehicle anti theft system based on an embedded platform
Vehicle anti theft system based on an embedded platform
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
Design and implementation of vehicle tracking system using gps
Design and implementation of vehicle tracking system using gpsDesign and implementation of vehicle tracking system using gps
Design and implementation of vehicle tracking system using gps
 
11.design and implementation of vehicle tracking system using gps
11.design and implementation of vehicle tracking system using gps11.design and implementation of vehicle tracking system using gps
11.design and implementation of vehicle tracking system using gps
 
Anti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 finalAnti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 final
 
Cm35495498
Cm35495498Cm35495498
Cm35495498
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communication
 
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint VerificationAnti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
 
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMEVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
 
IRJET- Automative Impregnable Driving System
IRJET-  	  Automative Impregnable Driving SystemIRJET-  	  Automative Impregnable Driving System
IRJET- Automative Impregnable Driving System
 
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS Sensor
 
Vehicle tracking and locking system based on GSM and GPS
Vehicle tracking and locking system based on GSM and GPSVehicle tracking and locking system based on GSM and GPS
Vehicle tracking and locking system based on GSM and GPS
 
External ppt
External pptExternal ppt
External ppt
 

More from smita gupta

Web Testing
Web TestingWeb Testing
Web Testing
smita gupta
 
Mimicking Human Brain Process
Mimicking Human Brain ProcessMimicking Human Brain Process
Mimicking Human Brain Process
smita gupta
 
Implementing Merge Sort
Implementing Merge SortImplementing Merge Sort
Implementing Merge Sort
smita gupta
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocol
smita gupta
 
Enlightening Society On The Alert
Enlightening Society On The AlertEnlightening Society On The Alert
Enlightening Society On The Alert
smita gupta
 
Distributed System Security Aspects
Distributed System Security AspectsDistributed System Security Aspects
Distributed System Security Aspects
smita gupta
 

More from smita gupta (6)

Web Testing
Web TestingWeb Testing
Web Testing
 
Mimicking Human Brain Process
Mimicking Human Brain ProcessMimicking Human Brain Process
Mimicking Human Brain Process
 
Implementing Merge Sort
Implementing Merge SortImplementing Merge Sort
Implementing Merge Sort
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocol
 
Enlightening Society On The Alert
Enlightening Society On The AlertEnlightening Society On The Alert
Enlightening Society On The Alert
 
Distributed System Security Aspects
Distributed System Security AspectsDistributed System Security Aspects
Distributed System Security Aspects
 

Recently uploaded

NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 

Recently uploaded (20)

NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 

GSM Security

  • 2. OUTLINE  INTRODUCTION  Security goals & concerns  Security mechanisms  LITERATURE REVIEW  Literature review comparison table  SHORTCOMINGS  CONCLUSION  REFERENCES 2
  • 3. INTRODUCTION 3  The acronym GSM stands for Global System for Mobile, the term "global" was preferred due to the intended adoption of this standard in every continent of the world.  GSM is a wireless communication that uses digital technology for mobile communications whose signal transmission is divided by time, mostly known as Time Division Multiple Access (TDMA).  Security Goals & Concerns :  Operators  Bills right people  Avoid fraud  Protect Services  Customers  Privacy  Anonymity
  • 4.  Four Principles of GSM Security Mechanism:  User Authentication (Ability of mobile equipment to prove that it has access to a particular account with the operator)  Ciphering of data and signal (User data are protected against interception by means of ciphering.)  Confidentiality of user data identity (TMSI is used instead of IMSI which prevents an eavesdropper from identifying of subscriber)  SIM as security module (PIN code security) IMSI: International Mobile Subscriber Identity TMSI: Temporary Mobile Subscriber Identity SECURITY MECHANISMS
  • 6. LITERATURE REVIEW(1/2) 6  Title: ”Advanced Vehicle Security System”, IEEE transaction 2015. Author: Pritpal Singh, Tanjot Sethi, Bunil K. B., Bibhuti B. B.  Objective: To design and develop an advance and robust security system for vehicles that can prevent theft and provide information on accidents.  Keywords: GPS, GSM, Tracking
  • 7. HARDWARE DESIGN(Cont.1/2) 7  (A) GSM Model: Fig. 1. System Architecture [1] Fig. 2. Block diagram for detecting thief movement[1]
  • 8. HARDWARE DESIGN(Cont.1/2) 8 Fig. 3. Block diagram for switching different systems using DTMF decoder[1]
  • 9. HARDWARE DESIGN(Cont.1/2) 9  (B) GPS Model : Fig. 4. Block diagram of GPS tracking system[1]
  • 10. RESULTS(Cont.1/2) 10 Fig. 6. MSG sent in case of accident to one of the family member[1] Fig. 5. Offline tracking of vehicle using GSM[1]
  • 11. LITERATURE REVIEW(2/2) 11  Title: “Anti-Theft Vehicle Tracking and Immobilization System ”, IEEE transaction 2014. Author: Kingshuk Mukherjee  Objective: In this paper a simple and economical solution to the problem has been presented. This scheme can be assembled and used even by private car owners and provides reasonable protection against vehicle theft.  Keywords: Anti-theft, Vehicle tracking, Immobilization
  • 12. LITERATURE REVIEW(Cont.2/2) 12  (I) Flow Chart: Fig. 7. System [2]
  • 13. LITERATURE REVIEW(Cont.2/2) 13 (I) Flow Chart (Cont..): Fig. 7. System [2]
  • 14. 14  A. Hardware implementation: The system can be broadly divided into three parts:  The GSM modem  The GPS module  The Immobilization Circuitry DESIGN & IMPLEMENTATION(Cont.)
  • 15. DESIGN & IMPLEMENTATION(Cont.) 15  B. Software implementation: The software part covers the code that has to be fed into the Arduino microcontroller. Its outline is as follows:  1. READ MSG FROM GSM MODEM  2. IF MESSAGE = "TRACK"  READ LOCATION • SEND LOCATION  3. IF MESSAGE = "IMMOBILIZE"  OPEN FUEL INJECTOR CIRCUIT BY ACTIVATING RELAY  SEND "IMMOBILIZATION SUCCESSFUL" MSG TO OWNER'S  4. IF MESSAGE = "REVERSE"  CLOSE FUEL INJECTOR CIRCUIT BY DEACTIVATING RELAY  SEND "IMMOBILIZATION REVERSED"MESSAGE TO OWNER  5. ANY OTHER MESSAGE ("INVALID MSG, TRY AGAIN“)  6. END C.
  • 16. LITERATURE REVIEW(Cont.2/2)  C. Results and Observations: Working of the three functions as seen from the owner’s mobile phone:  The functioning time heavily depended on the GSM network speed and connectivity. 16 Fig. 8. Screenshot of owner’s mobile showing working[2]
  • 17. LITERATURE REVIEW COMPARISON TABLE 17 Sr. No. Paper Title Method Used Advantages Disadvantages 1. Advanced Vehicle Security System 8051 Microcontroller If some one design anything commercial by both arduino and 8051, the model 8051 will be much cheaper. Bit complex designing then arduino. 2- Anti-Theft Vehicle Tracking and Immobilization System Arduino Microcontroller The whole point of the "Arduino Platform" is to allow for easy and fast prototyping. Open source platform, other limitation is accidental one.
  • 18. SHORTCOMINGS 18  Shortcomings of the system:  It was observed that with a longer antenna, the tracking could take place faster. For cloudy/rainy weather, it took longer to track the vehicle.  Even though the connectivity is now near universal, the strength of the network differs and is weaker in rural areas.  If the stolen vehicle is kept under a concrete cover or shade, which will then prevent the GPS module from being able to track it.  If the thief is able to detect and destroy the Anti-theft module before it can be used.
  • 19. CONCLUSION 19  Tracking system is getting to be progressively vital in expansive urban areas and it is more secured than different frameworks.  The advance vehicle security system is one of the essential systems that homogenize both GPS and GSM systems.  This framework intended for clients in transport business, provides real-time information such as location, speed, etc.  The main focus has been to keep this system simple and cost effective, without compromising on its reliability.  On an average it costs around $60 to $70 to build this module. If implemented on a wide scale, this system will drastically reduce the threat of vehicle theft and save vehicle owners thousands in insurance money and other losses.
  • 20. REFERENCES 20 1. Pritpal Singh, Tanjot Sethi, Bunil K. B., Bibhuti B. B., ”Advanced Vehicle Security System” © 2015 IEEE 2. Kingshuk Mukherjee , “Anti-Theft Vehicle Tracking and Immobilization System” ©2014 IEEE 3. Ammar Yasir Korkusuz, “Security in the GSM Network”, Bogazici University, 2012 4. GSM: Security, Services, and the SIM Klaus Vedder, LNCS 1528, pp. 224-240, Springer 5. http://resources.infosecinstitute.com/introduction-to-gsm-security/
  • 21. 21