SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Downloaden Sie, um offline zu lesen
SRI SIDDHARTHA ACADEMY OF HIGHER EDUCATION
(Declared as Deemed to be University Under Section 3 of the UGC Act, 1956)
AGALKOTE, TUMKUR – 572107
KARNATAKA
Technical Seminar Report
On
“SNIFFER TECHNOLOGY FOR MOBILES”
Submitted by
Chethan H R (16EC019)
Under the Guidance of
Dr. M N Eshwarappa Mrs. Savitha C
Professor, Dept. of E&C Assistant Prof., Dept. of E&C,
SSIT, Tumkur-572 105 SSIT, Tumkur-572 105
In partial fulfillment of
BACHELOR OF ENGINEERING
DEPARTMENT OF ELECTRONICS AND COMMUNICATION
SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY
(A Constituent College of Sri Siddhartha Academy of Higher Education)
MARALUR, TUMKUR-572105
2019-20
ACKNOWLEDGEMENT
The satisfaction and euphoria that accompany the successful completion of any task
would be incomplete without mention of the people who made it possible and support had
been a constant source of encouragement which crowned my efforts with success.
I am deeply indebted and would like to express my sincere thanks to our beloved
Principal Dr. M.S. Raviprakasha, for providing me an opportunity to do this seminar.
My special gratitude to Dr. M.Z. Kurian, HOD, department of E & C, S.S.I.T for
his guidance, constant encouragement and wholehearted support.
My sincere thanks to my guides Dr. M.N. Eshwarappa and Mrs. Savitha C,
department of E & C, S.S.I.T for their guidance, constant encouragement and wholehearted
support.
Finally, I would like to express my sincere thanks to all the staff members of
department of E & C, S.S.I.T. for their valuable guidance & support.
Chethan H R (16EC019)
ABSTRACT
The cell phone though the mobile communication system is proved to be an
advantageous method of communication over wired communication, there is another
problem that is the mobile phones get lost or get misplaced. The losses are increasing day
by day and there has been very little effort that has been done to obtain the lost mobile
phone. The main scope for this paper is “The proposal for the detection for the lost mobile
phones.” Every day over thousands of mobile phones get misplaced and lost, though an
effective way for the blocking of the lost mobile to prevent unwanted user has been done
by the manufacturers of the mobile by usage of International Mobile Equipment Identifier
(IMEI) has been done but however there has been no development or very little progress in
this area to find the misplaced mobile phones. For the detection of lost mobile SNIFFER
plays a vital role. The sniffer device has to be designed precisely and size should be reduced
for easy mobility for the purpose of detection. The device can be called as a mobile Base
station that includes Sniffer Base station, unidirectional antenna, tracking software. The
sniffer is a small base station that includes transceiver section. It should operate at a
frequency which is much different from the frequency of the current cell in which the
operation of detection is being carried out. The directional antenna is an important device
that is to be designed and used as it plays a major role.
Keywords: International Mobile Equipment Identifier (IMEI), Detection, Base station,
Antenna.
CONTENTS
Chapter Page no
1. INTRODUCTION 1
2. LITERATURE SURVEY 2
3. TECHNICAL DETAILS 4
4. ADVANTAGES 12
5. APPLICATION 13
6. CONCLUSION 14
REFERENCES
LIST OF FIGURES
Figure Page no
Figure 3.1: Unidirectional antenna radiation pattern 5
Figure 3.2: Software Tracking 8
Figure 3.3: The initial connection between cellular network and lost mobile phone 9
Figure 3.4: Connection of the sniffer 10
Figure 3.5: The connection of the sniffer device with the lost mobile phone 10
Figure 3.6: The sniffer shown in fig tries to communicate with the lost mobile 11
SNIFFER TECHNOLGY FOR MOBILES
Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 1
1. INTRODUCTION
One of the most interesting things about cell phone is that it is really an extremely
sophisticated radio, which uses some band of frequency that has the basic working similar to
the ordinary cordless phone. The mobile cellular communication has been appreciated since its
birth in the early 70’s and the advancement in the field of VLSI has helped in designing less
power, smaller size but efficient transceiver for the purpose of communication. But however,
the technology has not yet answered the loss or misplacement of the lost mobile phone which
is significantly increasing. In this paper we discuss the problem and the probable solution that
could be done. The IMEI number is a unique number that is embedded in the mobile phone the
main purpose of which is the blocking of calls that is made by unauthorized person once the
mobile is reported as stolen but here, we use it effectively for the purpose of detection.
The Sniffer is basically a transceiver that works in the different frequency that we are
commonly used. The sniffer device has to be designed precisely and size should be reduced for
easy mobility for the purpose of detection. There are certain boundary conditions that have to
be qualified for the identification of lost mobile like the power of the mobile should be good
enough, the mobile phone should not be in the shadow region but however this method using
modern devices. It seems to be a bit costlier for initial setup but the cost is gradually reduced
when effectively and efficiently utilized for the purpose of detection.
SNIFFER TECHNOLGY FOR MOBILES
Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 2
2. LITERATURE SURVEY
Abdelallah and Elhad (2002) concluded that sniffer combines searching for machine in
promiscuous mode and using honey pot to detect potential use of sniffed information. Hence,
Sniffer Wall covers online detection as well as after the fact or information replay detection
regardless of the platform. In addition, the detection based on MAC addressing makes it
possible to detect any machine of the network which is in promiscuous mode for all Windows
platform (9x/ME, NT/2000) or on Linux platforms (kernel /2.0 to 2.4).
Patil at el. (2011) concluded that in this paper the android application for tracking the
mobile phones is created and installed in a mobile phones system. This application basically
works with the help of in-built GPS in the mobile phones. When the unknown user tries to
change the SIM card in that mobile phone, the current longitude and latitude information is
sent as SMS to the specified phone number without the knowledge of user. Using the longitude
and latitude values the exact location can be found using Google maps.
Arvind and Negi (2012) concluded that with the help of Sniffer Program a programmer
can listen computer conversation. It is the best method of detecting lost mobile.
In general,
• 42% of lost mobiles have no security in place to protect data.
• 20% of lost devices had access to work email.
• 20% contained sensitive personal information such as national insurance numbers,
addresses and dates of birth.
• 35% had access to social networking accounts via apps or web browser. Period 2004-
2011, by focusing on high-level attacks, such those to user applications.
We group existing approaches aimed at protecting mobile devices against these classes of
attacks into different categories, based upon the detection principles, architectures, collected
data and operating systems, especially focusing on IDS-based models and tools. With this
categorization we aim to provide an easy and concise view of the underlying model adopted
by each approach.
SNIFFER TECHNOLGY FOR MOBILES
Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 3
Shankar and Mahesh (2013) viewed that Distributed computing involving several
computers in a network can be achieved using message passing or remote procedure calls
(RPC). The recently developed mobile agent technology Add a new dimension to distributed
computing. Experts suggest that mobile agents will be used in many Internet applications in
the years to come. However there still exist many technical hurdles that need to be tackled, the
most important of them being security. Only when security issues are properly addressed, will
the mobile agent Technology be widely accepted. However, if intruder makes some changes in
our mobile agent platform or mobile agent, then it may fail the whole process. So, in future,
some more security measures should be taken for the guaranteed security. Mobile agent selects
any node randomly and investigates that node, if it finds excessive incoming traffic on the
network interface card then report to network administrator. So, the sniffer can be detected.
Khan (2012) concluded that the network configuration is hidden form normal users.
Network users do not have any information about nature of network. So, users of the network
may invoke sniffer detection technique which is not effective in that environment. This sniffer
detection technique provides wrong information to user which may be dangerous for him. Our
proposed invocation module checks the nature of environment automatically and then invokes
appropriate sniffer detection technique for that environment. If environment is broadcast then
ARP cache poisoning detection technique is invoked. If environment is not broadcast then
enhanced Switched network sniffer detection based on IP packet routing detection technique is
invoked to detect a sniffer. Both detection techniques are effective to detect active as well as
passive sniffer. With the help of this invocation module it is possible to detect passive as well
as active sniffer hosts in both environments automatically. Currently, we are working on
detection of an actives witch sniffer that does not response any type of ICMP echo request
packet.
SNIFFER TECHNOLGY FOR MOBILES
Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 4
3. TECHNICAL DETAILS
3.1 IMEI (INTERNATIONAL MOBILE EQUIPMENT IDENTITY):
The GSM MoU’s IMEI (International Mobile Equipment Identity) numbering system
is a 15-digit unique code that is used to identify the GSM/DCS/PCS phone. When a phone is
switched on, this unique IMEI number is transmitted and checked against a data base of black
listed or grey listed phones in the network’s EIR (Equipment ID Register). This EIR determines
whether the phone can log on to the network to make and receive calls. To know the IMEI
number the *#06# has to be pressed, the number will be displayed in the LCD screen; it is
unique to a mobile phone. If the EIR and IMEI number match, the networks can do a number
of things.
For example, grey list or blacklist a phone:
1. Grey listing will allow the phone to be used, but it can be tracked to see who has it (via the
SIM information).
2. Black listing the phone from being used on any network where there is an EIR match.
3.2 DESIGNING OF THE SNIPPER:
As stated, this proposal is about the detection of lost mobile phone and for this purpose,
we are designing a new device called the Sniffer. The sniffer device has to be designed
precisely and size should be reduced for easy mobility for the purpose of detection. The device
can be called as a mobile base station that includes the following important components:
1. Sniffer base station
2. Unidirectional antenna
3. Tracking software
3.3 SNIFFER BASE STATION:
The sniffer is a small base station, it includes transceiver section. It should operate at a
frequency that is much different from the frequency of the current cell in which the operation
of detection is being carried out.
Some of the main important things are the frequency that has to be generated by the
transceiver section is around 900MHz range which is a VHF range and it is necessarily to
design the oscillator circuit for that frequency range .Another important is the cooling that has
to be provided to the circuit while designing the circuit that is to be operated at 900MHz range
SNIFFER TECHNOLGY FOR MOBILES
Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 5
of frequency. Hence proper design of base station is an important thing in the design of the
sniffer. Mobile phones as well as the base station has low power transmitter is also transmitting
at low power. The transmitter of the sniffer has to be a low power transmitter. This helps in the
process of reducing the interference of the device with the devices that are in the other cells.
There are many available tools used to capture network traffic, but there are limitations
in some of the tools. Some tools only capture network traffic without analysis, while some
require large memory size for installation therefore the researcher has to use other tools for
analysis to get the traffic features as required and also consider the memory size of the system
in use. Our system captures network traffic and analyzes it and allows the user to take only the
features he needs. Our system requires little memory size for installation and enables the user
to store his/her selected features in a file for later use in his/her work. Consequently, this will
reduce the memory that is used to store the data. Finally, P Sniffer contains additional
functionalities like 3D pie chart statistics and possible malicious IP address detection.
3.4 DESIGN FOR UNIDIRECTIONAL ANTENNA:
Though the transceiver in a sniffer plays an important role in the detection of the mobile
phone but however it is the directional antenna that has a major role in the design of the
transmitter. The directional antenna acts as the eyes for the sniffer for the purpose of the
detecting the lost mobile phones. Hence the proper design of the directional antenna is required.
Antenna is a device which works at specified frequencies range for transmitting or receiving
the data signal. In general, antennas transmit power depending on lobe pattern which varies
from one antenna to the other. The lobe pattern is a two-dimensional diagram that is used to
show radiation pattern. Radiation pattern of directional antenna is shown in fig 3.1.
Figure 3.1: Unidirectional antenna radiation pattern
SNIFFER TECHNOLGY FOR MOBILES
Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 6
In addition to this it is necessary that the transmitter should be a low power transmitter.
The Gain and directivity are intimately related in antennas. The directivity of an antenna is a
statement of how the RF energy is focused in one or two directions. Because the amount of RF
energy remains the same, but is distributed over less area, the apparent signal strength is higher.
This apparent increase in signal strength is the antenna gain. The gain is measured in decibels
over either a dipole (dBd) or a theoretical construct called an Isotropic radiator (dBi). The
isotropic radiator is a spherical signal source that radiates equally well in all directions. One
way to view the omni directional pattern is that it is a slice taken horizontally through the three-
dimensional sphere. The graphical representation of Radiation pattern of the unidirectional
antenna is shown in figure. The spherical co-ordination system has three main components for
the pattern representation and they are (R, θ, Ф). The shape of the radiation system is
independent of R, as long R is chosen to be sufficiently large and much greater than the
wavelength as the largest dimension of the antenna. The magnitude of the field strength in any
direction varies inversely with R. A complete radiation pattern requires the three-dimensional
representation. The other factors that are to be taken into account during the development of
the antenna for the sniffer should be the gain and the directivity. As these features have a greater
effect while designing the antenna. The gain of the antenna is defined as the ability of the
antenna to radiate the power in a particular direction. The power radiated per unit area in any
direction is given by the pointing vector and is equivalent to
E2
/η2
W/m2
Total of the power that is being radiated by the antenna is given as
W=∫Φ dΩ
The average power that gets radiated is given as
Φ(avg)=W/4π (watts per steradian)
The Directivity of the antenna is the direction in which there is maximum gain for the radiation
that is being radiated, the gain of the antenna is given as a function of the angles. The directivity
value is constant for a particular direction. In addition to the directivity and the gain of the
antenna the other important thing that has to be taken into account is the power that is being
radiated by the antenna. The total power is given as W and is the summation of the radiated
power and the ohmic loss of the antenna. Here the Wl represents the ohmic losses of the
antenna.
Wt=Wr+Wl
SNIFFER TECHNOLGY FOR MOBILES
Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 7
The power gain of the antenna is given as
gp=4πΦ/wt
The ratio of power to the directivity is referred as a measure of efficiency of the antenna
gp/gd=Wr/(Wr+Wl)
The power radiated by the antenna should be properly designed as this causes more
penetration of the electromagnetic radiation and thus it might have some effect in the nearby
cells.
The effective area of the antenna is another important factor that is mainly required in the
receiving antenna and it may be referred as the effective aperture or capture area and is related
to the directive gain of the antenna through the relation
A=gdλ2
/4
Since the sniffer device that is constructed is a device that has both the transmitting and
the receiving antenna. Effective gain has to be taken into account and this shows the ability of
the antenna to capture the signal that the lost mobile is transmitting.
3.5 SOFTWARE FOR THE TRACKING:
The software part plays a major role in the tracking of the lost mobile phone it is the
base for the antenna to track the lost mobile the main feature of this software is that it helps in
the process of creation of the data base and this is mainly done using a Random Access
Memory. The mobile phone that is lost has certain IMEI number that is embedded in the chip.
This RAM of the sniffer device stores the IMEI number of the lost mobile phone. Thus this
acts as a data base or the directory of the lost mobile phone number/The software that is to be
designed in such a way that the software has the input as the IMEI number of the lost mobile
phone from the RAM and this ID done using the SQL query that fetches the IMEI number.
After getting the input of the lost mobile phones IMEI number it checks the comport for getting
the information whether it obtains any signaling information from the lost device that might
respond to the signal sent by the sniffer.
The programming is done with C or Java. However, the C is most preferred as it is
easily embedded with the chips. With VB the front end is designed. The oracle SQL is the back
end as it helps in retrieving the input data from the RAM using the query. But however, the
sample program that we have designed does not use the oracle it takes the input directly from
SNIFFER TECHNOLGY FOR MOBILES
Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 8
the keyboard and this is an example and a dummy program that has been created that helps in
the understanding of how the device would work.
Figure 3.2: Software Tracking
3.4 WORKING OF THE SNIFFER:
The sniffer is basically a transceiver that works in the frequency which is in the special
unused range that is operated by the service provided or it can designed to operate at a
frequency that is of much different frequency than the one that is being used by the nearby
cells as there may be possibility of interference by the device with the devices in the nearby
cells. The working for the device is as follows. The fig 3.3 & 3.4 shows the working of the
sniffer ; as given in the fig2 it gives the normal operation of the mobile with the base station
and there is a BTS that acts as a middle man in the process of communication between the
mobile and the MTSO which is popularly known as MSC or Mobile Switching Centre .There
is always a two way communication between devices and before the establishment of the
communication the authentication of the SIM card that has the IMSI or the International Mobile
Subscriber Identifier .This IMSI number helps in the authorization of the user. The second
authentication is the authentication of the handset, which is done in EIR or the Equipment
Identifier Register. This register is located at the MSC and it contains the IMEI number of the
lost handset and if the signal is obtained from the normal one then the two-way communication
is established.
The IMEI of the lost mobile phone number once has been reported to the service
provider, who keeps in track of the record of lost mobile phones. The MTSO or the MSC which
keeps in track of all the mobile phones with IMEI number and the IMSI number has the
information of the lost mobile phones location which means the location of the cell where the
lost device is because of the two way communication with the device the BTS of the lost device
SNIFFER TECHNOLGY FOR MOBILES
Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 9
is known to MSC. From this information regarding the cell in which the device is located the
sniffer device is introduced.
Figure 3.3: The initial connection between the cellular network and lost mobile phone
The next figure shows the sniffer that gets into work for the purpose of detection of the
lost device. After the information regarding the IMEI number of the lost device is provided by
the MTSO or MSC. This is then fed into the sniffer’s main memory the sniffer’s located in
particular cell gets into action of detecting the lost device. The sniffer uses a frequency that is
different from the one that is being used by the base station and the located nearby cells. The
base station disconnects the connection with the lost mobile phone, as there is a request
regarding this action from the EIR part of the MSC. This causes the lost device to search the
BTS to get locked with since each base station does not have authorization capability the lost
device sends appropriate connection request signal. Now when the sniffer device is being
deployed and this device has in built authorization capability the lost device finds the sniffer to
get itself locked to the frequency of the sniffer .While the connection between the sniffer and
the mobile phone is established; the IMEI of the lost mobile is validated with the stored IMEI
and after successful authorization the communication between the sniffer and the lost device is
established. If the other devices in the same try to communicate with the sniffer the access is
denied and this is done at the validation done based on the IME. Once the communication starts
it is mainly with the antenna and the signal strength of the lost device the location can be
SNIFFER TECHNOLGY FOR MOBILES
Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 10
tracked. However, the process to searching can also be aided with the GPS system for more
accurate and fast detection.
The main requirement is that the sniffer is operated in a frequency that is different from
the frequency adopted by the cell and nearby ones. Hence the interference from the nearby cell
can be avoided. The directional antenna is used in finding the location of the mobile phone.
Figure 3.4: Connection of the sniffer
Figure 3.5: The connection of the sniffer device with the lost mobile phone.
Here the signal strength of the received signal is obtained and antenna pattern is plotted
once the signal of the mobile is obtained. The no. of antenna pattern for different position of
same mobile phone is used to find the exact location. But however, in this method the
directional antenna used much be of a very small beam width this helps in more accurate
process of detection.
SNIFFER TECHNOLGY FOR MOBILES
Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 11
Figure 3.6: The sniffer shown in fig tries to communicate with the lost mobile.
The sniffer shown in fig 3.6 tries to communicate with the lost mobile. After getting
connected with the mobile it creates a virtual cell pattern and thus helps in the detection of lost
mobile phones.
SNIFFER TECHNOLGY FOR MOBILES
Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 12
4. ADVANTAGES:
 It is used for detecting lost mobiles.
 It is cost effective.
 It is good for low power consumption.
 It is easy to design.
SNIFFER TECHNOLGY FOR MOBILES
Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 13
5. APPLICATIONS:
In common industry usage, a sniffer is a program that monitors and analyzes network
traffic, detecting bottlenecks and problems.
 Using this information, a network manager can keep traffic flowing efficiently.
 A sniffer can also be used legitimately or illegitimately to capture data being
transmitted on a network. A network router reads every packet of data passed to it,
determining whether it is intended for a destination within the router's own network
or whether it should be passed further along the internet.
 A router with a sniffer, however, may be able to read the data in the packet as well
as the source and destination addresses.
 Sniffers are often used on academic networks to prevent traffic bottlenecks caused
by filesharing applications.
SNIFFER TECHNOLGY FOR MOBILES
Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 14
6. CONCLUSION
Sniffer technology is very useful in case of the mobile stealing. This technology works on
the frequency that is usually used for military purposes. The technology contains its tracking
software that make it very popular among theft detecting techniques. The design involved the
following steps:
· Design of a sniffer base station.
· Design of unidirectional antenna.
· Development of software for tracking a lost mobile phone.
The idea of development “Sniffer for the detection of lost Mobile phones” paves away by
means of which the lost mobile phones can be recovered. Let all of us hope for the advancement
of the technology in this domain which will be very helpful for each and every person who are
lost mobiles. Though this method appears little bit complex involving the design of the sniffer
but however the large-scale detection the overall effective cost of the design and detection
scales down. Though there are certain boundary conditions or criteria that have to be qualified
for the identification of lost mobile like the power of the mobile should be good enough. The
mobile phone should not be in the shadow region etc., but however this method can be
improved by using modern technologies and devices.
REFERENCES:
[1] Network Sniffers, Alan Joch, 2001(Intro&Use.doc).
[2] http://www.infoworld.com/articles/tc/xml/01/12/03/011203tcpackets.
[3] Mathiew Tanase, 2002 (Security Focus Home in focus Sniffers what they are and how to
protect yourself.htm).
[4] Muna, M., Jawhar, T. & Mehrotra, M. (2010). System Design for Packet Sniffer.
[5] John D Kraus, “Electromagnetics”, TMH.
[6] Schiller, “Mobile Communication”, Pearson Education 1 Edition, 7th reprint -2003.
[7] S. Satya Sri Ambica, P. Padma Priya, Dr.N. Srinivasu, “Sniffer Technology to Detect Lost
Mobile”, International Journal of Engineering Trends & Technology, volume 4, issue4 –April 2013.
[8] Uthiyavan, U., “Enhancing User Privacy- Location Based Search Using MEMD”, IEEE
International Conference on Portable Information Devices 2007, May 2007, Pp-1-5.

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- Solar Powered Multifunctional Agricultural Robot
IRJET-  	  Solar Powered Multifunctional Agricultural RobotIRJET-  	  Solar Powered Multifunctional Agricultural Robot
IRJET- Solar Powered Multifunctional Agricultural RobotIRJET Journal
 
Eye phone .1
Eye phone .1Eye phone .1
Eye phone .1nivi6
 
Microsoft HoloLens
Microsoft HoloLens Microsoft HoloLens
Microsoft HoloLens Abhijith M.B
 
Wireless charging of mobile PPT.
Wireless charging of mobile PPT.Wireless charging of mobile PPT.
Wireless charging of mobile PPT.Krishna Teja
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial IntelligenceBikas Sadashiv
 
BRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE DocumentationBRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE DocumentationBhadra Gowdra
 
Human-Robot Interaction Based On Gesture Identification
Human-Robot Interaction Based On Gesture IdentificationHuman-Robot Interaction Based On Gesture Identification
Human-Robot Interaction Based On Gesture IdentificationRestin S Edackattil
 
How artificial intelligence (ai) is transforming mobile technology
How artificial intelligence (ai) is transforming mobile technology How artificial intelligence (ai) is transforming mobile technology
How artificial intelligence (ai) is transforming mobile technology Brainmobiservice
 
Recent technology in the field of computer science
Recent technology in the field of computer scienceRecent technology in the field of computer science
Recent technology in the field of computer scienceRamya SK
 
Artificial Intelligence ppt
Artificial Intelligence pptArtificial Intelligence ppt
Artificial Intelligence pptMd. Ismail Khan
 
A paper presentation abstract
A paper presentation abstractA paper presentation abstract
A paper presentation abstractJagadeesh Kumar
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobilesAbhishek Abhi
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligenceRahul Baghla
 
A.I. and Robots in the Workplace
A.I. and Robots in the WorkplaceA.I. and Robots in the Workplace
A.I. and Robots in the WorkplaceManpreet Singh Bedi
 
Internet of Things (Iot) Based Robotic Arm
Internet of Things (Iot) Based Robotic ArmInternet of Things (Iot) Based Robotic Arm
Internet of Things (Iot) Based Robotic ArmIRJET Journal
 

Was ist angesagt? (20)

IRJET- Solar Powered Multifunctional Agricultural Robot
IRJET-  	  Solar Powered Multifunctional Agricultural RobotIRJET-  	  Solar Powered Multifunctional Agricultural Robot
IRJET- Solar Powered Multifunctional Agricultural Robot
 
Eye phone .1
Eye phone .1Eye phone .1
Eye phone .1
 
Microsoft HoloLens
Microsoft HoloLens Microsoft HoloLens
Microsoft HoloLens
 
Wireless charging of mobile PPT.
Wireless charging of mobile PPT.Wireless charging of mobile PPT.
Wireless charging of mobile PPT.
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Silent Sound Technology
Silent Sound TechnologySilent Sound Technology
Silent Sound Technology
 
BRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE DocumentationBRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE Documentation
 
Human-Robot Interaction Based On Gesture Identification
Human-Robot Interaction Based On Gesture IdentificationHuman-Robot Interaction Based On Gesture Identification
Human-Robot Interaction Based On Gesture Identification
 
How artificial intelligence (ai) is transforming mobile technology
How artificial intelligence (ai) is transforming mobile technology How artificial intelligence (ai) is transforming mobile technology
How artificial intelligence (ai) is transforming mobile technology
 
Recent technology in the field of computer science
Recent technology in the field of computer scienceRecent technology in the field of computer science
Recent technology in the field of computer science
 
Artificial Intelligence ppt
Artificial Intelligence pptArtificial Intelligence ppt
Artificial Intelligence ppt
 
A paper presentation abstract
A paper presentation abstractA paper presentation abstract
A paper presentation abstract
 
Smart city report
Smart city reportSmart city report
Smart city report
 
Sophia - The Robot
Sophia - The RobotSophia - The Robot
Sophia - The Robot
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Wireless electricity
Wireless electricityWireless electricity
Wireless electricity
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
A.I. and Robots in the Workplace
A.I. and Robots in the WorkplaceA.I. and Robots in the Workplace
A.I. and Robots in the Workplace
 
Internet of Things (Iot) Based Robotic Arm
Internet of Things (Iot) Based Robotic ArmInternet of Things (Iot) Based Robotic Arm
Internet of Things (Iot) Based Robotic Arm
 

Ähnlich wie Sniffer Technology Complete Report

IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET Journal
 
IRJET- Gesture Drawing Android Application for Visually-Impaired People
IRJET- Gesture Drawing Android Application for Visually-Impaired PeopleIRJET- Gesture Drawing Android Application for Visually-Impaired People
IRJET- Gesture Drawing Android Application for Visually-Impaired PeopleIRJET Journal
 
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...IRJET Journal
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONIRJET Journal
 
digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone dataINFOGAIN PUBLICATION
 
F B ASED T ALKING S IGNAGE FOR B LIND N AVIGATION
F B ASED  T ALKING  S IGNAGE FOR  B LIND  N AVIGATIONF B ASED  T ALKING  S IGNAGE FOR  B LIND  N AVIGATION
F B ASED T ALKING S IGNAGE FOR B LIND N AVIGATIONIJCI JOURNAL
 
Indoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beaconsIndoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beaconsIRJET Journal
 
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...IRJET Journal
 
Automatic Frequency Planning &Amp; Optimization
Automatic Frequency Planning &Amp; OptimizationAutomatic Frequency Planning &Amp; Optimization
Automatic Frequency Planning &Amp; OptimizationKristen Wilson
 
Smart ID for Blind People’s
Smart ID for Blind People’sSmart ID for Blind People’s
Smart ID for Blind People’sIRJET Journal
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET Journal
 
IRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET Journal
 
IRJET- Mobile Detector
IRJET-  	  Mobile DetectorIRJET-  	  Mobile Detector
IRJET- Mobile DetectorIRJET Journal
 
IRJET- Intelligent Manhole Cover System
IRJET- Intelligent Manhole Cover SystemIRJET- Intelligent Manhole Cover System
IRJET- Intelligent Manhole Cover SystemIRJET Journal
 
Mobile Phone Exposure And Carcinogenesis Essay
Mobile Phone Exposure And Carcinogenesis EssayMobile Phone Exposure And Carcinogenesis Essay
Mobile Phone Exposure And Carcinogenesis EssayDebra Perea
 
Leveraging the Power of Smartphones: Real Time Monitoring of Water Points
Leveraging the Power of Smartphones: Real Time Monitoring of Water PointsLeveraging the Power of Smartphones: Real Time Monitoring of Water Points
Leveraging the Power of Smartphones: Real Time Monitoring of Water PointsIJERA Editor
 
IRJET- SMS based Mobile Technology
IRJET- SMS based Mobile TechnologyIRJET- SMS based Mobile Technology
IRJET- SMS based Mobile TechnologyIRJET Journal
 
IRJET - SMS based Data Retreival System
IRJET - SMS based Data Retreival SystemIRJET - SMS based Data Retreival System
IRJET - SMS based Data Retreival SystemIRJET Journal
 
SNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILESSNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILESChaitanya Ram
 
11.[106 118]design and implementation of a short message service based remote...
11.[106 118]design and implementation of a short message service based remote...11.[106 118]design and implementation of a short message service based remote...
11.[106 118]design and implementation of a short message service based remote...Alexander Decker
 

Ähnlich wie Sniffer Technology Complete Report (20)

IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost Mobile
 
IRJET- Gesture Drawing Android Application for Visually-Impaired People
IRJET- Gesture Drawing Android Application for Visually-Impaired PeopleIRJET- Gesture Drawing Android Application for Visually-Impaired People
IRJET- Gesture Drawing Android Application for Visually-Impaired People
 
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
 
digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone data
 
F B ASED T ALKING S IGNAGE FOR B LIND N AVIGATION
F B ASED  T ALKING  S IGNAGE FOR  B LIND  N AVIGATIONF B ASED  T ALKING  S IGNAGE FOR  B LIND  N AVIGATION
F B ASED T ALKING S IGNAGE FOR B LIND N AVIGATION
 
Indoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beaconsIndoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beacons
 
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
 
Automatic Frequency Planning &Amp; Optimization
Automatic Frequency Planning &Amp; OptimizationAutomatic Frequency Planning &Amp; Optimization
Automatic Frequency Planning &Amp; Optimization
 
Smart ID for Blind People’s
Smart ID for Blind People’sSmart ID for Blind People’s
Smart ID for Blind People’s
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
 
IRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management System
 
IRJET- Mobile Detector
IRJET-  	  Mobile DetectorIRJET-  	  Mobile Detector
IRJET- Mobile Detector
 
IRJET- Intelligent Manhole Cover System
IRJET- Intelligent Manhole Cover SystemIRJET- Intelligent Manhole Cover System
IRJET- Intelligent Manhole Cover System
 
Mobile Phone Exposure And Carcinogenesis Essay
Mobile Phone Exposure And Carcinogenesis EssayMobile Phone Exposure And Carcinogenesis Essay
Mobile Phone Exposure And Carcinogenesis Essay
 
Leveraging the Power of Smartphones: Real Time Monitoring of Water Points
Leveraging the Power of Smartphones: Real Time Monitoring of Water PointsLeveraging the Power of Smartphones: Real Time Monitoring of Water Points
Leveraging the Power of Smartphones: Real Time Monitoring of Water Points
 
IRJET- SMS based Mobile Technology
IRJET- SMS based Mobile TechnologyIRJET- SMS based Mobile Technology
IRJET- SMS based Mobile Technology
 
IRJET - SMS based Data Retreival System
IRJET - SMS based Data Retreival SystemIRJET - SMS based Data Retreival System
IRJET - SMS based Data Retreival System
 
SNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILESSNIFFER FOR DETECTING LOST MOBILES
SNIFFER FOR DETECTING LOST MOBILES
 
11.[106 118]design and implementation of a short message service based remote...
11.[106 118]design and implementation of a short message service based remote...11.[106 118]design and implementation of a short message service based remote...
11.[106 118]design and implementation of a short message service based remote...
 

Kürzlich hochgeladen

COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 

Kürzlich hochgeladen (20)

COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 

Sniffer Technology Complete Report

  • 1. SRI SIDDHARTHA ACADEMY OF HIGHER EDUCATION (Declared as Deemed to be University Under Section 3 of the UGC Act, 1956) AGALKOTE, TUMKUR – 572107 KARNATAKA Technical Seminar Report On “SNIFFER TECHNOLOGY FOR MOBILES” Submitted by Chethan H R (16EC019) Under the Guidance of Dr. M N Eshwarappa Mrs. Savitha C Professor, Dept. of E&C Assistant Prof., Dept. of E&C, SSIT, Tumkur-572 105 SSIT, Tumkur-572 105 In partial fulfillment of BACHELOR OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY (A Constituent College of Sri Siddhartha Academy of Higher Education) MARALUR, TUMKUR-572105 2019-20
  • 2. ACKNOWLEDGEMENT The satisfaction and euphoria that accompany the successful completion of any task would be incomplete without mention of the people who made it possible and support had been a constant source of encouragement which crowned my efforts with success. I am deeply indebted and would like to express my sincere thanks to our beloved Principal Dr. M.S. Raviprakasha, for providing me an opportunity to do this seminar. My special gratitude to Dr. M.Z. Kurian, HOD, department of E & C, S.S.I.T for his guidance, constant encouragement and wholehearted support. My sincere thanks to my guides Dr. M.N. Eshwarappa and Mrs. Savitha C, department of E & C, S.S.I.T for their guidance, constant encouragement and wholehearted support. Finally, I would like to express my sincere thanks to all the staff members of department of E & C, S.S.I.T. for their valuable guidance & support. Chethan H R (16EC019)
  • 3. ABSTRACT The cell phone though the mobile communication system is proved to be an advantageous method of communication over wired communication, there is another problem that is the mobile phones get lost or get misplaced. The losses are increasing day by day and there has been very little effort that has been done to obtain the lost mobile phone. The main scope for this paper is “The proposal for the detection for the lost mobile phones.” Every day over thousands of mobile phones get misplaced and lost, though an effective way for the blocking of the lost mobile to prevent unwanted user has been done by the manufacturers of the mobile by usage of International Mobile Equipment Identifier (IMEI) has been done but however there has been no development or very little progress in this area to find the misplaced mobile phones. For the detection of lost mobile SNIFFER plays a vital role. The sniffer device has to be designed precisely and size should be reduced for easy mobility for the purpose of detection. The device can be called as a mobile Base station that includes Sniffer Base station, unidirectional antenna, tracking software. The sniffer is a small base station that includes transceiver section. It should operate at a frequency which is much different from the frequency of the current cell in which the operation of detection is being carried out. The directional antenna is an important device that is to be designed and used as it plays a major role. Keywords: International Mobile Equipment Identifier (IMEI), Detection, Base station, Antenna.
  • 4. CONTENTS Chapter Page no 1. INTRODUCTION 1 2. LITERATURE SURVEY 2 3. TECHNICAL DETAILS 4 4. ADVANTAGES 12 5. APPLICATION 13 6. CONCLUSION 14 REFERENCES
  • 5. LIST OF FIGURES Figure Page no Figure 3.1: Unidirectional antenna radiation pattern 5 Figure 3.2: Software Tracking 8 Figure 3.3: The initial connection between cellular network and lost mobile phone 9 Figure 3.4: Connection of the sniffer 10 Figure 3.5: The connection of the sniffer device with the lost mobile phone 10 Figure 3.6: The sniffer shown in fig tries to communicate with the lost mobile 11
  • 6. SNIFFER TECHNOLGY FOR MOBILES Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 1 1. INTRODUCTION One of the most interesting things about cell phone is that it is really an extremely sophisticated radio, which uses some band of frequency that has the basic working similar to the ordinary cordless phone. The mobile cellular communication has been appreciated since its birth in the early 70’s and the advancement in the field of VLSI has helped in designing less power, smaller size but efficient transceiver for the purpose of communication. But however, the technology has not yet answered the loss or misplacement of the lost mobile phone which is significantly increasing. In this paper we discuss the problem and the probable solution that could be done. The IMEI number is a unique number that is embedded in the mobile phone the main purpose of which is the blocking of calls that is made by unauthorized person once the mobile is reported as stolen but here, we use it effectively for the purpose of detection. The Sniffer is basically a transceiver that works in the different frequency that we are commonly used. The sniffer device has to be designed precisely and size should be reduced for easy mobility for the purpose of detection. There are certain boundary conditions that have to be qualified for the identification of lost mobile like the power of the mobile should be good enough, the mobile phone should not be in the shadow region but however this method using modern devices. It seems to be a bit costlier for initial setup but the cost is gradually reduced when effectively and efficiently utilized for the purpose of detection.
  • 7. SNIFFER TECHNOLGY FOR MOBILES Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 2 2. LITERATURE SURVEY Abdelallah and Elhad (2002) concluded that sniffer combines searching for machine in promiscuous mode and using honey pot to detect potential use of sniffed information. Hence, Sniffer Wall covers online detection as well as after the fact or information replay detection regardless of the platform. In addition, the detection based on MAC addressing makes it possible to detect any machine of the network which is in promiscuous mode for all Windows platform (9x/ME, NT/2000) or on Linux platforms (kernel /2.0 to 2.4). Patil at el. (2011) concluded that in this paper the android application for tracking the mobile phones is created and installed in a mobile phones system. This application basically works with the help of in-built GPS in the mobile phones. When the unknown user tries to change the SIM card in that mobile phone, the current longitude and latitude information is sent as SMS to the specified phone number without the knowledge of user. Using the longitude and latitude values the exact location can be found using Google maps. Arvind and Negi (2012) concluded that with the help of Sniffer Program a programmer can listen computer conversation. It is the best method of detecting lost mobile. In general, • 42% of lost mobiles have no security in place to protect data. • 20% of lost devices had access to work email. • 20% contained sensitive personal information such as national insurance numbers, addresses and dates of birth. • 35% had access to social networking accounts via apps or web browser. Period 2004- 2011, by focusing on high-level attacks, such those to user applications. We group existing approaches aimed at protecting mobile devices against these classes of attacks into different categories, based upon the detection principles, architectures, collected data and operating systems, especially focusing on IDS-based models and tools. With this categorization we aim to provide an easy and concise view of the underlying model adopted by each approach.
  • 8. SNIFFER TECHNOLGY FOR MOBILES Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 3 Shankar and Mahesh (2013) viewed that Distributed computing involving several computers in a network can be achieved using message passing or remote procedure calls (RPC). The recently developed mobile agent technology Add a new dimension to distributed computing. Experts suggest that mobile agents will be used in many Internet applications in the years to come. However there still exist many technical hurdles that need to be tackled, the most important of them being security. Only when security issues are properly addressed, will the mobile agent Technology be widely accepted. However, if intruder makes some changes in our mobile agent platform or mobile agent, then it may fail the whole process. So, in future, some more security measures should be taken for the guaranteed security. Mobile agent selects any node randomly and investigates that node, if it finds excessive incoming traffic on the network interface card then report to network administrator. So, the sniffer can be detected. Khan (2012) concluded that the network configuration is hidden form normal users. Network users do not have any information about nature of network. So, users of the network may invoke sniffer detection technique which is not effective in that environment. This sniffer detection technique provides wrong information to user which may be dangerous for him. Our proposed invocation module checks the nature of environment automatically and then invokes appropriate sniffer detection technique for that environment. If environment is broadcast then ARP cache poisoning detection technique is invoked. If environment is not broadcast then enhanced Switched network sniffer detection based on IP packet routing detection technique is invoked to detect a sniffer. Both detection techniques are effective to detect active as well as passive sniffer. With the help of this invocation module it is possible to detect passive as well as active sniffer hosts in both environments automatically. Currently, we are working on detection of an actives witch sniffer that does not response any type of ICMP echo request packet.
  • 9. SNIFFER TECHNOLGY FOR MOBILES Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 4 3. TECHNICAL DETAILS 3.1 IMEI (INTERNATIONAL MOBILE EQUIPMENT IDENTITY): The GSM MoU’s IMEI (International Mobile Equipment Identity) numbering system is a 15-digit unique code that is used to identify the GSM/DCS/PCS phone. When a phone is switched on, this unique IMEI number is transmitted and checked against a data base of black listed or grey listed phones in the network’s EIR (Equipment ID Register). This EIR determines whether the phone can log on to the network to make and receive calls. To know the IMEI number the *#06# has to be pressed, the number will be displayed in the LCD screen; it is unique to a mobile phone. If the EIR and IMEI number match, the networks can do a number of things. For example, grey list or blacklist a phone: 1. Grey listing will allow the phone to be used, but it can be tracked to see who has it (via the SIM information). 2. Black listing the phone from being used on any network where there is an EIR match. 3.2 DESIGNING OF THE SNIPPER: As stated, this proposal is about the detection of lost mobile phone and for this purpose, we are designing a new device called the Sniffer. The sniffer device has to be designed precisely and size should be reduced for easy mobility for the purpose of detection. The device can be called as a mobile base station that includes the following important components: 1. Sniffer base station 2. Unidirectional antenna 3. Tracking software 3.3 SNIFFER BASE STATION: The sniffer is a small base station, it includes transceiver section. It should operate at a frequency that is much different from the frequency of the current cell in which the operation of detection is being carried out. Some of the main important things are the frequency that has to be generated by the transceiver section is around 900MHz range which is a VHF range and it is necessarily to design the oscillator circuit for that frequency range .Another important is the cooling that has to be provided to the circuit while designing the circuit that is to be operated at 900MHz range
  • 10. SNIFFER TECHNOLGY FOR MOBILES Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 5 of frequency. Hence proper design of base station is an important thing in the design of the sniffer. Mobile phones as well as the base station has low power transmitter is also transmitting at low power. The transmitter of the sniffer has to be a low power transmitter. This helps in the process of reducing the interference of the device with the devices that are in the other cells. There are many available tools used to capture network traffic, but there are limitations in some of the tools. Some tools only capture network traffic without analysis, while some require large memory size for installation therefore the researcher has to use other tools for analysis to get the traffic features as required and also consider the memory size of the system in use. Our system captures network traffic and analyzes it and allows the user to take only the features he needs. Our system requires little memory size for installation and enables the user to store his/her selected features in a file for later use in his/her work. Consequently, this will reduce the memory that is used to store the data. Finally, P Sniffer contains additional functionalities like 3D pie chart statistics and possible malicious IP address detection. 3.4 DESIGN FOR UNIDIRECTIONAL ANTENNA: Though the transceiver in a sniffer plays an important role in the detection of the mobile phone but however it is the directional antenna that has a major role in the design of the transmitter. The directional antenna acts as the eyes for the sniffer for the purpose of the detecting the lost mobile phones. Hence the proper design of the directional antenna is required. Antenna is a device which works at specified frequencies range for transmitting or receiving the data signal. In general, antennas transmit power depending on lobe pattern which varies from one antenna to the other. The lobe pattern is a two-dimensional diagram that is used to show radiation pattern. Radiation pattern of directional antenna is shown in fig 3.1. Figure 3.1: Unidirectional antenna radiation pattern
  • 11. SNIFFER TECHNOLGY FOR MOBILES Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 6 In addition to this it is necessary that the transmitter should be a low power transmitter. The Gain and directivity are intimately related in antennas. The directivity of an antenna is a statement of how the RF energy is focused in one or two directions. Because the amount of RF energy remains the same, but is distributed over less area, the apparent signal strength is higher. This apparent increase in signal strength is the antenna gain. The gain is measured in decibels over either a dipole (dBd) or a theoretical construct called an Isotropic radiator (dBi). The isotropic radiator is a spherical signal source that radiates equally well in all directions. One way to view the omni directional pattern is that it is a slice taken horizontally through the three- dimensional sphere. The graphical representation of Radiation pattern of the unidirectional antenna is shown in figure. The spherical co-ordination system has three main components for the pattern representation and they are (R, θ, Ф). The shape of the radiation system is independent of R, as long R is chosen to be sufficiently large and much greater than the wavelength as the largest dimension of the antenna. The magnitude of the field strength in any direction varies inversely with R. A complete radiation pattern requires the three-dimensional representation. The other factors that are to be taken into account during the development of the antenna for the sniffer should be the gain and the directivity. As these features have a greater effect while designing the antenna. The gain of the antenna is defined as the ability of the antenna to radiate the power in a particular direction. The power radiated per unit area in any direction is given by the pointing vector and is equivalent to E2 /η2 W/m2 Total of the power that is being radiated by the antenna is given as W=∫Φ dΩ The average power that gets radiated is given as Φ(avg)=W/4π (watts per steradian) The Directivity of the antenna is the direction in which there is maximum gain for the radiation that is being radiated, the gain of the antenna is given as a function of the angles. The directivity value is constant for a particular direction. In addition to the directivity and the gain of the antenna the other important thing that has to be taken into account is the power that is being radiated by the antenna. The total power is given as W and is the summation of the radiated power and the ohmic loss of the antenna. Here the Wl represents the ohmic losses of the antenna. Wt=Wr+Wl
  • 12. SNIFFER TECHNOLGY FOR MOBILES Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 7 The power gain of the antenna is given as gp=4πΦ/wt The ratio of power to the directivity is referred as a measure of efficiency of the antenna gp/gd=Wr/(Wr+Wl) The power radiated by the antenna should be properly designed as this causes more penetration of the electromagnetic radiation and thus it might have some effect in the nearby cells. The effective area of the antenna is another important factor that is mainly required in the receiving antenna and it may be referred as the effective aperture or capture area and is related to the directive gain of the antenna through the relation A=gdλ2 /4 Since the sniffer device that is constructed is a device that has both the transmitting and the receiving antenna. Effective gain has to be taken into account and this shows the ability of the antenna to capture the signal that the lost mobile is transmitting. 3.5 SOFTWARE FOR THE TRACKING: The software part plays a major role in the tracking of the lost mobile phone it is the base for the antenna to track the lost mobile the main feature of this software is that it helps in the process of creation of the data base and this is mainly done using a Random Access Memory. The mobile phone that is lost has certain IMEI number that is embedded in the chip. This RAM of the sniffer device stores the IMEI number of the lost mobile phone. Thus this acts as a data base or the directory of the lost mobile phone number/The software that is to be designed in such a way that the software has the input as the IMEI number of the lost mobile phone from the RAM and this ID done using the SQL query that fetches the IMEI number. After getting the input of the lost mobile phones IMEI number it checks the comport for getting the information whether it obtains any signaling information from the lost device that might respond to the signal sent by the sniffer. The programming is done with C or Java. However, the C is most preferred as it is easily embedded with the chips. With VB the front end is designed. The oracle SQL is the back end as it helps in retrieving the input data from the RAM using the query. But however, the sample program that we have designed does not use the oracle it takes the input directly from
  • 13. SNIFFER TECHNOLGY FOR MOBILES Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 8 the keyboard and this is an example and a dummy program that has been created that helps in the understanding of how the device would work. Figure 3.2: Software Tracking 3.4 WORKING OF THE SNIFFER: The sniffer is basically a transceiver that works in the frequency which is in the special unused range that is operated by the service provided or it can designed to operate at a frequency that is of much different frequency than the one that is being used by the nearby cells as there may be possibility of interference by the device with the devices in the nearby cells. The working for the device is as follows. The fig 3.3 & 3.4 shows the working of the sniffer ; as given in the fig2 it gives the normal operation of the mobile with the base station and there is a BTS that acts as a middle man in the process of communication between the mobile and the MTSO which is popularly known as MSC or Mobile Switching Centre .There is always a two way communication between devices and before the establishment of the communication the authentication of the SIM card that has the IMSI or the International Mobile Subscriber Identifier .This IMSI number helps in the authorization of the user. The second authentication is the authentication of the handset, which is done in EIR or the Equipment Identifier Register. This register is located at the MSC and it contains the IMEI number of the lost handset and if the signal is obtained from the normal one then the two-way communication is established. The IMEI of the lost mobile phone number once has been reported to the service provider, who keeps in track of the record of lost mobile phones. The MTSO or the MSC which keeps in track of all the mobile phones with IMEI number and the IMSI number has the information of the lost mobile phones location which means the location of the cell where the lost device is because of the two way communication with the device the BTS of the lost device
  • 14. SNIFFER TECHNOLGY FOR MOBILES Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 9 is known to MSC. From this information regarding the cell in which the device is located the sniffer device is introduced. Figure 3.3: The initial connection between the cellular network and lost mobile phone The next figure shows the sniffer that gets into work for the purpose of detection of the lost device. After the information regarding the IMEI number of the lost device is provided by the MTSO or MSC. This is then fed into the sniffer’s main memory the sniffer’s located in particular cell gets into action of detecting the lost device. The sniffer uses a frequency that is different from the one that is being used by the base station and the located nearby cells. The base station disconnects the connection with the lost mobile phone, as there is a request regarding this action from the EIR part of the MSC. This causes the lost device to search the BTS to get locked with since each base station does not have authorization capability the lost device sends appropriate connection request signal. Now when the sniffer device is being deployed and this device has in built authorization capability the lost device finds the sniffer to get itself locked to the frequency of the sniffer .While the connection between the sniffer and the mobile phone is established; the IMEI of the lost mobile is validated with the stored IMEI and after successful authorization the communication between the sniffer and the lost device is established. If the other devices in the same try to communicate with the sniffer the access is denied and this is done at the validation done based on the IME. Once the communication starts it is mainly with the antenna and the signal strength of the lost device the location can be
  • 15. SNIFFER TECHNOLGY FOR MOBILES Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 10 tracked. However, the process to searching can also be aided with the GPS system for more accurate and fast detection. The main requirement is that the sniffer is operated in a frequency that is different from the frequency adopted by the cell and nearby ones. Hence the interference from the nearby cell can be avoided. The directional antenna is used in finding the location of the mobile phone. Figure 3.4: Connection of the sniffer Figure 3.5: The connection of the sniffer device with the lost mobile phone. Here the signal strength of the received signal is obtained and antenna pattern is plotted once the signal of the mobile is obtained. The no. of antenna pattern for different position of same mobile phone is used to find the exact location. But however, in this method the directional antenna used much be of a very small beam width this helps in more accurate process of detection.
  • 16. SNIFFER TECHNOLGY FOR MOBILES Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 11 Figure 3.6: The sniffer shown in fig tries to communicate with the lost mobile. The sniffer shown in fig 3.6 tries to communicate with the lost mobile. After getting connected with the mobile it creates a virtual cell pattern and thus helps in the detection of lost mobile phones.
  • 17. SNIFFER TECHNOLGY FOR MOBILES Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 12 4. ADVANTAGES:  It is used for detecting lost mobiles.  It is cost effective.  It is good for low power consumption.  It is easy to design.
  • 18. SNIFFER TECHNOLGY FOR MOBILES Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 13 5. APPLICATIONS: In common industry usage, a sniffer is a program that monitors and analyzes network traffic, detecting bottlenecks and problems.  Using this information, a network manager can keep traffic flowing efficiently.  A sniffer can also be used legitimately or illegitimately to capture data being transmitted on a network. A network router reads every packet of data passed to it, determining whether it is intended for a destination within the router's own network or whether it should be passed further along the internet.  A router with a sniffer, however, may be able to read the data in the packet as well as the source and destination addresses.  Sniffers are often used on academic networks to prevent traffic bottlenecks caused by filesharing applications.
  • 19. SNIFFER TECHNOLGY FOR MOBILES Dept. of E&C, SSIT, TUMAKURU 2019-20 Page 14 6. CONCLUSION Sniffer technology is very useful in case of the mobile stealing. This technology works on the frequency that is usually used for military purposes. The technology contains its tracking software that make it very popular among theft detecting techniques. The design involved the following steps: · Design of a sniffer base station. · Design of unidirectional antenna. · Development of software for tracking a lost mobile phone. The idea of development “Sniffer for the detection of lost Mobile phones” paves away by means of which the lost mobile phones can be recovered. Let all of us hope for the advancement of the technology in this domain which will be very helpful for each and every person who are lost mobiles. Though this method appears little bit complex involving the design of the sniffer but however the large-scale detection the overall effective cost of the design and detection scales down. Though there are certain boundary conditions or criteria that have to be qualified for the identification of lost mobile like the power of the mobile should be good enough. The mobile phone should not be in the shadow region etc., but however this method can be improved by using modern technologies and devices.
  • 20. REFERENCES: [1] Network Sniffers, Alan Joch, 2001(Intro&Use.doc). [2] http://www.infoworld.com/articles/tc/xml/01/12/03/011203tcpackets. [3] Mathiew Tanase, 2002 (Security Focus Home in focus Sniffers what they are and how to protect yourself.htm). [4] Muna, M., Jawhar, T. & Mehrotra, M. (2010). System Design for Packet Sniffer. [5] John D Kraus, “Electromagnetics”, TMH. [6] Schiller, “Mobile Communication”, Pearson Education 1 Edition, 7th reprint -2003. [7] S. Satya Sri Ambica, P. Padma Priya, Dr.N. Srinivasu, “Sniffer Technology to Detect Lost Mobile”, International Journal of Engineering Trends & Technology, volume 4, issue4 –April 2013. [8] Uthiyavan, U., “Enhancing User Privacy- Location Based Search Using MEMD”, IEEE International Conference on Portable Information Devices 2007, May 2007, Pp-1-5.