SlideShare a Scribd company logo
1 of 16
A PRESENTATION ON
GSM Subscriber Identity Module (SIM) Card
By
Ekansh Agarwal (J001)
Rajat Dixit (J014)
(MBA TECH EXTC, Sem IV)
CONTENTS
1. Evolution of SIM
2. Role of SIM
3. Components
4. Functions
5. Security Features
6. Disadvantages
1. Evolution of SIM
● When the SIM card was invented in 1991, it was having a size of 1FF, which then shrank to a
size of 2FF called as mini SIM, then to 3FF or micro SIM and now to nano SIM with a 4FF size
3
2. Role of SIM
● A SIM holds all the information required to identify a particular subscription to a
mobile service.
● Each GSM subscriber is issued a SIM card by the operator, which can be seen as
the subscriber’s “key” to the network
● The SIM is inserted into the mobile terminal and the customer goes through a
secure process in order to log onto the network.
4
3. Components
● Central Processing Unit (CPU)
○ The CPU is the “intelligence” of the chip and performs all the
mathematical calculations and takes all the decisions required by
the SIM
● Read Only Memory (ROM)
○ ROM stores the operating system and the GSM specific algorithms
○ Contents of the ROM shall be created as part of the silicon
manufacturing process
● Random Access Memory (RAM)
○ It is used to store temporary system flags, to buffer incoming data
and as a scratch pad for calculations
● Electrically Erasable Programmable ROM (EEPROM)
○ EEPROM memory stores all of the application data such as the
Operator specific parameters and the subscriber data.
○ This information is retained even after the power is turned off and
can be modified or erased using specific electrical signals.
5
Fig.: Architecture of SIM
4. Functions of SIM Card
1. Access Control
2. Customization
3. Service Personalization
4. Network Branding and Advertising
5. Value addition in operator services
6
1. Access Control to the Network
1. Local access control
a. identity of the cardholder being an authorized user is achieved through a PIN
(Personal Identity Number) checking procedure without transmission on the
radio interface
b. subscriber presents to the SIM (via the handset) a four to eight digit no. which
is known only to the subscriber
c. SIM shall check the presented value against that, held in its secure memory
2. Network access control
a. This is where the card proves to the GSM network that it is valid for use
7
2. Customization
It shall be possible to customize the SIM card for the services to be provided by DTO.
SIM shall be capable of storing the following minimum inputs for customization:
• International Mobile Subscriber Identity (IMSI)
• Integrated Circuit Card Identification (ICC id)
• Subscriber Authentication Key (Ki)
• Personal Identification Number- 1 (PIN-1)
• Personal Identification Number- 2 (PIN-2)
• PIN Unblocking Key-1 (PUK-1)
• PIN Unblocking Key-2 (PUK-2)
8
3. Service Personalization
The SIM shall also act as a portable data storage device. SIM shall be able to support following:
● Electrical Personalization: To authenticate the chip, it shall load the customized executable
program and initialize the data in the files.
● Geographical card Personalization: For printing cardholder related data on the card body.
4. Network Branding and Advertising
For the purpose of advertising and network branding of IMPCS network, it shall be possible to print
artwork containing DTO logo and other network related information on SIM card with high
precision and quality.
9
5. Value addition in operator services
● The SIM card shall also be able to provide a platform based on GSM standards 11.14 for SIM
Tool Kit to facilitate launching of various value added interactive services like Mobile Banking,
Tele-ticketing, Over-the-air modifications, Over the air charging (OTAC) etc. as per market
demand and marketing ideas.
● SIM Tool Kit (STK) compatibility shall be provided as an option for SIM card 16K and above.
10
5. Security Features
5.1 Authentication
The card security shall be based on two types of authentication
● Passive Authentication
○ comprise of password presentation as per ISO guidelines and verifying secret codes
○ SIM card shall support seven passive authentication passwords, which consist of two user's secret code called PINs &
three Administrative Secret Codes (ADM)
○ User secret codes shall have their own unblocking secret codes called PUK (PIN unblocking key) as per GSM
standards
● Active Authentication
○ Active Authentication shall comprise of Key presentation as per ISO guidelines. It shall provide total transparent
means for verification that both the card and the network have the same secret key. There shall be two types of active
authentication
■ Internal authentication which verify the genuineness of the card registered in the network
■ External authentication ensures that an application has the right of access to certain highly sensitive files.
11
5.2 Network Security
The SIM card shall provide features required for authenticating itself to the GSM network and generating the keys
used to cipher the calls. These features should comprise of certain keys and algorithms
5.2.1 Algorithms and processes
Following algorithms shall be supported by the SIM:
● Algorithm A3 to authenticate the MS to the network
● Algorithm A8 to generate the encryption key
❏ These algorithms may exist either discretely or combined (into Comp 128) with in the SIM. In either case the
output on the SIM-ME interface shall be 12 bytes.
❏ The inputs to both A3 and A8, or Comp 128 are Ki (128 bits) internally derived in the SIM, and RAND across the
SIM/ME interface.
❏ The output shall be SRES (32 bits)/Kc (64 bits) the coding of which is defined in the command RUN GSM
ALGORITHM in clause 9 of GSM 11.11
12
5.3 Additional security features
Following additional security features that shall be available in the SIM card are described below:
● Additional Elementary files (EF) created inside the card shall be managed as per GSM 11.11 recommendations. As
security policy depends on GSM operator needs, three states shall be made available for accessing data from the external
world:
○ - Under no condition
○ - Under secret code control (PIN code, or administrative secret code)
● Unique serial number to avoid card cloning
● “Inhibition systems” to prevent any power value out of range of the specification: Clock frequency, power supply value.
● Read/Update access to EEPROM 100% controlled by ROM software and issuer application.
5.4 Anti tear mechanism
Card shall have anti tear mechanism to prevent SIM data damage during accidental voltage cut off (battery failures, battery pull
out without switch off etc.)
13
6. Disadvantages
● The per-unit charge on roaming calls is higher in GSM than in CDMA.
● Calls made through GSM mobiles can be tampered.
● If the SIM gets lost, one can lose all the data, if the same is not saved in the phone.
14
References
1. https://www.tec.gov.in/pdf/GRMT/TEC-GR-WS-SIM-002-01-OCT-04.pdf
1. D. G. Koshy and S. N. Rao, "Evolution of SIM Cards – What's Next?," 2018
International Conference on Advances in Computing, Communications and
Informatics (ICACCI), 2018, pp. 1963-1967
THANK YOU !!!
16

More Related Content

What's hot

Mobility Management
Mobility ManagementMobility Management
Mobility ManagementHira Shaukat
 
Gigabit Ethernet
Gigabit EthernetGigabit Ethernet
Gigabit EthernetManasa K
 
Cellular network
Cellular networkCellular network
Cellular networkshreb
 
e-Sim Sharing (extract)
e-Sim Sharing (extract)e-Sim Sharing (extract)
e-Sim Sharing (extract)BearingPoint
 
Microcontoller and Embedded System
Microcontoller and Embedded SystemMicrocontoller and Embedded System
Microcontoller and Embedded SystemKaran Thakkar
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTbabuece
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)Respa Peter
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communicationMuhammad Uzair Rasheed
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3Nil Menon
 
Mobile communication
Mobile communicationMobile communication
Mobile communicationsourabh kant
 

What's hot (20)

Mobility Management
Mobility ManagementMobility Management
Mobility Management
 
Gigabit Ethernet
Gigabit EthernetGigabit Ethernet
Gigabit Ethernet
 
clone sim card
clone sim cardclone sim card
clone sim card
 
Mobile Data Networks
Mobile Data NetworksMobile Data Networks
Mobile Data Networks
 
Cellular network
Cellular networkCellular network
Cellular network
 
Zigbee
ZigbeeZigbee
Zigbee
 
e-Sim Sharing (extract)
e-Sim Sharing (extract)e-Sim Sharing (extract)
e-Sim Sharing (extract)
 
Ipv4
Ipv4Ipv4
Ipv4
 
Microcontoller and Embedded System
Microcontoller and Embedded SystemMicrocontoller and Embedded System
Microcontoller and Embedded System
 
3 g and 4g final ppt
3 g and 4g final ppt3 g and 4g final ppt
3 g and 4g final ppt
 
GSM Technology
GSM TechnologyGSM Technology
GSM Technology
 
IMS Presentation
IMS PresentationIMS Presentation
IMS Presentation
 
Edge technology
Edge technologyEdge technology
Edge technology
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
VTP
VTPVTP
VTP
 
Mobile communication
Mobile communicationMobile communication
Mobile communication
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 

Similar to Presentation SIM CARD (GSM)

Mobile and SIM Forensics
Mobile and SIM ForensicsMobile and SIM Forensics
Mobile and SIM ForensicsYugal Pathak
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEntel
 
Introduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & GatewaysIntroduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & Gatewaystawi123
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communicationardhita banu adji
 
Gsm anti theft
Gsm anti theftGsm anti theft
Gsm anti theftAshu0711
 
Project ppt
Project pptProject ppt
Project pptAshu0711
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET Journal
 
Gsm security by usman zulfqar
Gsm security by usman zulfqarGsm security by usman zulfqar
Gsm security by usman zulfqarusman zulfqar
 
Roamly Mobile - SIM Overlay Overview
Roamly Mobile - SIM Overlay OverviewRoamly Mobile - SIM Overlay Overview
Roamly Mobile - SIM Overlay OverviewRobert Bent
 
Smart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMSmart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMIRJET Journal
 
GSM BASED THEFT DETECTED ALERT SYSTEM
GSM BASED THEFT DETECTED ALERT SYSTEMGSM BASED THEFT DETECTED ALERT SYSTEM
GSM BASED THEFT DETECTED ALERT SYSTEMFAIZAN SHAFI
 
Coral gsm cdma gateway
Coral gsm cdma gatewayCoral gsm cdma gateway
Coral gsm cdma gatewayMohd Arif
 
Iirdem implementation of smart homes and industrial automation system with se...
Iirdem implementation of smart homes and industrial automation system with se...Iirdem implementation of smart homes and industrial automation system with se...
Iirdem implementation of smart homes and industrial automation system with se...Iaetsd Iaetsd
 
Internet of things security multilayered method for end to end data communi...
Internet of things security   multilayered method for end to end data communi...Internet of things security   multilayered method for end to end data communi...
Internet of things security multilayered method for end to end data communi...Akash AR
 

Similar to Presentation SIM CARD (GSM) (20)

Mobile and SIM Forensics
Mobile and SIM ForensicsMobile and SIM Forensics
Mobile and SIM Forensics
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
 
Introduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & GatewaysIntroduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & Gateways
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communication
 
Gsm anti theft
Gsm anti theftGsm anti theft
Gsm anti theft
 
new Algorithm1
new Algorithm1new Algorithm1
new Algorithm1
 
GSM Introduction
GSM IntroductionGSM Introduction
GSM Introduction
 
Smart card
Smart cardSmart card
Smart card
 
Project ppt
Project pptProject ppt
Project ppt
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
 
Gsm security by usman zulfqar
Gsm security by usman zulfqarGsm security by usman zulfqar
Gsm security by usman zulfqar
 
GSM Report_2013
GSM Report_2013GSM Report_2013
GSM Report_2013
 
GSM Report_2013
GSM Report_2013GSM Report_2013
GSM Report_2013
 
G3602050055
G3602050055G3602050055
G3602050055
 
Roamly Mobile - SIM Overlay Overview
Roamly Mobile - SIM Overlay OverviewRoamly Mobile - SIM Overlay Overview
Roamly Mobile - SIM Overlay Overview
 
Smart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMSmart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSM
 
GSM BASED THEFT DETECTED ALERT SYSTEM
GSM BASED THEFT DETECTED ALERT SYSTEMGSM BASED THEFT DETECTED ALERT SYSTEM
GSM BASED THEFT DETECTED ALERT SYSTEM
 
Coral gsm cdma gateway
Coral gsm cdma gatewayCoral gsm cdma gateway
Coral gsm cdma gateway
 
Iirdem implementation of smart homes and industrial automation system with se...
Iirdem implementation of smart homes and industrial automation system with se...Iirdem implementation of smart homes and industrial automation system with se...
Iirdem implementation of smart homes and industrial automation system with se...
 
Internet of things security multilayered method for end to end data communi...
Internet of things security   multilayered method for end to end data communi...Internet of things security   multilayered method for end to end data communi...
Internet of things security multilayered method for end to end data communi...
 

More from Ekansh Agarwal

Business - Model Canvas by Ekansh Agarwal
Business - Model Canvas by Ekansh AgarwalBusiness - Model Canvas by Ekansh Agarwal
Business - Model Canvas by Ekansh AgarwalEkansh Agarwal
 
Maruti Suzuki- Making Automobile Accessible
Maruti Suzuki- Making Automobile AccessibleMaruti Suzuki- Making Automobile Accessible
Maruti Suzuki- Making Automobile AccessibleEkansh Agarwal
 
An Empirical Analysis of Disney+ Hotstar's Market-Specific Strategies Across ...
An Empirical Analysis of Disney+ Hotstar's Market-Specific Strategies Across ...An Empirical Analysis of Disney+ Hotstar's Market-Specific Strategies Across ...
An Empirical Analysis of Disney+ Hotstar's Market-Specific Strategies Across ...Ekansh Agarwal
 
Organizational Culture
Organizational Culture Organizational Culture
Organizational Culture Ekansh Agarwal
 
Business market communication research on HCL technologies India
Business market communication research on HCL technologies IndiaBusiness market communication research on HCL technologies India
Business market communication research on HCL technologies IndiaEkansh Agarwal
 
Online File storage system using RSA and 3DES
Online File storage system using RSA and 3DESOnline File storage system using RSA and 3DES
Online File storage system using RSA and 3DESEkansh Agarwal
 
Data transmission using hybrid cryptography with code
Data transmission using hybrid cryptography with codeData transmission using hybrid cryptography with code
Data transmission using hybrid cryptography with codeEkansh Agarwal
 
Trademark logo submission
Trademark logo submissionTrademark logo submission
Trademark logo submissionEkansh Agarwal
 
Pernod Ricard India Private Limited v. Frost Falcon Distilleries Limited by E...
Pernod Ricard India Private Limited v. Frost Falcon Distilleries Limited by E...Pernod Ricard India Private Limited v. Frost Falcon Distilleries Limited by E...
Pernod Ricard India Private Limited v. Frost Falcon Distilleries Limited by E...Ekansh Agarwal
 
Medical appplication of Fiber optics
Medical appplication of Fiber opticsMedical appplication of Fiber optics
Medical appplication of Fiber opticsEkansh Agarwal
 
A study on Robotic Process Automation in network management process and its a...
A study on Robotic Process Automation in network management process and its a...A study on Robotic Process Automation in network management process and its a...
A study on Robotic Process Automation in network management process and its a...Ekansh Agarwal
 
Superstitions in India
Superstitions in IndiaSuperstitions in India
Superstitions in IndiaEkansh Agarwal
 
Analysis of cost: Concept of economics
Analysis of cost: Concept of economicsAnalysis of cost: Concept of economics
Analysis of cost: Concept of economicsEkansh Agarwal
 
case study of solid waste management in Austria
case study of solid waste management in Austriacase study of solid waste management in Austria
case study of solid waste management in AustriaEkansh Agarwal
 
Development of solar tracking system using imc pid controller
Development of solar tracking system using imc pid controllerDevelopment of solar tracking system using imc pid controller
Development of solar tracking system using imc pid controllerEkansh Agarwal
 
A PRESENTATION ON Simulation Home automation System using Proteus and Arduino...
A PRESENTATION ON Simulation Home automation System using Proteus and Arduino...A PRESENTATION ON Simulation Home automation System using Proteus and Arduino...
A PRESENTATION ON Simulation Home automation System using Proteus and Arduino...Ekansh Agarwal
 
Huffman Algorithm and its Application by Ekansh Agarwal
Huffman Algorithm and its Application by Ekansh AgarwalHuffman Algorithm and its Application by Ekansh Agarwal
Huffman Algorithm and its Application by Ekansh AgarwalEkansh Agarwal
 

More from Ekansh Agarwal (20)

Business - Model Canvas by Ekansh Agarwal
Business - Model Canvas by Ekansh AgarwalBusiness - Model Canvas by Ekansh Agarwal
Business - Model Canvas by Ekansh Agarwal
 
Maruti Suzuki- Making Automobile Accessible
Maruti Suzuki- Making Automobile AccessibleMaruti Suzuki- Making Automobile Accessible
Maruti Suzuki- Making Automobile Accessible
 
An Empirical Analysis of Disney+ Hotstar's Market-Specific Strategies Across ...
An Empirical Analysis of Disney+ Hotstar's Market-Specific Strategies Across ...An Empirical Analysis of Disney+ Hotstar's Market-Specific Strategies Across ...
An Empirical Analysis of Disney+ Hotstar's Market-Specific Strategies Across ...
 
Organizational Culture
Organizational Culture Organizational Culture
Organizational Culture
 
Business market communication research on HCL technologies India
Business market communication research on HCL technologies IndiaBusiness market communication research on HCL technologies India
Business market communication research on HCL technologies India
 
Online File storage system using RSA and 3DES
Online File storage system using RSA and 3DESOnline File storage system using RSA and 3DES
Online File storage system using RSA and 3DES
 
Data transmission using hybrid cryptography with code
Data transmission using hybrid cryptography with codeData transmission using hybrid cryptography with code
Data transmission using hybrid cryptography with code
 
Email Etiquettes
Email EtiquettesEmail Etiquettes
Email Etiquettes
 
Digital Marketing
Digital MarketingDigital Marketing
Digital Marketing
 
Trademark logo submission
Trademark logo submissionTrademark logo submission
Trademark logo submission
 
Pernod Ricard India Private Limited v. Frost Falcon Distilleries Limited by E...
Pernod Ricard India Private Limited v. Frost Falcon Distilleries Limited by E...Pernod Ricard India Private Limited v. Frost Falcon Distilleries Limited by E...
Pernod Ricard India Private Limited v. Frost Falcon Distilleries Limited by E...
 
Medical appplication of Fiber optics
Medical appplication of Fiber opticsMedical appplication of Fiber optics
Medical appplication of Fiber optics
 
A study on Robotic Process Automation in network management process and its a...
A study on Robotic Process Automation in network management process and its a...A study on Robotic Process Automation in network management process and its a...
A study on Robotic Process Automation in network management process and its a...
 
Superstitions in India
Superstitions in IndiaSuperstitions in India
Superstitions in India
 
GPRS architecture
GPRS architectureGPRS architecture
GPRS architecture
 
Analysis of cost: Concept of economics
Analysis of cost: Concept of economicsAnalysis of cost: Concept of economics
Analysis of cost: Concept of economics
 
case study of solid waste management in Austria
case study of solid waste management in Austriacase study of solid waste management in Austria
case study of solid waste management in Austria
 
Development of solar tracking system using imc pid controller
Development of solar tracking system using imc pid controllerDevelopment of solar tracking system using imc pid controller
Development of solar tracking system using imc pid controller
 
A PRESENTATION ON Simulation Home automation System using Proteus and Arduino...
A PRESENTATION ON Simulation Home automation System using Proteus and Arduino...A PRESENTATION ON Simulation Home automation System using Proteus and Arduino...
A PRESENTATION ON Simulation Home automation System using Proteus and Arduino...
 
Huffman Algorithm and its Application by Ekansh Agarwal
Huffman Algorithm and its Application by Ekansh AgarwalHuffman Algorithm and its Application by Ekansh Agarwal
Huffman Algorithm and its Application by Ekansh Agarwal
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Presentation SIM CARD (GSM)

  • 1. A PRESENTATION ON GSM Subscriber Identity Module (SIM) Card By Ekansh Agarwal (J001) Rajat Dixit (J014) (MBA TECH EXTC, Sem IV)
  • 2. CONTENTS 1. Evolution of SIM 2. Role of SIM 3. Components 4. Functions 5. Security Features 6. Disadvantages
  • 3. 1. Evolution of SIM ● When the SIM card was invented in 1991, it was having a size of 1FF, which then shrank to a size of 2FF called as mini SIM, then to 3FF or micro SIM and now to nano SIM with a 4FF size 3
  • 4. 2. Role of SIM ● A SIM holds all the information required to identify a particular subscription to a mobile service. ● Each GSM subscriber is issued a SIM card by the operator, which can be seen as the subscriber’s “key” to the network ● The SIM is inserted into the mobile terminal and the customer goes through a secure process in order to log onto the network. 4
  • 5. 3. Components ● Central Processing Unit (CPU) ○ The CPU is the “intelligence” of the chip and performs all the mathematical calculations and takes all the decisions required by the SIM ● Read Only Memory (ROM) ○ ROM stores the operating system and the GSM specific algorithms ○ Contents of the ROM shall be created as part of the silicon manufacturing process ● Random Access Memory (RAM) ○ It is used to store temporary system flags, to buffer incoming data and as a scratch pad for calculations ● Electrically Erasable Programmable ROM (EEPROM) ○ EEPROM memory stores all of the application data such as the Operator specific parameters and the subscriber data. ○ This information is retained even after the power is turned off and can be modified or erased using specific electrical signals. 5 Fig.: Architecture of SIM
  • 6. 4. Functions of SIM Card 1. Access Control 2. Customization 3. Service Personalization 4. Network Branding and Advertising 5. Value addition in operator services 6
  • 7. 1. Access Control to the Network 1. Local access control a. identity of the cardholder being an authorized user is achieved through a PIN (Personal Identity Number) checking procedure without transmission on the radio interface b. subscriber presents to the SIM (via the handset) a four to eight digit no. which is known only to the subscriber c. SIM shall check the presented value against that, held in its secure memory 2. Network access control a. This is where the card proves to the GSM network that it is valid for use 7
  • 8. 2. Customization It shall be possible to customize the SIM card for the services to be provided by DTO. SIM shall be capable of storing the following minimum inputs for customization: • International Mobile Subscriber Identity (IMSI) • Integrated Circuit Card Identification (ICC id) • Subscriber Authentication Key (Ki) • Personal Identification Number- 1 (PIN-1) • Personal Identification Number- 2 (PIN-2) • PIN Unblocking Key-1 (PUK-1) • PIN Unblocking Key-2 (PUK-2) 8
  • 9. 3. Service Personalization The SIM shall also act as a portable data storage device. SIM shall be able to support following: ● Electrical Personalization: To authenticate the chip, it shall load the customized executable program and initialize the data in the files. ● Geographical card Personalization: For printing cardholder related data on the card body. 4. Network Branding and Advertising For the purpose of advertising and network branding of IMPCS network, it shall be possible to print artwork containing DTO logo and other network related information on SIM card with high precision and quality. 9
  • 10. 5. Value addition in operator services ● The SIM card shall also be able to provide a platform based on GSM standards 11.14 for SIM Tool Kit to facilitate launching of various value added interactive services like Mobile Banking, Tele-ticketing, Over-the-air modifications, Over the air charging (OTAC) etc. as per market demand and marketing ideas. ● SIM Tool Kit (STK) compatibility shall be provided as an option for SIM card 16K and above. 10
  • 11. 5. Security Features 5.1 Authentication The card security shall be based on two types of authentication ● Passive Authentication ○ comprise of password presentation as per ISO guidelines and verifying secret codes ○ SIM card shall support seven passive authentication passwords, which consist of two user's secret code called PINs & three Administrative Secret Codes (ADM) ○ User secret codes shall have their own unblocking secret codes called PUK (PIN unblocking key) as per GSM standards ● Active Authentication ○ Active Authentication shall comprise of Key presentation as per ISO guidelines. It shall provide total transparent means for verification that both the card and the network have the same secret key. There shall be two types of active authentication ■ Internal authentication which verify the genuineness of the card registered in the network ■ External authentication ensures that an application has the right of access to certain highly sensitive files. 11
  • 12. 5.2 Network Security The SIM card shall provide features required for authenticating itself to the GSM network and generating the keys used to cipher the calls. These features should comprise of certain keys and algorithms 5.2.1 Algorithms and processes Following algorithms shall be supported by the SIM: ● Algorithm A3 to authenticate the MS to the network ● Algorithm A8 to generate the encryption key ❏ These algorithms may exist either discretely or combined (into Comp 128) with in the SIM. In either case the output on the SIM-ME interface shall be 12 bytes. ❏ The inputs to both A3 and A8, or Comp 128 are Ki (128 bits) internally derived in the SIM, and RAND across the SIM/ME interface. ❏ The output shall be SRES (32 bits)/Kc (64 bits) the coding of which is defined in the command RUN GSM ALGORITHM in clause 9 of GSM 11.11 12
  • 13. 5.3 Additional security features Following additional security features that shall be available in the SIM card are described below: ● Additional Elementary files (EF) created inside the card shall be managed as per GSM 11.11 recommendations. As security policy depends on GSM operator needs, three states shall be made available for accessing data from the external world: ○ - Under no condition ○ - Under secret code control (PIN code, or administrative secret code) ● Unique serial number to avoid card cloning ● “Inhibition systems” to prevent any power value out of range of the specification: Clock frequency, power supply value. ● Read/Update access to EEPROM 100% controlled by ROM software and issuer application. 5.4 Anti tear mechanism Card shall have anti tear mechanism to prevent SIM data damage during accidental voltage cut off (battery failures, battery pull out without switch off etc.) 13
  • 14. 6. Disadvantages ● The per-unit charge on roaming calls is higher in GSM than in CDMA. ● Calls made through GSM mobiles can be tampered. ● If the SIM gets lost, one can lose all the data, if the same is not saved in the phone. 14
  • 15. References 1. https://www.tec.gov.in/pdf/GRMT/TEC-GR-WS-SIM-002-01-OCT-04.pdf 1. D. G. Koshy and S. N. Rao, "Evolution of SIM Cards – What's Next?," 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2018, pp. 1963-1967