SlideShare a Scribd company logo
1
CHAPTER 1
INTRODUCTION
One of the most interesting things about a cell phone is that it is really a radio an
extremely sophisticated radio, which uses some band of frequency that has the basic working
similar to the ordinary cordless phone. The mobile cellular communication has been
appreciated since its birth in the early ’70s and the advancement in the field of VLSI has helped
in designing less power, smaller size but efficient transceiver for the purpose of
communication. But however, the technology has not yet answered the loss or misplacement
of the lost mobile phone which is significantly increasing. In this we discuss the problem and
the probable solution that could be done. The IMEI number is a unique number that is
embedded in the mobile phone the main purpose of which is the blocking of calls that is made
by unauthorized person once the mobile is reported as stolen but here we use it effectively for
the purpose of detection.
2
CHAPTER 2
IMEI - International Mobile Equipment Identity
The GSM MoU’s IMEI(International Mobile Equipment Identity) numbering system is
a 15 digit unique code that is used to identify the GSM/DCS/PCS phone. When a phone is
switched on, this unique IMEI number is transmitted and checked against a database of
blacklisted or greylisted phones in the network’s EIR (Equipment ID Register). This EIR
determines whether the phone can log on tithe network to make and receive calls.
To know the IMEI number the *#06# has to be pressed, the number will be displayed
on the LCD screen; it is unique to a mobile phone. If the EIR and IMEI number match, the
networks can do a number of things. For exexample grey list or blacklist a phone:
1. Greylisting will allow the phone to be used, but it can be tracked to see who has it (via the
SIM information).
2. Blacklisting the phone from being used on any network where there is an EIR match.
3
CHAPTER 3
DESIGNING FOR THE SNIFFER
As stated this proposal is about the detection of lost mobile phones and for this purpose
we are designing a new device called the Sniffer. The sniffer device has to be designed
precisely and size should be reduced for easy mobility for the purpose of detection. The device
can be called a mobile base station that includes the following important components:
1. Sniffer base station
2. Unidirectional antenna
3. Tracking software
3.1 Sniffer Base Station:
The sniffer is a small base station, it inincludes transceiver section. It should operate at a
frequency that is much different from the frequency of the current cell in which the operation
of detection is being carried out. Some of the main important things are the frequency that has
to be generated by the transceiver section is around 900MHz range which is a VHF range and
it is necessary to design the oscillator circuit for that frequency range.
Another important is the cooling that has to be provided to the circuit while designing the
circuit that is to be operated at 900MHz range of frequency. Hence proper design of base station
is an important thing in the design of the sniffer. Mobile phones, as well as the base station,
have low power transmitter is also transmitting at low power. The transmitter of the sniffer has
to be a low power transmitter. This helps in the process of reducing the interference of the
device with the devices that are in the other cells.
4
3.2 Design of Unidirectional Antenna:
Though the transceiver in a sniffer plays an important role in the detection of the mobile
phone however it is the directional antenna that has a major role in the design of the transmitter.
The directional antenna acts as the eyes for the sniffer for the purpose of detecting the lost
mobile phones. Hence the proper design of the directional antenna is required. An antenna is a
device that works at specified frequencies range for transmitting or receiving the data signal.
In general, antennas transmit power depending on lobe pattern which varies from one antenna
to the other. The lobe pattern is two-dimensional diagrams that are used to show radiation
patterns. The radiation pattern of directional antenna is shown in below figure.
Fig 3.1 Radiation Pattern of Unidirectional Antenna
In addition to this, it is necessary that the transmitter should be a low power transmitter.
The Gain and directivity are intimately related in antennas. The directivity of an antenna is a
statement of how the RF energy is focused in one or two directions. Because the amount of RF
energy remains the same but is distributed over less area, the apparent signal strength is higher.
5
This apparent increase in signal strength is the antenna gain. The gain is measured in
decibels over either a dipole (dBd) or a theoretical construct called an Isotropic radiator (dBi).
The isotropic radiator is a spherical signal source that radiates equally well in all directions.
One way to view the omnidirectional pattern is that it is a slice taken horizontally through the
three-dimensional sphere. The graphical representation of the Radiation pattern of the
unidirectional antenna is shown in figure.
The spherical co-ordination system has three main components for the pattern
representation and they are (R, _, _). The shape of the radiation system is independent of R, as
long R is chosen to be sufficiently large and much greater than the wavelength as the largest
dimension of the antenna. The magnitude of the field strength in any direction varies inversely
with R. A complete radiation pattern requires the three-dimensional representation. The other
factors that are to be taken into account during the development of the antenna for the sniffer
should be the gain and the directivity.
As these features have a greater effect while designing the antenna. The gain of the
antenna is defined as the ability of the antenna to radiate the power in a particular direction.
The power radiated per unit area in any direction is given by the pointing vector and is
equivalent to E2/_2 W/m2
Total of the power that is being radiated by the antenna is given as W=__d_
The average power that gets radiated is given as _(avg)=W/4_ (watts per steradian)
The Directivity of the antenna is the direction in which there is a maximum gain for
the radiation that is being radiated, the gain of the antenna is given as a function of the angles.
The directivity value is constant for a particular direction. In addition to the directivity and the
gain of the antenna the other important thing that has to be taken into account is the power that
is being radiated by the antenna.
The total power is given as W and is the summation of the radiated power and the ohmic
loss of the antenna. Here the Wl represents the ohmic losses of the antenna. Wt=Wr+Wl The
6
power gain of the antenna is given as gp=4__/wt The ratio of power to the directivity is referred
as a measure of efficiency of the antenna gp/gd=Wr/(Wr+Wl) The power radiated by the
antenna should be properly designed as this causes more penetration of the electromagnetic
radiation and thus it might have some effect in the nearby cells. The effective area of the
antenna is another important factor that is mainly required in the receiving antenna and it may
be referred as the effective aperture or capture area and is related to the directive gain of the
antenna through the relation A=gd_2/4
Since the sniffer device that is constructed is a device that has both the transmitting and
the receiving antenna. Effective gain has to be taken into account and this shows the ability of
the antenna to capture the signal that the lost mobile is transmitting.
3.3 Software for the Tracking:
The software part plays a major role in the tracking of the lost mobile phone It is the
base for the antenna to track the lost mobile the main feature of this software is that it helps in
the process of creation of the database and this is mainly done using a Random Access Memory.
The mobile phone that is lost has a certain IMEI number that is embedded in the chip. This
RAM of the sniffer device stores the IMEI number of the lost mobile phone. Thus this acts as
a database or the directory of the lost mobile phone number/The software that is to be designed
in such a way that the software has the input as the IMEI number of the lost mobile phone from
the RAM and this ID done using the SQL query that fetches the IMEI number.
After getting the input of the lost mobile phones IMEI number it checks the comport
for getting the information whether it obtains any signaling information from the lost device
that might respond to the signal sent by the sniffer The programming is done with C or Java.
However the C is most preferred as it is easily embedded with the chips. With VB the front end
is designed. The Oracle SQL is the back end as it helps in retrieving the input data from the
RAM using the query. But however the sample program that we have designed does not use
7
the oracle it takes the input directly from the keyboard and this is an example and a dummy
program that has been created that helps in the understanding of how the device would work.
8
CHAPTER 4
WORKING OF THE SNIFFER DEVICE
The sniffer is basically a transceiver that works in the frequency which is in the special
unused range that is operated by the service provided or it can be designed to operate at a
frequency that is of much different frequency than the one that is being used by the nearby cells
as there may be possibility of interference by the device with the devices in the nearby cells.
The working for the device is as follows. The fig 4.1 & 4.2 shows the working of the sniffer ;
as given in fig 3.1 it gives the normal operation of the mobile with the base station and there is
a BTS that acts as a middle man in the process of communication between the mobile and the
MTSO which is popularly known as MSC or Mobile Switching Centre .
There is always a two-way communication between devices and before the
establishment of the communication the authentication of the SIM card that has the IMSI or
the International Mobile Subscriber Identifier. This IMSI number helps in the authorization of
the user. The second authentication is the authentication of the handset, which is done in EIR
or the Equipment Identifier Register. This register is located at the MSC and it contains the
IMEI number of the lost handset and if the signal is obtained from the normal one then the two-
way communication is established.
The IMEI of the lost mobile phone number once has been reported to the service
provider, who keeps track of the record of lost mobile phones. The MTSO of the MSC which
keeps in track of all the mobile phones with IMEI number and the IMSI number has the
information of the lost mobile phones location which means the location of the cell where the
lost device is because of the two way communication with the device the BTS of the lost device
is known to MSC. From this information regarding the cell in which the device is located the
sniffer device is introduced.
9
Fig 4.1 The initial connection between the cellular network and lost
mobile phone
The next figure or the fig 4.1 shows the sniffer that gets into work for the purpose of
the detection of the lost device. After the information regarding the IMEI number of the lost
device is provided by the MTSO or MSC.This is then fed into the sniffer's main memory the
sniffer located in particular cell gets into action of detecting the lost device. The sniffer uses a
frequency that is different from the one that is being used by the base station and the located
nearby cells.The base station disconnects the connection with the lost mobile phone, as there
is a request regarding this action from the EIR part of the MSC. This causes the lost device to
search the BTS to get locked with since each base station does not have authorization capability
the lost device sends appropriate connection request signal.
Now when the sniffer device is being deployed and this device has inbuilt authorization
capability the lost device finds the sniffer to get itself locked to the frequency of the sniffer.
While the connection between the sniffer and the mobile phone is established; the IMEI of the
lost mobile is validated with the stored IMEI and after successful authorization the
communication between the sniffer and the lost device is established. If the other devices in
the same try to communicate with the sniffer the access is denied and this is done at the
10
validation done based on the IME. Once the communication starts it is mainly with the antenna
and the signal strength of the lost device the location can be tracked. However the process of
searching can also be aided with the GPS system for more accurate and fast detection The main
requirement is that the sniffer is operated in a frequency that is different from the frequency
adopted by the cell and nearby ones. Hence the interference from the nearby cell can be
avoided. The directional antenna is used in finding the location of the mobile phone.
Fig 4.2 The connection of the sniffer device with the lost mobile
phone
Here the signal strength of the received signal is obtained antenna pattern is plotted
once the signal of the mobile is obtained. The no. of antenna patterns for different positions of
the same mobile phone is used to find the exact location. But however, in this method the
directional antenna used much be of a very small beam width this helps in more accurate
process of detection.
11
Fig 4.3 the sniffer shown tries to communicate with the lost mobile
After getting connected with the mobile it creates a virtual cell pattern and thus helps
in the detection of lost mobile phones.
12
CHAPTER 5
CONCLUSION
Since the boom of the mobile phone for the purpose of the communication, there has
been a large no. of complaints regarding the mobile phone that is being lost and there has been
no effective method developed for detecting the lost device. The given paper dealt with the
idea of development “Sniffer for the detection of lost Mobile phones” paves away by means of
which the lost mobile phones can be recovered. But the process of detection is yet to be
developed through the software and demo has been developed and is with the authors. The
demo has been written in VB that gives an overview of how the lost mobile is being detected
and the software has been written in C.
The SQL has to be used for the purpose of querying and the internal architecture is of
lesser complexity compared to the base station as this mainly involves the control signal and
there is no need for the voice process. The design involved the following: Design of the sniffer
base station design of unidirectional l antenna, development of software for tracking. Though
this method appears to be a little bit complex involving the design of the sniffer but however
for large scale detection the overall effective cost of the design and the detection scales down.
There are certain boundary conditions or criteria that have to be qualified for the
identification of the lost mobile like the power of the mobile should be good enough, the mobile
phone should not be in the shadow region, etc., but however this method can be improved by
using modern technologies and devices.
13
APPENDIX
IMEI: International Mobile Equipment Identifier
SNIFFER: The small transceiver used for detecting lost mobile phones.
IMSI: International Mobile Subscriber Identifier.
BTS: Base transceiver station.
MTSO: Mobile Telephone Switching Office
MSC: Mobile Station Switching Controller
14
REFERENCES
[1] Schiller, “Mobile Communication”, Pearson Education 1 Edition, 7th reprint-2003.
[2] John D Kraus, “Electromagnetics”, TMH
[3] Jordan et al, “Electromagnetic waves and radiation system”, Prentice Hall
[4] www.gsmworld.com
[5] http://ericsson.com 6. http://iec.org

More Related Content

What's hot

Ai04606213215
Ai04606213215Ai04606213215
Ai04606213215
IJERA Editor
 
Potential technogies
Potential technogiesPotential technogies
Potential technogies
Omkar Paranjape
 
Cell phone detector & jammer
Cell phone detector & jammerCell phone detector & jammer
Cell phone detector & jammer
Amar Raj
 
indoor-positioning-system
indoor-positioning-systemindoor-positioning-system
indoor-positioning-system
Aniket Rege
 
Performance Analysis of Visible Light Communication (Vlc) with and Without Co...
Performance Analysis of Visible Light Communication (Vlc) with and Without Co...Performance Analysis of Visible Light Communication (Vlc) with and Without Co...
Performance Analysis of Visible Light Communication (Vlc) with and Without Co...
Associate Professor in VSB Coimbatore
 
Geolocalisation
GeolocalisationGeolocalisation
Iaetsd gesture
Iaetsd gestureIaetsd gesture
Iaetsd gesture
Iaetsd Iaetsd
 
A05840104
A05840104A05840104
A05840104
IOSR-JEN
 
Lecture 6 geolocation
Lecture 6 geolocationLecture 6 geolocation
Lecture 6 geolocation
moduledesign
 
IRJET- A Novel Technique for Spectrum Sensing in Cognitive Radio Networks
IRJET- A Novel Technique for Spectrum Sensing in Cognitive Radio NetworksIRJET- A Novel Technique for Spectrum Sensing in Cognitive Radio Networks
IRJET- A Novel Technique for Spectrum Sensing in Cognitive Radio Networks
IRJET Journal
 
E010424043
E010424043E010424043
E010424043
IOSR Journals
 
Toward forward link interference cancellation
Toward forward link interference cancellationToward forward link interference cancellation
Toward forward link interference cancellation
Shu Wang
 

What's hot (12)

Ai04606213215
Ai04606213215Ai04606213215
Ai04606213215
 
Potential technogies
Potential technogiesPotential technogies
Potential technogies
 
Cell phone detector & jammer
Cell phone detector & jammerCell phone detector & jammer
Cell phone detector & jammer
 
indoor-positioning-system
indoor-positioning-systemindoor-positioning-system
indoor-positioning-system
 
Performance Analysis of Visible Light Communication (Vlc) with and Without Co...
Performance Analysis of Visible Light Communication (Vlc) with and Without Co...Performance Analysis of Visible Light Communication (Vlc) with and Without Co...
Performance Analysis of Visible Light Communication (Vlc) with and Without Co...
 
Geolocalisation
GeolocalisationGeolocalisation
Geolocalisation
 
Iaetsd gesture
Iaetsd gestureIaetsd gesture
Iaetsd gesture
 
A05840104
A05840104A05840104
A05840104
 
Lecture 6 geolocation
Lecture 6 geolocationLecture 6 geolocation
Lecture 6 geolocation
 
IRJET- A Novel Technique for Spectrum Sensing in Cognitive Radio Networks
IRJET- A Novel Technique for Spectrum Sensing in Cognitive Radio NetworksIRJET- A Novel Technique for Spectrum Sensing in Cognitive Radio Networks
IRJET- A Novel Technique for Spectrum Sensing in Cognitive Radio Networks
 
E010424043
E010424043E010424043
E010424043
 
Toward forward link interference cancellation
Toward forward link interference cancellationToward forward link interference cancellation
Toward forward link interference cancellation
 

Similar to Sniffer for detecting lost mobiles - Technical Seminar

Seminar on sniffers
Seminar on sniffersSeminar on sniffers
Seminar on sniffers
Amarjeet Paul
 
SNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILESSNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILES
Chaitanya Ram
 
Outes
OutesOutes
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
akhila immadisetty
 
Sniffer ppt
Sniffer pptSniffer ppt
Sniffer ppt
Rajashree Praharaj
 
Mobile Technology
Mobile TechnologyMobile Technology
Mobile Technology
Swapnali Pawar
 
Sniffer
SnifferSniffer
Sniffer
Stelcy Jose
 
Sniffer
SnifferSniffer
Sniffer
Stelcy Jose
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd Iaetsd
 
Sniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost MobilesSniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost Mobiles
Sumaiya Arjumand
 
Ece interview questions with answers
Ece interview questions with answersEce interview questions with answers
Ece interview questions with answers
manish katara
 
Pankaj Rai
Pankaj RaiPankaj Rai
Pankaj Rai
Pankaj Rai
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
Manikandan Jeeva
 
Smart Antennas in 3G Network
Smart Antennas in 3G NetworkSmart Antennas in 3G Network
Smart Antennas in 3G Network
Syed Abdul Basit
 
GSM Mobile Phone Jammer
GSM Mobile Phone JammerGSM Mobile Phone Jammer
GSM Mobile Phone Jammer
ijsrd.com
 
Smart antennas in 4 g
Smart antennas in 4 gSmart antennas in 4 g
Smart antennas in 4 g
Alexander Decker
 
11.smart antennas in 0004www.iiste.org call for paper_g
11.smart antennas in 0004www.iiste.org call for paper_g11.smart antennas in 0004www.iiste.org call for paper_g
11.smart antennas in 0004www.iiste.org call for paper_g
Alexander Decker
 
Project report of Cell phone detector circuit
Project report of Cell phone detector circuitProject report of Cell phone detector circuit
Project report of Cell phone detector circuit
Moin Aman
 
My Seminar
My SeminarMy Seminar
My Seminar
anoop_wi
 
Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
Ronson Fernandes
 

Similar to Sniffer for detecting lost mobiles - Technical Seminar (20)

Seminar on sniffers
Seminar on sniffersSeminar on sniffers
Seminar on sniffers
 
SNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILESSNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILES
 
Outes
OutesOutes
Outes
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Sniffer ppt
Sniffer pptSniffer ppt
Sniffer ppt
 
Mobile Technology
Mobile TechnologyMobile Technology
Mobile Technology
 
Sniffer
SnifferSniffer
Sniffer
 
Sniffer
SnifferSniffer
Sniffer
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
 
Sniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost MobilesSniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost Mobiles
 
Ece interview questions with answers
Ece interview questions with answersEce interview questions with answers
Ece interview questions with answers
 
Pankaj Rai
Pankaj RaiPankaj Rai
Pankaj Rai
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
 
Smart Antennas in 3G Network
Smart Antennas in 3G NetworkSmart Antennas in 3G Network
Smart Antennas in 3G Network
 
GSM Mobile Phone Jammer
GSM Mobile Phone JammerGSM Mobile Phone Jammer
GSM Mobile Phone Jammer
 
Smart antennas in 4 g
Smart antennas in 4 gSmart antennas in 4 g
Smart antennas in 4 g
 
11.smart antennas in 0004www.iiste.org call for paper_g
11.smart antennas in 0004www.iiste.org call for paper_g11.smart antennas in 0004www.iiste.org call for paper_g
11.smart antennas in 0004www.iiste.org call for paper_g
 
Project report of Cell phone detector circuit
Project report of Cell phone detector circuitProject report of Cell phone detector circuit
Project report of Cell phone detector circuit
 
My Seminar
My SeminarMy Seminar
My Seminar
 
Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
 

Recently uploaded

P5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civilP5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civil
AnasAhmadNoor
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...
um7474492
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
uqyfuc
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
felixwold
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
Indrajeet sahu
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
Dwarkadas J Sanghvi College of Engineering
 
Assistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdfAssistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdf
Seetal Daas
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
snaprevwdev
 
Zener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and ApplicationsZener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and Applications
Shiny Christobel
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 

Recently uploaded (20)

P5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civilP5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civil
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
 
Assistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdfAssistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdf
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
 
Zener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and ApplicationsZener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and Applications
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 

Sniffer for detecting lost mobiles - Technical Seminar

  • 1. 1 CHAPTER 1 INTRODUCTION One of the most interesting things about a cell phone is that it is really a radio an extremely sophisticated radio, which uses some band of frequency that has the basic working similar to the ordinary cordless phone. The mobile cellular communication has been appreciated since its birth in the early ’70s and the advancement in the field of VLSI has helped in designing less power, smaller size but efficient transceiver for the purpose of communication. But however, the technology has not yet answered the loss or misplacement of the lost mobile phone which is significantly increasing. In this we discuss the problem and the probable solution that could be done. The IMEI number is a unique number that is embedded in the mobile phone the main purpose of which is the blocking of calls that is made by unauthorized person once the mobile is reported as stolen but here we use it effectively for the purpose of detection.
  • 2. 2 CHAPTER 2 IMEI - International Mobile Equipment Identity The GSM MoU’s IMEI(International Mobile Equipment Identity) numbering system is a 15 digit unique code that is used to identify the GSM/DCS/PCS phone. When a phone is switched on, this unique IMEI number is transmitted and checked against a database of blacklisted or greylisted phones in the network’s EIR (Equipment ID Register). This EIR determines whether the phone can log on tithe network to make and receive calls. To know the IMEI number the *#06# has to be pressed, the number will be displayed on the LCD screen; it is unique to a mobile phone. If the EIR and IMEI number match, the networks can do a number of things. For exexample grey list or blacklist a phone: 1. Greylisting will allow the phone to be used, but it can be tracked to see who has it (via the SIM information). 2. Blacklisting the phone from being used on any network where there is an EIR match.
  • 3. 3 CHAPTER 3 DESIGNING FOR THE SNIFFER As stated this proposal is about the detection of lost mobile phones and for this purpose we are designing a new device called the Sniffer. The sniffer device has to be designed precisely and size should be reduced for easy mobility for the purpose of detection. The device can be called a mobile base station that includes the following important components: 1. Sniffer base station 2. Unidirectional antenna 3. Tracking software 3.1 Sniffer Base Station: The sniffer is a small base station, it inincludes transceiver section. It should operate at a frequency that is much different from the frequency of the current cell in which the operation of detection is being carried out. Some of the main important things are the frequency that has to be generated by the transceiver section is around 900MHz range which is a VHF range and it is necessary to design the oscillator circuit for that frequency range. Another important is the cooling that has to be provided to the circuit while designing the circuit that is to be operated at 900MHz range of frequency. Hence proper design of base station is an important thing in the design of the sniffer. Mobile phones, as well as the base station, have low power transmitter is also transmitting at low power. The transmitter of the sniffer has to be a low power transmitter. This helps in the process of reducing the interference of the device with the devices that are in the other cells.
  • 4. 4 3.2 Design of Unidirectional Antenna: Though the transceiver in a sniffer plays an important role in the detection of the mobile phone however it is the directional antenna that has a major role in the design of the transmitter. The directional antenna acts as the eyes for the sniffer for the purpose of detecting the lost mobile phones. Hence the proper design of the directional antenna is required. An antenna is a device that works at specified frequencies range for transmitting or receiving the data signal. In general, antennas transmit power depending on lobe pattern which varies from one antenna to the other. The lobe pattern is two-dimensional diagrams that are used to show radiation patterns. The radiation pattern of directional antenna is shown in below figure. Fig 3.1 Radiation Pattern of Unidirectional Antenna In addition to this, it is necessary that the transmitter should be a low power transmitter. The Gain and directivity are intimately related in antennas. The directivity of an antenna is a statement of how the RF energy is focused in one or two directions. Because the amount of RF energy remains the same but is distributed over less area, the apparent signal strength is higher.
  • 5. 5 This apparent increase in signal strength is the antenna gain. The gain is measured in decibels over either a dipole (dBd) or a theoretical construct called an Isotropic radiator (dBi). The isotropic radiator is a spherical signal source that radiates equally well in all directions. One way to view the omnidirectional pattern is that it is a slice taken horizontally through the three-dimensional sphere. The graphical representation of the Radiation pattern of the unidirectional antenna is shown in figure. The spherical co-ordination system has three main components for the pattern representation and they are (R, _, _). The shape of the radiation system is independent of R, as long R is chosen to be sufficiently large and much greater than the wavelength as the largest dimension of the antenna. The magnitude of the field strength in any direction varies inversely with R. A complete radiation pattern requires the three-dimensional representation. The other factors that are to be taken into account during the development of the antenna for the sniffer should be the gain and the directivity. As these features have a greater effect while designing the antenna. The gain of the antenna is defined as the ability of the antenna to radiate the power in a particular direction. The power radiated per unit area in any direction is given by the pointing vector and is equivalent to E2/_2 W/m2 Total of the power that is being radiated by the antenna is given as W=__d_ The average power that gets radiated is given as _(avg)=W/4_ (watts per steradian) The Directivity of the antenna is the direction in which there is a maximum gain for the radiation that is being radiated, the gain of the antenna is given as a function of the angles. The directivity value is constant for a particular direction. In addition to the directivity and the gain of the antenna the other important thing that has to be taken into account is the power that is being radiated by the antenna. The total power is given as W and is the summation of the radiated power and the ohmic loss of the antenna. Here the Wl represents the ohmic losses of the antenna. Wt=Wr+Wl The
  • 6. 6 power gain of the antenna is given as gp=4__/wt The ratio of power to the directivity is referred as a measure of efficiency of the antenna gp/gd=Wr/(Wr+Wl) The power radiated by the antenna should be properly designed as this causes more penetration of the electromagnetic radiation and thus it might have some effect in the nearby cells. The effective area of the antenna is another important factor that is mainly required in the receiving antenna and it may be referred as the effective aperture or capture area and is related to the directive gain of the antenna through the relation A=gd_2/4 Since the sniffer device that is constructed is a device that has both the transmitting and the receiving antenna. Effective gain has to be taken into account and this shows the ability of the antenna to capture the signal that the lost mobile is transmitting. 3.3 Software for the Tracking: The software part plays a major role in the tracking of the lost mobile phone It is the base for the antenna to track the lost mobile the main feature of this software is that it helps in the process of creation of the database and this is mainly done using a Random Access Memory. The mobile phone that is lost has a certain IMEI number that is embedded in the chip. This RAM of the sniffer device stores the IMEI number of the lost mobile phone. Thus this acts as a database or the directory of the lost mobile phone number/The software that is to be designed in such a way that the software has the input as the IMEI number of the lost mobile phone from the RAM and this ID done using the SQL query that fetches the IMEI number. After getting the input of the lost mobile phones IMEI number it checks the comport for getting the information whether it obtains any signaling information from the lost device that might respond to the signal sent by the sniffer The programming is done with C or Java. However the C is most preferred as it is easily embedded with the chips. With VB the front end is designed. The Oracle SQL is the back end as it helps in retrieving the input data from the RAM using the query. But however the sample program that we have designed does not use
  • 7. 7 the oracle it takes the input directly from the keyboard and this is an example and a dummy program that has been created that helps in the understanding of how the device would work.
  • 8. 8 CHAPTER 4 WORKING OF THE SNIFFER DEVICE The sniffer is basically a transceiver that works in the frequency which is in the special unused range that is operated by the service provided or it can be designed to operate at a frequency that is of much different frequency than the one that is being used by the nearby cells as there may be possibility of interference by the device with the devices in the nearby cells. The working for the device is as follows. The fig 4.1 & 4.2 shows the working of the sniffer ; as given in fig 3.1 it gives the normal operation of the mobile with the base station and there is a BTS that acts as a middle man in the process of communication between the mobile and the MTSO which is popularly known as MSC or Mobile Switching Centre . There is always a two-way communication between devices and before the establishment of the communication the authentication of the SIM card that has the IMSI or the International Mobile Subscriber Identifier. This IMSI number helps in the authorization of the user. The second authentication is the authentication of the handset, which is done in EIR or the Equipment Identifier Register. This register is located at the MSC and it contains the IMEI number of the lost handset and if the signal is obtained from the normal one then the two- way communication is established. The IMEI of the lost mobile phone number once has been reported to the service provider, who keeps track of the record of lost mobile phones. The MTSO of the MSC which keeps in track of all the mobile phones with IMEI number and the IMSI number has the information of the lost mobile phones location which means the location of the cell where the lost device is because of the two way communication with the device the BTS of the lost device is known to MSC. From this information regarding the cell in which the device is located the sniffer device is introduced.
  • 9. 9 Fig 4.1 The initial connection between the cellular network and lost mobile phone The next figure or the fig 4.1 shows the sniffer that gets into work for the purpose of the detection of the lost device. After the information regarding the IMEI number of the lost device is provided by the MTSO or MSC.This is then fed into the sniffer's main memory the sniffer located in particular cell gets into action of detecting the lost device. The sniffer uses a frequency that is different from the one that is being used by the base station and the located nearby cells.The base station disconnects the connection with the lost mobile phone, as there is a request regarding this action from the EIR part of the MSC. This causes the lost device to search the BTS to get locked with since each base station does not have authorization capability the lost device sends appropriate connection request signal. Now when the sniffer device is being deployed and this device has inbuilt authorization capability the lost device finds the sniffer to get itself locked to the frequency of the sniffer. While the connection between the sniffer and the mobile phone is established; the IMEI of the lost mobile is validated with the stored IMEI and after successful authorization the communication between the sniffer and the lost device is established. If the other devices in the same try to communicate with the sniffer the access is denied and this is done at the
  • 10. 10 validation done based on the IME. Once the communication starts it is mainly with the antenna and the signal strength of the lost device the location can be tracked. However the process of searching can also be aided with the GPS system for more accurate and fast detection The main requirement is that the sniffer is operated in a frequency that is different from the frequency adopted by the cell and nearby ones. Hence the interference from the nearby cell can be avoided. The directional antenna is used in finding the location of the mobile phone. Fig 4.2 The connection of the sniffer device with the lost mobile phone Here the signal strength of the received signal is obtained antenna pattern is plotted once the signal of the mobile is obtained. The no. of antenna patterns for different positions of the same mobile phone is used to find the exact location. But however, in this method the directional antenna used much be of a very small beam width this helps in more accurate process of detection.
  • 11. 11 Fig 4.3 the sniffer shown tries to communicate with the lost mobile After getting connected with the mobile it creates a virtual cell pattern and thus helps in the detection of lost mobile phones.
  • 12. 12 CHAPTER 5 CONCLUSION Since the boom of the mobile phone for the purpose of the communication, there has been a large no. of complaints regarding the mobile phone that is being lost and there has been no effective method developed for detecting the lost device. The given paper dealt with the idea of development “Sniffer for the detection of lost Mobile phones” paves away by means of which the lost mobile phones can be recovered. But the process of detection is yet to be developed through the software and demo has been developed and is with the authors. The demo has been written in VB that gives an overview of how the lost mobile is being detected and the software has been written in C. The SQL has to be used for the purpose of querying and the internal architecture is of lesser complexity compared to the base station as this mainly involves the control signal and there is no need for the voice process. The design involved the following: Design of the sniffer base station design of unidirectional l antenna, development of software for tracking. Though this method appears to be a little bit complex involving the design of the sniffer but however for large scale detection the overall effective cost of the design and the detection scales down. There are certain boundary conditions or criteria that have to be qualified for the identification of the lost mobile like the power of the mobile should be good enough, the mobile phone should not be in the shadow region, etc., but however this method can be improved by using modern technologies and devices.
  • 13. 13 APPENDIX IMEI: International Mobile Equipment Identifier SNIFFER: The small transceiver used for detecting lost mobile phones. IMSI: International Mobile Subscriber Identifier. BTS: Base transceiver station. MTSO: Mobile Telephone Switching Office MSC: Mobile Station Switching Controller
  • 14. 14 REFERENCES [1] Schiller, “Mobile Communication”, Pearson Education 1 Edition, 7th reprint-2003. [2] John D Kraus, “Electromagnetics”, TMH [3] Jordan et al, “Electromagnetic waves and radiation system”, Prentice Hall [4] www.gsmworld.com [5] http://ericsson.com 6. http://iec.org