The document discusses security mechanisms in GSM networks. It first outlines the goals of security for operators and customers. It then describes the four main security principles of GSM: user authentication, ciphering of data and signals, confidentiality of user identity, and use of the SIM as a security module. The document reviews two papers on vehicle security and anti-theft systems using GSM and GPS. It compares the papers and identifies some shortcomings of such systems, such as weaker connectivity in rural areas. Finally, it concludes the systems can help reduce vehicle theft if implemented widely.
The GSM network is comprised of the following components:
Network Elements
The GSM network incorporates a number of network elements to support mobile equipment. They are listed and described in the GSM network elements section of this chapter.
GSM subsystems
In addition, the network includes subsystems that are not formally recognized as network elements but are necessary for network operation. These are described in the GSM subsystems (non-network elements) section of this chapter.
Standardized Interfaces
GSM specifies standards for interfaces between network elements, which ensure the connectivity of GSM equipment from different manufacturers. These are listed in the Standardized interfaces section of this chapter.
Network Protocols
For most of the network communications on these interfaces, internationally recognized communications protocols have been used
These are identified in the Network protocols section of this chapter.
GSM Frequencies
The frequency allocations for GSM 900, Extended GSM and Digital Communications Systems are identified in the GSM frequencies section of this chapter.
GSM networks are digital and can cater for high system capacities. They are consistent with the world wide digitization of the telephone network, and are an extension of the Integrated Services Digital Network (ISDN), using a digital radio interface between the cellular network and the mobile subscriber equipment
The GSM system provides a greater subscriber capacity than analogue systems. GSM allows 25 kHz. Per user, that is, eight conversations per 200kHz. Channel pair (a pair comprising one transmit channel and one receive channel). Digital channel coding and the modulation used makes the signal resistant to interference from the cells where the same frequencies are re-used (co-channel interference); a Carrier to Interference Ratio (C/I) level of 9 dB is achieved, as opposed to the 18 dB typical with analogue cellular. This allows increased geographic reuse by permitting a reduction in the number of cells in the reuse pattern. Since this number is directly controlled by the amount of interference, the radio transmission design can deliver acceptable performance.
The global system for mobile communications (GSM) is a set of recommendations and specifications for a digital cellular telephone network (known as a Public Land Mobile Network, or PLMN). These recommendations ensure the compatibility of equipment from different GSM manufacturers, and interconnectivity between different administrations, including operations across international boundaries
The GSM network is comprised of the following components:
Network Elements
The GSM network incorporates a number of network elements to support mobile equipment. They are listed and described in the GSM network elements section of this chapter.
GSM subsystems
In addition, the network includes subsystems that are not formally recognized as network elements but are necessary for network operation. These are described in the GSM subsystems (non-network elements) section of this chapter.
Standardized Interfaces
GSM specifies standards for interfaces between network elements, which ensure the connectivity of GSM equipment from different manufacturers. These are listed in the Standardized interfaces section of this chapter.
Network Protocols
For most of the network communications on these interfaces, internationally recognized communications protocols have been used
These are identified in the Network protocols section of this chapter.
GSM Frequencies
The frequency allocations for GSM 900, Extended GSM and Digital Communications Systems are identified in the GSM frequencies section of this chapter.
Topics covered in this presentation:
Abbreviations
Types of Cards
SIM Card Memory Architecture
RUM-Classifications
NV Vs RUIM
PRL
USIM
UICC Vs ICC
The GSM network is comprised of the following components:
Network Elements
The GSM network incorporates a number of network elements to support mobile equipment. They are listed and described in the GSM network elements section of this chapter.
GSM subsystems
In addition, the network includes subsystems that are not formally recognized as network elements but are necessary for network operation. These are described in the GSM subsystems (non-network elements) section of this chapter.
Standardized Interfaces
GSM specifies standards for interfaces between network elements, which ensure the connectivity of GSM equipment from different manufacturers. These are listed in the Standardized interfaces section of this chapter.
Network Protocols
For most of the network communications on these interfaces, internationally recognized communications protocols have been used
These are identified in the Network protocols section of this chapter.
GSM Frequencies
The frequency allocations for GSM 900, Extended GSM and Digital Communications Systems are identified in the GSM frequencies section of this chapter.
GSM networks are digital and can cater for high system capacities. They are consistent with the world wide digitization of the telephone network, and are an extension of the Integrated Services Digital Network (ISDN), using a digital radio interface between the cellular network and the mobile subscriber equipment
The GSM system provides a greater subscriber capacity than analogue systems. GSM allows 25 kHz. Per user, that is, eight conversations per 200kHz. Channel pair (a pair comprising one transmit channel and one receive channel). Digital channel coding and the modulation used makes the signal resistant to interference from the cells where the same frequencies are re-used (co-channel interference); a Carrier to Interference Ratio (C/I) level of 9 dB is achieved, as opposed to the 18 dB typical with analogue cellular. This allows increased geographic reuse by permitting a reduction in the number of cells in the reuse pattern. Since this number is directly controlled by the amount of interference, the radio transmission design can deliver acceptable performance.
The global system for mobile communications (GSM) is a set of recommendations and specifications for a digital cellular telephone network (known as a Public Land Mobile Network, or PLMN). These recommendations ensure the compatibility of equipment from different GSM manufacturers, and interconnectivity between different administrations, including operations across international boundaries
The GSM network is comprised of the following components:
Network Elements
The GSM network incorporates a number of network elements to support mobile equipment. They are listed and described in the GSM network elements section of this chapter.
GSM subsystems
In addition, the network includes subsystems that are not formally recognized as network elements but are necessary for network operation. These are described in the GSM subsystems (non-network elements) section of this chapter.
Standardized Interfaces
GSM specifies standards for interfaces between network elements, which ensure the connectivity of GSM equipment from different manufacturers. These are listed in the Standardized interfaces section of this chapter.
Network Protocols
For most of the network communications on these interfaces, internationally recognized communications protocols have been used
These are identified in the Network protocols section of this chapter.
GSM Frequencies
The frequency allocations for GSM 900, Extended GSM and Digital Communications Systems are identified in the GSM frequencies section of this chapter.
Topics covered in this presentation:
Abbreviations
Types of Cards
SIM Card Memory Architecture
RUM-Classifications
NV Vs RUIM
PRL
USIM
UICC Vs ICC
Retailer have to deal with Shrinkage everyday. Here are few solutions that can reduce shrinkage by use of effective technology and operational controls.
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionLuca Bongiorni
Open BTS: Emergency GSM Messaging & Monitoring System for Civil Protection is proposed as a solution ready-to-deploy in the event of natural disaster, in that areas where GSM networks are temporarily down.
GSM BASED ANTI THEFT SYSTEM FOR VEHICLES
conclusion
In a situation where there is high level of theft, there is need for better security system.
It is much safer to have a System that monitors and communicates to the device owner.
This tends to utilize the availability of GSM network, mobile phone and electronics circuit to achieve an automated system which is programmed to work as a thinking device to accomplish this purpose.
Global system for mobile communication (GSM) is a wide area wireless communications system that uses digital radio transmission to provide voice, data, and multimedia communication services. A GSM system coordinates the communication between a mobile telephones (mobile stations), base stations (cell sites), and switching systems.
. The power supply provides the voltage and current required for effective performance of the system. This supply is tapped from the car battery and then regulated before being fed to the system.
i. If the system is active, it monitors both the car doors and boot to check if anyone is opened.
ii. Demobilizes the car by disconnecting the ignition line from the battery supply via the actuator .
iii. Sends text message to the car owner signifying where the attempt is made from, and finally
iv. Starts up an alarm for alert purpose.
GSM based Anti-theft system implemented on 8051 microcontroller. This is a very useful application of GSM (Group Special Mobile) and is very commonly used in vehicles. A GSM system consists of a modem. The modem acts as a modulator and demodulator for GSM signals. The relevant messages are also displayed on a computer screen.
Strategizing Big Data in Telco
Big data feels to be a very hot topic nowadays. Some industries depend on it completely, some have opportunities to roll out their strategies and execute, some just considering when it is a right time to hop in.
To my mind, Big Data is not about technology. Big data is about people generating data and data used for the benefit of people.
Big data is a pool of activities intended at processing the data a company owns (internal and external) so that to open new revenue opportunities, minimize costs and enhance UX.
I had some ideas and thoughts on what telecommunication companies may start from in formulating the Big Data Strategy and so packed some of the most important pieces of thoughts into a small presentation.
What is the difference between Small Data and Big Data?
What kind of data is used currently and which is to be relied on a new paradigm?
What kind of products are expected from telcos?
My personal ranking of operators in terms of their Big Data execution
What are the stages telcos should pass through to become a Big Data operator?
Prerequisites for Big Data transformation
Please take a look at the presentation to find answers to these questions and feel free to share your opinion.
Thanks!
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Vehicle anti theft system based on an embedded platformeSAT Journals
Abstract In modern day vehicles, vehicle anti-theft system is of prime importance. The vehicle anti-theft system presented here consists of multiple layers of protection with one complementing the other, rather than the conventional anti-theft system where a particular system is only being used. The first layer of protection in the system is a Fingerprint recognition, based on which the doors are opened. The Fingerprint matching is done by utilizing the Minutiae based Fingerprint recognition scheme. Also to prevent thieves from breaking the glass and getting inside the vehicle, vibration sensors are used in all the windows with a threshold level to prevent false alarms. Once inside, the vehicle is turned on only with the mechanical keys along with correct key number entry on the combination keypad present, failing to do so for three successive times will result in vehicle getting immobilized by cutting the fuel supply and an alert message is sent to the mobile number of the owner. Further to prevent the seizure of the vehicle, Tyre pressure sensor is also being used which also alerts the owner through a mobile message. The seized vehicle can be tracked using a GPS tracker which is also being attached. The different layers of protection defined are controlled by an ARM 7 based controller acting as the central node. The whole system was tested using a test set up by mimicking the vehicle door, vehicle immobilizer etc. with equivalent motors whereas Fingerprint data was received from Matlab based GUI application. The experimental results proved the functionality of the anti-theft system in working environment. Index Terms: Vehicle anti-theft, Fingerprint recognition, ARM 7, Immobilizer
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
In this system we have proposed to implement the technique to improve antitheft for android based mobile phones by using various services like MMS over the SMS. Today’s most popular android operating system is contains many scenarios that already been proposed that are related to anti-theft also many applications are available onto play store but these application are not so useful to find the thief e.g. GPS tracking for the devices like smart phones, tablets and phablets. We can use new technology likes Multimedia Messaging Service (MMS), which enhances the present scenario. This scenario is totally dependent on the hardware of your smart phone device that is camera (front or rear) also support for multimedia messages. First, we just need to install this software then, it work’s in the background, stores the current SIM number in a variable and keeps continuously checking for SIM change, whenever SIM gets changed from device, it will takes snapshots, record a video in the background with the use of camera of device and also records surrounding audio i.e., without taking user permission and then it will send an MMS to an alternate mobile number and an email id, which was provided during installation for authorized user’s registration. The most benefit of this application is very easy to configure and keeps running in the background without interrupting the user. To some extent it helps the authorized user to identify and find the thief.
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
In this system we have proposed to implement the technique to improve antitheft for android based mobile phones by using various services like MMS over the SMS. Today’s most popular android operating system is contains many scenarios that already been proposed that are related to anti-theft also many applications are available onto play store but these application are not so useful to find the thief e.g. GPS tracking for the devices like smart phones, tablets and phablets. We can use new technology likes Multimedia Messaging Service (MMS), which enhances the present scenario. This scenario is totally dependent on the hardware of your smart phone device that is camera (front or rear) also support for multimedia messages. First, we just need to install this software then, it work’s in the background, stores the current SIM number in a variable and keeps continuously checking for SIM change, whenever SIM gets changed from device, it will takes snapshots, record a video in the background with the use of camera of device and also records surrounding audio i.e., without taking user permission and then it will send an MMS to an alternate mobile number and an email id, which was provided during installation for authorized user’s registration. The most benefit of this application is very easy to configure and keeps running in the background without interrupting the user. To some extent it helps the authorized user to identify and find the thief.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint VerificationIJAEMSJORNAL
This paper focuses on preventing car theft using microcontrollers and GSM modules. We are generating the results with better accuracy and proficiency. It can be helpful to those people who want better and more advanced security in their vehicle.
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMIJNSA Journal
In this study security of internet access over the Third Generation (3G) telecommunication systems is considered and Universal Mobile Telecommunications System (UMTS) is selected as the most popular system among 3G systems. The study then focuses on network access security mechanism of UMTS, called Authentication and Key Agreement (AKA). In addition, twenty types of important attacks and threats in UMTS system are presented and classified based on three major security factors; authentication, confidentiality, and data integrity. The evaluations finally show that the authentication factor is more interesting than other factors for hackers. Then, we describe four attacks named; man-inthe-middle, denial of service, identity catching, and redirection as the most significant attacks against authentication mechanism. Furthermore, we provide some solutions and methods to improve AKA
mechanism and prevent these attacks in UMTS system.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
3. INTRODUCTION
3
The acronym GSM stands for Global System for Mobile, the term
"global" was preferred due to the intended adoption of this standard in
every continent of the world.
GSM is a wireless communication that uses digital technology for
mobile communications whose signal transmission is divided by time,
mostly known as Time Division Multiple Access (TDMA).
Security Goals & Concerns :
Operators
Bills right people
Avoid fraud
Protect Services
Customers
Privacy
Anonymity
4. Four Principles of GSM Security Mechanism:
User Authentication
(Ability of mobile equipment to prove that it has access to a
particular account with the operator)
Ciphering of data and signal
(User data are protected against interception by means of ciphering.)
Confidentiality of user data identity
(TMSI is used instead of IMSI which prevents an eavesdropper from
identifying of subscriber)
SIM as security module
(PIN code security)
IMSI: International Mobile Subscriber Identity
TMSI: Temporary Mobile Subscriber Identity
SECURITY MECHANISMS
6. LITERATURE REVIEW(1/2)
6
Title: ”Advanced Vehicle Security System”, IEEE
transaction 2015.
Author: Pritpal Singh, Tanjot Sethi, Bunil K. B., Bibhuti B. B.
Objective: To design and develop an advance and robust
security system for vehicles that can prevent theft and provide
information on accidents.
Keywords: GPS, GSM, Tracking
10. RESULTS(Cont.1/2)
10
Fig. 6. MSG sent in case of accident to
one of the family member[1]
Fig. 5. Offline tracking of vehicle
using GSM[1]
11. LITERATURE REVIEW(2/2)
11
Title: “Anti-Theft Vehicle Tracking and
Immobilization System ”, IEEE transaction 2014.
Author: Kingshuk Mukherjee
Objective: In this paper a simple and economical solution to
the problem has been presented. This scheme can be
assembled and used even by private car owners and provides
reasonable protection against vehicle theft.
Keywords: Anti-theft, Vehicle tracking, Immobilization
14. 14
A. Hardware implementation:
The system can be broadly divided into three parts:
The GSM modem
The GPS module
The Immobilization Circuitry
DESIGN & IMPLEMENTATION(Cont.)
15. DESIGN & IMPLEMENTATION(Cont.)
15
B. Software implementation:
The software part covers the code that has to be fed into the
Arduino microcontroller. Its outline is as follows:
1. READ MSG FROM GSM MODEM
2. IF MESSAGE = "TRACK"
READ LOCATION • SEND LOCATION
3. IF MESSAGE = "IMMOBILIZE"
OPEN FUEL INJECTOR CIRCUIT BY ACTIVATING RELAY
SEND "IMMOBILIZATION SUCCESSFUL" MSG TO OWNER'S
4. IF MESSAGE = "REVERSE"
CLOSE FUEL INJECTOR CIRCUIT BY DEACTIVATING RELAY
SEND "IMMOBILIZATION REVERSED"MESSAGE TO OWNER
5. ANY OTHER MESSAGE ("INVALID MSG, TRY AGAIN“)
6. END C.
16. LITERATURE REVIEW(Cont.2/2)
C. Results and Observations:
Working of the three functions as seen from the owner’s
mobile phone:
The functioning time heavily
depended on the GSM network
speed and connectivity.
16
Fig. 8. Screenshot of owner’s
mobile showing working[2]
17. LITERATURE REVIEW COMPARISON
TABLE
17
Sr.
No.
Paper Title Method Used Advantages Disadvantages
1. Advanced Vehicle
Security System
8051 Microcontroller If some one design anything
commercial by both arduino
and 8051, the model 8051
will be much cheaper.
Bit complex designing then
arduino.
2- Anti-Theft Vehicle
Tracking and
Immobilization System
Arduino
Microcontroller
The whole point of the
"Arduino Platform" is to
allow for easy and fast
prototyping.
Open source platform, other
limitation is accidental one.
18. SHORTCOMINGS
18
Shortcomings of the system:
It was observed that with a longer antenna, the tracking could
take place faster. For cloudy/rainy weather, it took longer to
track the vehicle.
Even though the connectivity is now near universal, the
strength of the network differs and is weaker in rural areas.
If the stolen vehicle is kept under a concrete cover or shade,
which will then prevent the GPS module from being able to
track it.
If the thief is able to detect and destroy the Anti-theft module
before it can be used.
19. CONCLUSION
19
Tracking system is getting to be progressively vital in expansive
urban areas and it is more secured than different frameworks.
The advance vehicle security system is one of the essential systems
that homogenize both GPS and GSM systems.
This framework intended for clients in transport business, provides
real-time information such as location, speed, etc.
The main focus has been to keep this system simple and cost
effective, without compromising on its reliability.
On an average it costs around $60 to $70 to build this module. If
implemented on a wide scale, this system will drastically reduce the
threat of vehicle theft and save vehicle owners thousands in
insurance money and other losses.