GSM Security

21
GSM SECURITY

Transcript of GSM Security

Page 1: GSM Security

GSM SECURITY

Page 2: GSM Security

OUTLINE

INTRODUCTION Security goals & concerns Security mechanisms

LITERATURE REVIEW Literature review comparison table

SHORTCOMINGS CONCLUSION REFERENCES

2

Page 3: GSM Security

3

INTRODUCTION

The acronym GSM stands for Global System for Mobile, the term "global" was preferred due to the intended adoption of this standard in every continent of the world.

GSM is a wireless communication that uses digital technology for mobile communications whose signal transmission is divided by time, mostly known as Time Division Multiple Access (TDMA). 

Security Goals & Concerns : Operators

Bills right people Avoid fraud Protect Services

Customers Privacy Anonymity

Page 4: GSM Security

Four Principles of GSM Security Mechanism: User Authentication

(Ability of mobile equipment to prove that it has access to a particular account with the operator)

Ciphering of data and signal(User data are protected against interception by means of ciphering.)

Confidentiality of user data identity(TMSI is used instead of IMSI which prevents an eavesdropper from identifying of subscriber)

SIM as security module(PIN code security)

IMSI: International Mobile Subscriber Identity TMSI: Temporary Mobile Subscriber Identity

SECURITY MECHANISMS

Page 5: GSM Security

5

LITERATURE REVIEW

Page 6: GSM Security

6

LITERATURE REVIEW(1/2)

Title: ”Advanced Vehicle Security System”, IEEE transaction 2015.

Author: Pritpal Singh, Tanjot Sethi, Bunil K. B., Bibhuti B. B.

Objective: To design and develop an advance and robust

security system for vehicles that can prevent theft and provide information on accidents. Keywords: GPS, GSM, Tracking

Page 7: GSM Security

7

HARDWARE DESIGN(Cont.1/2)

(A) GSM Model:

Fig. 1. System Architecture [1]

Fig. 2. Block diagram for detecting thief movement[1]

Page 8: GSM Security

8

HARDWARE DESIGN(Cont.1/2)

Fig. 3. Block diagram for switching different systems using DTMF decoder[1]

Page 9: GSM Security

9

HARDWARE DESIGN(Cont.1/2)

(B) GPS Model :

Fig. 4. Block diagram of GPS tracking system[1]

Page 10: GSM Security

10

RESULTS(Cont.1/2)

Fig. 6. MSG sent in case of accident to one of the family member[1]

Fig. 5. Offline tracking of vehicle using GSM[1]

Page 11: GSM Security

11

LITERATURE REVIEW(2/2)

Title: “Anti-Theft Vehicle Tracking and Immobilization System ”, IEEE transaction 2014.

Author: Kingshuk Mukherjee

Objective: In this paper a simple and economical solution to the problem has been presented. This scheme can be assembled and used even by private car owners and provides reasonable protection against vehicle theft. Keywords: Anti-theft, Vehicle tracking, Immobilization

Page 12: GSM Security

12

LITERATURE REVIEW(Cont.2/2)

(I) Flow Chart:

Fig. 7. System flowchart[2]

Page 13: GSM Security

13

LITERATURE REVIEW(Cont.2/2)

(I) Flow Chart (Cont..):

Fig. 7. System flowchart[2]

Page 14: GSM Security

14

A. Hardware implementation:The system can be broadly divided into three parts:

The GSM modem The GPS module The Immobilization Circuitry

DESIGN & IMPLEMENTATION(Cont.)

Page 15: GSM Security

15

DESIGN & IMPLEMENTATION(Cont.)

B. Software implementation: The software part covers the code that has to be fed into the Arduino microcontroller. Its outline is as follows:

1. READ MSG FROM GSM MODEM 2. IF MESSAGE = "TRACK"

READ LOCATION • SEND LOCATION 3. IF MESSAGE = "IMMOBILIZE"

OPEN FUEL INJECTOR CIRCUIT BY ACTIVATING RELAY SEND "IMMOBILIZATION SUCCESSFUL" MSG TO OWNER'S

4. IF MESSAGE = "REVERSE" CLOSE FUEL INJECTOR CIRCUIT BY DEACTIVATING RELAY SEND "IMMOBILIZATION REVERSED"MESSAGE TO OWNER

5. ANY OTHER MESSAGE ("INVALID MSG, TRY AGAIN“) 6. END C.

Page 16: GSM Security

16

LITERATURE REVIEW(Cont.2/2)

C. Results and Observations:Working of the three functions as seen from the owner’s mobile phone: The functioning time heavily

depended on the GSM network speed and connectivity.

Fig. 8. Screenshot of owner’s mobile showing working[2]

Page 17: GSM Security

17

LITERATURE REVIEW COMPARISON TABLE

Sr. No.

Paper Title Method Used Advantages Disadvantages

1. Advanced Vehicle Security System

8051 Microcontroller If some one design anything commercial by both arduino and 8051, the model 8051

will be much cheaper.

Bit complex designing then arduino.

2- Anti-Theft Vehicle Tracking and

Immobilization System

Arduino Microcontroller

The whole point of the "Arduino Platform" is to allow for easy and fast

prototyping.

Open source platform, other limitation is accidental one.

Page 18: GSM Security

18

SHORTCOMINGS

Shortcomings of the system: It was observed that with a longer antenna, the tracking could

take place faster. For cloudy/rainy weather, it took longer to track the vehicle.

Even though the connectivity is now near universal, the strength of the network differs and is weaker in rural areas.

If the stolen vehicle is kept under a concrete cover or shade, which will then prevent the GPS module from being able to track it.

If the thief is able to detect and destroy the Anti-theft module before it can be used.

Page 19: GSM Security

19

CONCLUSION

Tracking system is getting to be progressively vital in expansive urban areas and it is more secured than different frameworks.

The advance vehicle security system is one of the essential systems that homogenize both GPS and GSM systems.

This framework intended for clients in transport business, provides real-time information such as location, speed, etc.

The main focus has been to keep this system simple and cost effective, without compromising on its reliability.

On an average it costs around $60 to $70 to build this module. If implemented on a wide scale, this system will drastically reduce the threat of vehicle theft and save vehicle owners thousands in insurance money and other losses.

Page 20: GSM Security

20

REFERENCES

1. Pritpal Singh, Tanjot Sethi, Bunil K. B., Bibhuti B. B., ”Advanced Vehicle Security System” © 2015 IEEE

2. Kingshuk Mukherjee , “Anti-Theft Vehicle Tracking and Immobilization System” ©2014 IEEE

3. Ammar Yasir Korkusuz, “Security in the GSM Network”, Bogazici University, 2012

4. GSM: Security, Services, and the SIM Klaus Vedder, LNCS 1528, pp. 224-240, Springer

5. http://resources.infosecinstitute.com/introduction-to-gsm-security/

Page 21: GSM Security

21