SlideShare a Scribd company logo
Visvesvaraya Technological University
Jnana Sangama, Belgaum
Seminar On
SNIFFERS
Under the guidance of By,
Department of Information Science and Engineering
Rajiv Gandhi Institute of Technology
Cholanagar, R T Nagar Post, Bangalore-32
SNIFFER FOR
DETECTING LOST
MOBILE PHONES
Presented by,
CONTENTS
• Introduction
• What sniffer is ?
• IMEI
• Designing for the sniffer
 Sniffer base station
 Unidirectional Antenna
 Software Tracking
• Working of sniffer device
• Advantages
• Conclusion
• References
DEPT OF ISE RGIT,B'LORE 3
INTRODUCTION
• The main scope is to detect the lost mobiles.
• Each and every day thousands of mobiles get
misplaced or lost, though effective way for the
blocking of the lost mobile.
• To prevent unauthorized person from making and
receiving the calls has been done by the
manufacturers of the mobile with the help of IMEI
number.
DEPT OF ISE RGIT,B'LORE 4
CONT’D….
• For the detection of lost mobile SNIFFER plays a vital role .
• The sniffer device has to be designed precisely and size should
be reduced for easy mobility for the purpose of detection .
DEPT OF ISE RGIT,B'LORE 5
What a SNIFFER is?
• The sniffer is basically a transceiver that works in the frequency
which is in the special unused range that is operated by the
service provided or it can designed to operate at a frequency
that is of much different frequency than the one that is being
used.
DEPT OF ISE RGIT,B'LORE 6
INTRODUCTION TO IMEI
• Each mobile device has a globally unique IMEI
(International Mobile Equipment Identity)
• IMEI (International Mobile Equipment Identity)
numbering system is a 15 digit unique code that is
used to identify the GSM phone
• To know the IMEI number the *#06# has to be
pressed, the number will be displayed in the LCD
screen
DEPT OF ISE RGIT,B'LORE 7
CONT’D….
• When a phone is switched on, this unique IMEI number is
transmitted and checked against a data base of black
listed or grey listed phones in the network’s EIR
• Grey listing will allow the phone to be used, but it can be
tracked to see who has it (via the SIM information).
• Black listing the phone from being used on any network
where there is an EIR match.
DEPT OF ISE RGIT,B'LORE 8
DESIGNING FOR THE SNIFFER
• The sniffer device can be called as a mobile base station that
includes the following important components:
 Sniffer base station
 Unidirectional antenna
 Tracking software
DEPT OF ISE RGIT,B'LORE 9
SNIFFER BASE STATION
• The sniffer is a small base station, it includes transceiver section.
• It should operate at a frequency that is much different from the
frequency of the current cell in which the operation of detection
is being carried out.
DEPT OF ISE RGIT,B'LORE 10
UNIDIRECTIONAL ANTENNA
• The directional antenna acts as the eyes for the sniffer for the
purpose of the detecting the lost mobile phones.
• Antenna is a device which works at specified frequencies range
for transmitting or receiving the data signal.
• In general, antennas transmit power depending on lobe pattern
which varies from one antenna to the other.
DEPT OF ISE RGIT,B'LORE 11
DEPT OF ISE RGIT,B'LORE 12
RADIATION
PATTERN
SOFTWARE FOR THE TRACKING
• The software is used for the tracking of the lost mobile phone
• The programming is done with C or Java. However the C is most
preferred as it is easily embedded with the chips.
DEPT OF ISE RGIT,B'LORE 13
WORKING OF SNIFFERS
• The working of sniffers is of two phases
Before Sniffer increases the frequency
After Sniffer increases the frequency
DEPT OF ISE RGIT,B'LORE 14
BEFORE SNIFFER INCREASES THE
FREQUENCY
DEPT OF ISE RGIT,B'LORE 15
AFTER SNIFFER INCREASES THE
FREQUENCY
DEPT OF ISE RGIT,B'LORE 16
EXPLANATION
• From the above figure we have clearly observed the racing of
the lost mobile.
• We have identified the lost mobile using IMEI.
But,
• The location where it is present can be known by seeing at the
output of the software.
DEPT OF ISE RGIT,B'LORE 17
ADVANTAGES
• This method is used for finding the lost mobiles effectively
• Cost effective
• low power consumption
• Easy to design
DEPT OF ISE RGIT,B'LORE 18
CONCLUSION
• There are certain boundary conditions that have to be qualified
for the identification of lost mobile like the power of the mobile
should be good enough, the mobile phone should not be in the
shadow region but however this method using modern
technologies and devices.
DEPT OF ISE RGIT,B'LORE 19
REFERENCES
• Schiller, “Mobile Communication”, Pearson Education
1 Edition, 7th reprint -2003.
• John D Kraus, “Electromagnetic”, TMH
• Jordan et al, “Electromagnetic waves and radiation
system” , Printice Hall
• www.gsmworld.com
• http://ericsson.com
DEPT OF ISE RGIT,B'LORE 20
DEPT OF ISE RGIT,B'LORE 21
DEPT OF ISE RGIT,B'LORE 22

More Related Content

What's hot

skinput technology
skinput technologyskinput technology
skinput technology
yamini rayalu
 
Technical seminar on virtual smart phone
Technical seminar on virtual smart phoneTechnical seminar on virtual smart phone
Technical seminar on virtual smart phone
Akshitha Chutke
 
Outes
OutesOutes
Li Fi technology abstract document
Li Fi technology abstract documentLi Fi technology abstract document
Li Fi technology abstract document
Rohith Palakurthi
 
Wireless charging of mobilephones
Wireless charging of  mobilephonesWireless charging of  mobilephones
Wireless charging of mobilephonesPRADEEP Cheekatla
 
Silent sound-technology ppt final
Silent sound-technology ppt finalSilent sound-technology ppt final
Silent sound-technology ppt final
Lohit Dalal
 
Home automation using android mobiles
Home automation using android mobilesHome automation using android mobiles
Home automation using android mobiles
Durairaja
 
Mobile network structure
Mobile network structure Mobile network structure
Mobile network structure
Ahmed Hussien Ali Gomaa Bebars
 
Home automation using IOT
Home automation using IOTHome automation using IOT
Home automation using IOT
Maneesh Devanaboyina
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Chandu Pawar
 
Ppt presentation
Ppt presentationPpt presentation
Ppt presentation
vishal4799
 
Global wireless e voting powerpoint presentation
Global wireless e voting powerpoint presentationGlobal wireless e voting powerpoint presentation
Global wireless e voting powerpoint presentation
Prateeksha Singh
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
123seminarsonly
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System VisualBee.com
 
Touchless touch screen
Touchless touch screenTouchless touch screen
Touchless touch screen
Lovely Professional University
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
Komal Gandhi
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics
123seminarsonly
 
Women safety device with gps tracking and alerts
Women safety device with gps tracking  and alertsWomen safety device with gps tracking  and alerts
Women safety device with gps tracking and alerts
Praween Lakra
 

What's hot (20)

skinput technology
skinput technologyskinput technology
skinput technology
 
Technical seminar on virtual smart phone
Technical seminar on virtual smart phoneTechnical seminar on virtual smart phone
Technical seminar on virtual smart phone
 
Sniffer
SnifferSniffer
Sniffer
 
Outes
OutesOutes
Outes
 
Li Fi technology abstract document
Li Fi technology abstract documentLi Fi technology abstract document
Li Fi technology abstract document
 
Smart note-taker
Smart note-takerSmart note-taker
Smart note-taker
 
Wireless charging of mobilephones
Wireless charging of  mobilephonesWireless charging of  mobilephones
Wireless charging of mobilephones
 
Silent sound-technology ppt final
Silent sound-technology ppt finalSilent sound-technology ppt final
Silent sound-technology ppt final
 
Home automation using android mobiles
Home automation using android mobilesHome automation using android mobiles
Home automation using android mobiles
 
Mobile network structure
Mobile network structure Mobile network structure
Mobile network structure
 
Home automation using IOT
Home automation using IOTHome automation using IOT
Home automation using IOT
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Ppt presentation
Ppt presentationPpt presentation
Ppt presentation
 
Global wireless e voting powerpoint presentation
Global wireless e voting powerpoint presentationGlobal wireless e voting powerpoint presentation
Global wireless e voting powerpoint presentation
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
Touchless touch screen
Touchless touch screenTouchless touch screen
Touchless touch screen
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics
 
Women safety device with gps tracking and alerts
Women safety device with gps tracking  and alertsWomen safety device with gps tracking  and alerts
Women safety device with gps tracking and alerts
 

Viewers also liked

Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
Papun Papun
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer
vilss
 
Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
guestfa1226
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
Ravi Teja Reddy
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology ppt
deepakmarndi
 
Sniffer for-detecting-lost-mobiles
Sniffer for-detecting-lost-mobilesSniffer for-detecting-lost-mobiles
Sniffer for-detecting-lost-mobilesRuqeya Afshan
 
Seminar on sniffers
Seminar on sniffersSeminar on sniffers
Seminar on sniffers
Amarjeet Paul
 
Sniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost MobilesSniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost Mobiles
Sumaiya Arjumand
 
Sos ppt
Sos pptSos ppt
Sos ppt
lorinchina
 
When Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
When Attention is not Scarce – Detecting Boredom from Mobile Phone UsageWhen Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
When Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
Martin Pielot
 
Blue brain
Blue brainBlue brain
Blue brain
Abhishek Abhi
 
SOS transmission through cellular phones to help accident victims
SOS transmission through cellular phones to help accident victimsSOS transmission through cellular phones to help accident victims
SOS transmission through cellular phones to help accident victimsAkhil Kumar
 
Wireless usb
Wireless usbWireless usb
Wireless usb
Arkaprava Sadhu
 

Viewers also liked (16)

Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer
 
Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology ppt
 
Sniffer for-detecting-lost-mobiles
Sniffer for-detecting-lost-mobilesSniffer for-detecting-lost-mobiles
Sniffer for-detecting-lost-mobiles
 
Seminar on sniffers
Seminar on sniffersSeminar on sniffers
Seminar on sniffers
 
venkat (1)
venkat (1)venkat (1)
venkat (1)
 
Sniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost MobilesSniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost Mobiles
 
Sos ppt
Sos pptSos ppt
Sos ppt
 
When Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
When Attention is not Scarce – Detecting Boredom from Mobile Phone UsageWhen Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
When Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
 
Blue brain
Blue brainBlue brain
Blue brain
 
DRM Powerpoint
DRM PowerpointDRM Powerpoint
DRM Powerpoint
 
SOS transmission through cellular phones to help accident victims
SOS transmission through cellular phones to help accident victimsSOS transmission through cellular phones to help accident victims
SOS transmission through cellular phones to help accident victims
 
Wireless usb
Wireless usbWireless usb
Wireless usb
 

Similar to Sniffer for detecting lost mobiles

sniffer technology.pptx
sniffer technology.pptxsniffer technology.pptx
sniffer technology.pptx
DivyaDewkathe
 
Snifferforthemobilephones 120304120929-phpapp02
Snifferforthemobilephones 120304120929-phpapp02Snifferforthemobilephones 120304120929-phpapp02
Snifferforthemobilephones 120304120929-phpapp02Anjali Verma
 
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Edwin Manuel
 
GSM controlled robot with obstacle avoidance using IR sensors
GSM controlled robot with obstacle avoidance using IR sensorsGSM controlled robot with obstacle avoidance using IR sensors
GSM controlled robot with obstacle avoidance using IR sensors
Rahul Sidhu
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
Abhishek Abhi
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
maham4569
 
SPY Mobile Software
SPY Mobile SoftwareSPY Mobile Software
SPY Mobile Software
Pooja Seo
 
project presentation on cell phone operated land rover
project presentation on cell phone operated land roverproject presentation on cell phone operated land rover
project presentation on cell phone operated land rover
sunanda kothari
 
SNIFFER FOR DETECTING LOST MOBILE ppt arya
SNIFFER FOR DETECTING LOST MOBILE ppt  aryaSNIFFER FOR DETECTING LOST MOBILE ppt  arya
SNIFFER FOR DETECTING LOST MOBILE ppt arya
yidegev626
 
car accident.pptx
car accident.pptxcar accident.pptx
car accident.pptx
RakibulHassan77
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
ManojMudhiraj3
 
Snifferfordetectinglostmobile 130811054537-phpapp01
Snifferfordetectinglostmobile 130811054537-phpapp01Snifferfordetectinglostmobile 130811054537-phpapp01
Snifferfordetectinglostmobile 130811054537-phpapp01puja kumari
 
Caller ID Android Application
 Caller ID Android Application Caller ID Android Application
Caller ID Android Application
Smitakshi Sen
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
kishan alagiya
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
Subhrajit Paul
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Mobile devices hardware characteristics
Mobile devices hardware characteristicsMobile devices hardware characteristics
Mobile devices hardware characteristics
HectorMolarGamboa
 
IOT Based Smart Parking and Damage Detection Using RFID
IOT Based Smart Parking and Damage Detection Using RFIDIOT Based Smart Parking and Damage Detection Using RFID
IOT Based Smart Parking and Damage Detection Using RFID
MaheshMoses
 
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
Yole Developpement
 

Similar to Sniffer for detecting lost mobiles (20)

sniffer technology.pptx
sniffer technology.pptxsniffer technology.pptx
sniffer technology.pptx
 
Snifferforthemobilephones 120304120929-phpapp02
Snifferforthemobilephones 120304120929-phpapp02Snifferforthemobilephones 120304120929-phpapp02
Snifferforthemobilephones 120304120929-phpapp02
 
Sniffer
SnifferSniffer
Sniffer
 
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
 
GSM controlled robot with obstacle avoidance using IR sensors
GSM controlled robot with obstacle avoidance using IR sensorsGSM controlled robot with obstacle avoidance using IR sensors
GSM controlled robot with obstacle avoidance using IR sensors
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
SPY Mobile Software
SPY Mobile SoftwareSPY Mobile Software
SPY Mobile Software
 
project presentation on cell phone operated land rover
project presentation on cell phone operated land roverproject presentation on cell phone operated land rover
project presentation on cell phone operated land rover
 
SNIFFER FOR DETECTING LOST MOBILE ppt arya
SNIFFER FOR DETECTING LOST MOBILE ppt  aryaSNIFFER FOR DETECTING LOST MOBILE ppt  arya
SNIFFER FOR DETECTING LOST MOBILE ppt arya
 
car accident.pptx
car accident.pptxcar accident.pptx
car accident.pptx
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Snifferfordetectinglostmobile 130811054537-phpapp01
Snifferfordetectinglostmobile 130811054537-phpapp01Snifferfordetectinglostmobile 130811054537-phpapp01
Snifferfordetectinglostmobile 130811054537-phpapp01
 
Caller ID Android Application
 Caller ID Android Application Caller ID Android Application
Caller ID Android Application
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile devices hardware characteristics
Mobile devices hardware characteristicsMobile devices hardware characteristics
Mobile devices hardware characteristics
 
IOT Based Smart Parking and Damage Detection Using RFID
IOT Based Smart Parking and Damage Detection Using RFIDIOT Based Smart Parking and Damage Detection Using RFID
IOT Based Smart Parking and Damage Detection Using RFID
 
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
 

Recently uploaded

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

Sniffer for detecting lost mobiles

  • 1. Visvesvaraya Technological University Jnana Sangama, Belgaum Seminar On SNIFFERS Under the guidance of By, Department of Information Science and Engineering Rajiv Gandhi Institute of Technology Cholanagar, R T Nagar Post, Bangalore-32
  • 2. SNIFFER FOR DETECTING LOST MOBILE PHONES Presented by,
  • 3. CONTENTS • Introduction • What sniffer is ? • IMEI • Designing for the sniffer  Sniffer base station  Unidirectional Antenna  Software Tracking • Working of sniffer device • Advantages • Conclusion • References DEPT OF ISE RGIT,B'LORE 3
  • 4. INTRODUCTION • The main scope is to detect the lost mobiles. • Each and every day thousands of mobiles get misplaced or lost, though effective way for the blocking of the lost mobile. • To prevent unauthorized person from making and receiving the calls has been done by the manufacturers of the mobile with the help of IMEI number. DEPT OF ISE RGIT,B'LORE 4
  • 5. CONT’D…. • For the detection of lost mobile SNIFFER plays a vital role . • The sniffer device has to be designed precisely and size should be reduced for easy mobility for the purpose of detection . DEPT OF ISE RGIT,B'LORE 5
  • 6. What a SNIFFER is? • The sniffer is basically a transceiver that works in the frequency which is in the special unused range that is operated by the service provided or it can designed to operate at a frequency that is of much different frequency than the one that is being used. DEPT OF ISE RGIT,B'LORE 6
  • 7. INTRODUCTION TO IMEI • Each mobile device has a globally unique IMEI (International Mobile Equipment Identity) • IMEI (International Mobile Equipment Identity) numbering system is a 15 digit unique code that is used to identify the GSM phone • To know the IMEI number the *#06# has to be pressed, the number will be displayed in the LCD screen DEPT OF ISE RGIT,B'LORE 7
  • 8. CONT’D…. • When a phone is switched on, this unique IMEI number is transmitted and checked against a data base of black listed or grey listed phones in the network’s EIR • Grey listing will allow the phone to be used, but it can be tracked to see who has it (via the SIM information). • Black listing the phone from being used on any network where there is an EIR match. DEPT OF ISE RGIT,B'LORE 8
  • 9. DESIGNING FOR THE SNIFFER • The sniffer device can be called as a mobile base station that includes the following important components:  Sniffer base station  Unidirectional antenna  Tracking software DEPT OF ISE RGIT,B'LORE 9
  • 10. SNIFFER BASE STATION • The sniffer is a small base station, it includes transceiver section. • It should operate at a frequency that is much different from the frequency of the current cell in which the operation of detection is being carried out. DEPT OF ISE RGIT,B'LORE 10
  • 11. UNIDIRECTIONAL ANTENNA • The directional antenna acts as the eyes for the sniffer for the purpose of the detecting the lost mobile phones. • Antenna is a device which works at specified frequencies range for transmitting or receiving the data signal. • In general, antennas transmit power depending on lobe pattern which varies from one antenna to the other. DEPT OF ISE RGIT,B'LORE 11
  • 12. DEPT OF ISE RGIT,B'LORE 12 RADIATION PATTERN
  • 13. SOFTWARE FOR THE TRACKING • The software is used for the tracking of the lost mobile phone • The programming is done with C or Java. However the C is most preferred as it is easily embedded with the chips. DEPT OF ISE RGIT,B'LORE 13
  • 14. WORKING OF SNIFFERS • The working of sniffers is of two phases Before Sniffer increases the frequency After Sniffer increases the frequency DEPT OF ISE RGIT,B'LORE 14
  • 15. BEFORE SNIFFER INCREASES THE FREQUENCY DEPT OF ISE RGIT,B'LORE 15
  • 16. AFTER SNIFFER INCREASES THE FREQUENCY DEPT OF ISE RGIT,B'LORE 16
  • 17. EXPLANATION • From the above figure we have clearly observed the racing of the lost mobile. • We have identified the lost mobile using IMEI. But, • The location where it is present can be known by seeing at the output of the software. DEPT OF ISE RGIT,B'LORE 17
  • 18. ADVANTAGES • This method is used for finding the lost mobiles effectively • Cost effective • low power consumption • Easy to design DEPT OF ISE RGIT,B'LORE 18
  • 19. CONCLUSION • There are certain boundary conditions that have to be qualified for the identification of lost mobile like the power of the mobile should be good enough, the mobile phone should not be in the shadow region but however this method using modern technologies and devices. DEPT OF ISE RGIT,B'LORE 19
  • 20. REFERENCES • Schiller, “Mobile Communication”, Pearson Education 1 Edition, 7th reprint -2003. • John D Kraus, “Electromagnetic”, TMH • Jordan et al, “Electromagnetic waves and radiation system” , Printice Hall • www.gsmworld.com • http://ericsson.com DEPT OF ISE RGIT,B'LORE 20
  • 21. DEPT OF ISE RGIT,B'LORE 21
  • 22. DEPT OF ISE RGIT,B'LORE 22