SlideShare a Scribd company logo
1 of 18
APPROACHES TO PREVENT CELL PHONE
CLONING IN CDMA
ENVIRONMENT
ANISHA JOHNY
S7 CS A
RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY,KAKKANAD
12/13/2015
1
Introduction
 The rapid growth of mobile communication has changed the vision of cellular phones
security.
 An easy accessibility condition causes cellular phones to be vulnerable against
numerous and potentially devastating threats from hackers.
 In this seminar I presents an overview of cellular phones security based upon CDMA
technology specially on cell phone cloning.
12/13/2015 2
CDMA ???
12/13/2015 3
CDMA Technology
 CDMA- Code Division Multiple Access :uses spread spectrum technique.
 Enables many wireless devices to transmit at the same time and on the same frequency.
 2G and 3G mobile telecommunications standard.
 Developed by Qualcomm. Service providers in India are Reliance Telecom and Tata
Indicom
 Utilized to send and receive voice transmission, data transmission and various other
types signalling managements.
 Working: unique precise identity
12/13/2015 4
Advantages of CDMA Technology
 Phone call clarity is better.
 Call rates are low as in comparison with existing GSM technology.
 Well matched with other cellular technologies
 Helpful in national and international roaming.
 Prevents interference and destruction of service caused due to multipath
 Engages in Soft hand-off 12/13/2015 5
Disadvantages of CDMA Technology
 Security flaws:
 Cell phone tracking and interception is easier.
 A cell phone can be turned on without the knowledge of customer.
 A cell phone can be cloned by anybody so that one pretend himself
to be genuine.
 Phones cannot be swapped
12/13/2015 6
Cell phone working
 When a call is done through cell phone four important components
are transmitted:
 Radio frequencies with the help of two separate channels one for
voice and another for control signalling information.
 Electronic Serial Number (ESN)
 Mobile Identification Number(MIN)
 Station Class mark(SCM)
12/13/2015 7
Cell phone working(Cont..)
 After receiving this ESN and MIN, cell service provider verifies them
with their genuine subscriber list.
 If this pair is genuine then a control signal is generated and permits the
customer to make the call.
 The successfully registering this way is known as Anonymous
Registration.
12/13/2015 8
Cell Phone Cloning ???
12/13/2015 9
Cell Phone Cloning
 Cell phone cloning is copying the identity of one mobile phone to another mobile
phone.
 Process of taking the programmed information that is stored in a legitimate mobile
phone and illegally programming the identical information into another mobile
phone.
 Thus, "cloned" phone can make and receive anonymous calls and the charges for
those calls are billed to the legitimate subscriber.
 The service provider network does not have a way to differentiate between the
legitimate phone and the "cloned" phone.
12/13/2015 10
Cloning methodology
 Alteration of EPROM that help to configure ESN/MIN via software
 By sniffing or hacking cell phone service provider, ESN/MIN data is retrieved by hackers
during anonymous registration. These are used to make calls by cloner even while the
actual user makes a call.
 Number Assignment Module(NAM): It’s the EPROM which stores ESN and MIN. NAM
characteristics is cloned during a call
 Station Class Mark(SCM)
 System IDentification for Home System(SIDH): Part of NAM module that can be
changed to decide where the billing has to be forwarded.12/13/2015 11
Preventive Measures
 Operator knows if there is same ESN/MIN combinations are traced from
different places. If so happens operator should switch off all phones having
same pairs.
 Frequent checking of monthly bills
 Distance is another important factor to identify threats.
 Radio Frequency Fingerprinting(RFF)
 Cellular Authentication and Voice Encryption(CAVE) security protocols
12/13/2015 12
Preventive Measures(Cont..)
 Try to avoid cell phones in busy traffic areas because there is a chance of monitoring calls
by hackers using a scanner , which registers the frequency in which mobile phones operate
in its immediate surroundings.
 User authentication using Personal Identification Number(PIN): secret numeric password
between user and MSC.
 Pattern recognition techniques: used to classify the cell phone according to their usage logs.
Such logs contain the relevant characteristics for every call made by the user. From this, it
is easier to identify if a call does not correspond to the patterns of a specific user .
 Pattern Recognition techniques are used by the Mat Lab tool employment.
12/13/2015
13
Preventive Measures(Cont..)
 Advices for subscribers as a sign of caution includes:
 Difficulty in placing outgoing calls
 Difficulty in retrieving voice mail messages
 Incoming calls constantly receiving busy signals or wrong numbers
 Frequent wrong number phone calls
 Unusual calls appearing on phone bills
12/13/2015 14
Conclusion
 Existing cellular systems have a number of potential weaknesses that need to be
considered.
 Awareness and a few sensible precautions will stop these criminal activities to an
extent.
 Keep in mind that technique which is safe today can be the most unsecured one
in future
 So it’s important to check function of a security system once a year and update it
or replace it
12/13/2015 15
References
 International Journal of Computer Applications(0975-8887), Volume 45-No.21,May 2012
 International Journal of advances in computing & communications, Volume 1, 2013
 Murphy, C. (2009). The fraternal clone method for CDMA cell phones. Small Scale Digital
DeviceForensicsJournal, 3(1). Available from
http://www.ssddfj.org/papers/SSDDFJ_V3_1_Murphy.pdf.
 Chris Bennett, Challenges of Mobile Security, SearchCIO.com, TechTarget, December 17,
2003
 Spread spectrum access methods for wireless communications. R. Kohno, R. Meidan, and L.
Milstein, IEEE Communication Magazine, Jan. 1995.
12/13/2015 16
Thank You!!!
12/13/2015 17
Questions???
12/13/2015 18

More Related Content

What's hot

52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comchrist university
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloningAnkur Kumar
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning sorabh2312
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning pptHema Sharma
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technologyRhithu
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloningGudia Khan
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarRitik Nagar
 

What's hot (20)

52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 

Viewers also liked

Deploying to Ubuntu on Linode
Deploying to Ubuntu on LinodeDeploying to Ubuntu on Linode
Deploying to Ubuntu on LinodeWO Community
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 
Linux administration
Linux administrationLinux administration
Linux administrationYogesh Ks
 
Communicating in Today's Workplace
Communicating in Today's WorkplaceCommunicating in Today's Workplace
Communicating in Today's WorkplaceSteve Wise
 
Basic command ppt
Basic command pptBasic command ppt
Basic command pptRohit Kumar
 
Linux Administration
Linux AdministrationLinux Administration
Linux AdministrationHarish1983
 
An Introduction to Linux
An Introduction to LinuxAn Introduction to Linux
An Introduction to Linuxanandvaidya
 
Effective communication in the workplace
Effective communication in the workplaceEffective communication in the workplace
Effective communication in the workplaceDavid Giard
 
Linux command ppt
Linux command pptLinux command ppt
Linux command pptkalyanineve
 
Linux.ppt
Linux.ppt Linux.ppt
Linux.ppt onu9
 

Viewers also liked (18)

Zoho Mail On Linode
Zoho Mail On LinodeZoho Mail On Linode
Zoho Mail On Linode
 
Deploying to Ubuntu on Linode
Deploying to Ubuntu on LinodeDeploying to Ubuntu on Linode
Deploying to Ubuntu on Linode
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Secure SHell
Secure SHellSecure SHell
Secure SHell
 
Linux administration
Linux administrationLinux administration
Linux administration
 
3D internet
3D  internet3D  internet
3D internet
 
SSH - Secure Shell
SSH - Secure ShellSSH - Secure Shell
SSH - Secure Shell
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
Communicating in Today's Workplace
Communicating in Today's WorkplaceCommunicating in Today's Workplace
Communicating in Today's Workplace
 
3D Internet
3D Internet 3D Internet
3D Internet
 
Basic command ppt
Basic command pptBasic command ppt
Basic command ppt
 
Linux Administration
Linux AdministrationLinux Administration
Linux Administration
 
An Introduction to Linux
An Introduction to LinuxAn Introduction to Linux
An Introduction to Linux
 
Effective communication in the workplace
Effective communication in the workplaceEffective communication in the workplace
Effective communication in the workplace
 
Linux command ppt
Linux command pptLinux command ppt
Linux command ppt
 
Linux.ppt
Linux.ppt Linux.ppt
Linux.ppt
 
Architecture Of The Linux Kernel
Architecture Of The Linux KernelArchitecture Of The Linux Kernel
Architecture Of The Linux Kernel
 

Similar to MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT

mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communicationardhita banu adji
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)RaniPatil11
 
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseJ.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseDroidcon Berlin
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...IJCSEIT Journal
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a surveyIAEME Publication
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
All the 12 Payment Enabling  Technologies & 54  Illustrative CompaniesAll the 12 Payment Enabling  Technologies & 54  Illustrative Companies
All the 12 Payment Enabling Technologies & 54 Illustrative CompaniesMEDICI admin
 

Similar to MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT (17)

mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Test
TestTest
Test
 
new Algorithm1
new Algorithm1new Algorithm1
new Algorithm1
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communication
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseJ.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
 
Security issues in_mobile_payment
Security issues in_mobile_paymentSecurity issues in_mobile_payment
Security issues in_mobile_payment
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a survey
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Method to Provide Mobile Signal when the Network Provider Has Failed
Method to Provide Mobile Signal when the Network Provider Has FailedMethod to Provide Mobile Signal when the Network Provider Has Failed
Method to Provide Mobile Signal when the Network Provider Has Failed
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
All the 12 Payment Enabling  Technologies & 54  Illustrative CompaniesAll the 12 Payment Enabling  Technologies & 54  Illustrative Companies
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 

MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT

  • 1. APPROACHES TO PREVENT CELL PHONE CLONING IN CDMA ENVIRONMENT ANISHA JOHNY S7 CS A RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY,KAKKANAD 12/13/2015 1
  • 2. Introduction  The rapid growth of mobile communication has changed the vision of cellular phones security.  An easy accessibility condition causes cellular phones to be vulnerable against numerous and potentially devastating threats from hackers.  In this seminar I presents an overview of cellular phones security based upon CDMA technology specially on cell phone cloning. 12/13/2015 2
  • 4. CDMA Technology  CDMA- Code Division Multiple Access :uses spread spectrum technique.  Enables many wireless devices to transmit at the same time and on the same frequency.  2G and 3G mobile telecommunications standard.  Developed by Qualcomm. Service providers in India are Reliance Telecom and Tata Indicom  Utilized to send and receive voice transmission, data transmission and various other types signalling managements.  Working: unique precise identity 12/13/2015 4
  • 5. Advantages of CDMA Technology  Phone call clarity is better.  Call rates are low as in comparison with existing GSM technology.  Well matched with other cellular technologies  Helpful in national and international roaming.  Prevents interference and destruction of service caused due to multipath  Engages in Soft hand-off 12/13/2015 5
  • 6. Disadvantages of CDMA Technology  Security flaws:  Cell phone tracking and interception is easier.  A cell phone can be turned on without the knowledge of customer.  A cell phone can be cloned by anybody so that one pretend himself to be genuine.  Phones cannot be swapped 12/13/2015 6
  • 7. Cell phone working  When a call is done through cell phone four important components are transmitted:  Radio frequencies with the help of two separate channels one for voice and another for control signalling information.  Electronic Serial Number (ESN)  Mobile Identification Number(MIN)  Station Class mark(SCM) 12/13/2015 7
  • 8. Cell phone working(Cont..)  After receiving this ESN and MIN, cell service provider verifies them with their genuine subscriber list.  If this pair is genuine then a control signal is generated and permits the customer to make the call.  The successfully registering this way is known as Anonymous Registration. 12/13/2015 8
  • 9. Cell Phone Cloning ??? 12/13/2015 9
  • 10. Cell Phone Cloning  Cell phone cloning is copying the identity of one mobile phone to another mobile phone.  Process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone.  Thus, "cloned" phone can make and receive anonymous calls and the charges for those calls are billed to the legitimate subscriber.  The service provider network does not have a way to differentiate between the legitimate phone and the "cloned" phone. 12/13/2015 10
  • 11. Cloning methodology  Alteration of EPROM that help to configure ESN/MIN via software  By sniffing or hacking cell phone service provider, ESN/MIN data is retrieved by hackers during anonymous registration. These are used to make calls by cloner even while the actual user makes a call.  Number Assignment Module(NAM): It’s the EPROM which stores ESN and MIN. NAM characteristics is cloned during a call  Station Class Mark(SCM)  System IDentification for Home System(SIDH): Part of NAM module that can be changed to decide where the billing has to be forwarded.12/13/2015 11
  • 12. Preventive Measures  Operator knows if there is same ESN/MIN combinations are traced from different places. If so happens operator should switch off all phones having same pairs.  Frequent checking of monthly bills  Distance is another important factor to identify threats.  Radio Frequency Fingerprinting(RFF)  Cellular Authentication and Voice Encryption(CAVE) security protocols 12/13/2015 12
  • 13. Preventive Measures(Cont..)  Try to avoid cell phones in busy traffic areas because there is a chance of monitoring calls by hackers using a scanner , which registers the frequency in which mobile phones operate in its immediate surroundings.  User authentication using Personal Identification Number(PIN): secret numeric password between user and MSC.  Pattern recognition techniques: used to classify the cell phone according to their usage logs. Such logs contain the relevant characteristics for every call made by the user. From this, it is easier to identify if a call does not correspond to the patterns of a specific user .  Pattern Recognition techniques are used by the Mat Lab tool employment. 12/13/2015 13
  • 14. Preventive Measures(Cont..)  Advices for subscribers as a sign of caution includes:  Difficulty in placing outgoing calls  Difficulty in retrieving voice mail messages  Incoming calls constantly receiving busy signals or wrong numbers  Frequent wrong number phone calls  Unusual calls appearing on phone bills 12/13/2015 14
  • 15. Conclusion  Existing cellular systems have a number of potential weaknesses that need to be considered.  Awareness and a few sensible precautions will stop these criminal activities to an extent.  Keep in mind that technique which is safe today can be the most unsecured one in future  So it’s important to check function of a security system once a year and update it or replace it 12/13/2015 15
  • 16. References  International Journal of Computer Applications(0975-8887), Volume 45-No.21,May 2012  International Journal of advances in computing & communications, Volume 1, 2013  Murphy, C. (2009). The fraternal clone method for CDMA cell phones. Small Scale Digital DeviceForensicsJournal, 3(1). Available from http://www.ssddfj.org/papers/SSDDFJ_V3_1_Murphy.pdf.  Chris Bennett, Challenges of Mobile Security, SearchCIO.com, TechTarget, December 17, 2003  Spread spectrum access methods for wireless communications. R. Kohno, R. Meidan, and L. Milstein, IEEE Communication Magazine, Jan. 1995. 12/13/2015 16