SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Visvesvaraya Technological University
Jnana Sangama, Belgaum
Seminar On
SNIFFERS
Under the guidance of By,
Department of Information Science and Engineering
Rajiv Gandhi Institute of Technology
Cholanagar, R T Nagar Post, Bangalore-32
SNIFFER FOR
DETECTING LOST
MOBILE PHONES
Presented by,
CONTENTS
• Introduction
• What sniffer is ?
• IMEI
• Designing for the sniffer
 Sniffer base station
 Unidirectional Antenna
 Software Tracking
• Working of sniffer device
• Advantages
• Conclusion
• References
DEPT OF ISE RGIT,B'LORE 3
INTRODUCTION
• The main scope is to detect the lost mobiles.
• Each and every day thousands of mobiles get
misplaced or lost, though effective way for the
blocking of the lost mobile.
• To prevent unauthorized person from making and
receiving the calls has been done by the
manufacturers of the mobile with the help of IMEI
number.
DEPT OF ISE RGIT,B'LORE 4
CONT’D….
• For the detection of lost mobile SNIFFER plays a vital role .
• The sniffer device has to be designed precisely and size should
be reduced for easy mobility for the purpose of detection .
DEPT OF ISE RGIT,B'LORE 5
What a SNIFFER is?
• The sniffer is basically a transceiver that works in the frequency
which is in the special unused range that is operated by the
service provided or it can designed to operate at a frequency
that is of much different frequency than the one that is being
used.
DEPT OF ISE RGIT,B'LORE 6
INTRODUCTION TO IMEI
• Each mobile device has a globally unique IMEI
(International Mobile Equipment Identity)
• IMEI (International Mobile Equipment Identity)
numbering system is a 15 digit unique code that is
used to identify the GSM phone
• To know the IMEI number the *#06# has to be
pressed, the number will be displayed in the LCD
screen
DEPT OF ISE RGIT,B'LORE 7
CONT’D….
• When a phone is switched on, this unique IMEI number is
transmitted and checked against a data base of black
listed or grey listed phones in the network’s EIR
• Grey listing will allow the phone to be used, but it can be
tracked to see who has it (via the SIM information).
• Black listing the phone from being used on any network
where there is an EIR match.
DEPT OF ISE RGIT,B'LORE 8
DESIGNING FOR THE SNIFFER
• The sniffer device can be called as a mobile base station that
includes the following important components:
 Sniffer base station
 Unidirectional antenna
 Tracking software
DEPT OF ISE RGIT,B'LORE 9
SNIFFER BASE STATION
• The sniffer is a small base station, it includes transceiver section.
• It should operate at a frequency that is much different from the
frequency of the current cell in which the operation of detection
is being carried out.
DEPT OF ISE RGIT,B'LORE 10
UNIDIRECTIONAL ANTENNA
• The directional antenna acts as the eyes for the sniffer for the
purpose of the detecting the lost mobile phones.
• Antenna is a device which works at specified frequencies range
for transmitting or receiving the data signal.
• In general, antennas transmit power depending on lobe pattern
which varies from one antenna to the other.
DEPT OF ISE RGIT,B'LORE 11
DEPT OF ISE RGIT,B'LORE 12
RADIATION
PATTERN
SOFTWARE FOR THE TRACKING
• The software is used for the tracking of the lost mobile phone
• The programming is done with C or Java. However the C is most
preferred as it is easily embedded with the chips.
DEPT OF ISE RGIT,B'LORE 13
WORKING OF SNIFFERS
• The working of sniffers is of two phases
Before Sniffer increases the frequency
After Sniffer increases the frequency
DEPT OF ISE RGIT,B'LORE 14
BEFORE SNIFFER INCREASES THE
FREQUENCY
DEPT OF ISE RGIT,B'LORE 15
AFTER SNIFFER INCREASES THE
FREQUENCY
DEPT OF ISE RGIT,B'LORE 16
EXPLANATION
• From the above figure we have clearly observed the racing of
the lost mobile.
• We have identified the lost mobile using IMEI.
But,
• The location where it is present can be known by seeing at the
output of the software.
DEPT OF ISE RGIT,B'LORE 17
ADVANTAGES
• This method is used for finding the lost mobiles effectively
• Cost effective
• low power consumption
• Easy to design
DEPT OF ISE RGIT,B'LORE 18
CONCLUSION
• There are certain boundary conditions that have to be qualified
for the identification of lost mobile like the power of the mobile
should be good enough, the mobile phone should not be in the
shadow region but however this method using modern
technologies and devices.
DEPT OF ISE RGIT,B'LORE 19
REFERENCES
• Schiller, “Mobile Communication”, Pearson Education
1 Edition, 7th reprint -2003.
• John D Kraus, “Electromagnetic”, TMH
• Jordan et al, “Electromagnetic waves and radiation
system” , Printice Hall
• www.gsmworld.com
• http://ericsson.com
DEPT OF ISE RGIT,B'LORE 20
DEPT OF ISE RGIT,B'LORE 21
DEPT OF ISE RGIT,B'LORE 22

Weitere ähnliche Inhalte

Was ist angesagt?

cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer reportSameer Gupta
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics123seminarsonly
 
Mobile Phone Antenna Design
Mobile Phone Antenna Design Mobile Phone Antenna Design
Mobile Phone Antenna Design 5aleed90
 
Seminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin SystemSeminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin SystemShahrikh Khan
 
Underwater wireless communication
Underwater wireless communicationUnderwater wireless communication
Underwater wireless communicationAbhirami P S
 
Wireless charging of mobile phones using microwaves ppt
Wireless charging of mobile phones using microwaves pptWireless charging of mobile phones using microwaves ppt
Wireless charging of mobile phones using microwaves pptHarish N Nayak
 
A Modified Radar With Missile Tracking and Automatic Destruction
A Modified Radar With Missile Tracking and  Automatic DestructionA Modified Radar With Missile Tracking and  Automatic Destruction
A Modified Radar With Missile Tracking and Automatic Destructionsanjay kushwaha
 
Tongue Operated Wheel Chair
Tongue Operated Wheel ChairTongue Operated Wheel Chair
Tongue Operated Wheel ChairSIDDHARTHA ARORA
 
Silentsound documentation
Silentsound documentationSilentsound documentation
Silentsound documentationRaj Niranjan
 
Final Year Engineering Project Title List for Electronics & Electrical Branch...
Final Year Engineering Project Title List for Electronics & Electrical Branch...Final Year Engineering Project Title List for Electronics & Electrical Branch...
Final Year Engineering Project Title List for Electronics & Electrical Branch...zettanetworks
 
ACCIDENT DETECTION USING MOBILE PHONE.pptx
ACCIDENT DETECTION USING MOBILE  PHONE.pptxACCIDENT DETECTION USING MOBILE  PHONE.pptx
ACCIDENT DETECTION USING MOBILE PHONE.pptxAjay575757
 
Free space optics (fso) seminar report full
Free space optics (fso) seminar report fullFree space optics (fso) seminar report full
Free space optics (fso) seminar report fullDilip Prajapati
 

Was ist angesagt? (20)

Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Sniffer
SnifferSniffer
Sniffer
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer report
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics
 
Mobile Phone Antenna Design
Mobile Phone Antenna Design Mobile Phone Antenna Design
Mobile Phone Antenna Design
 
Seminar on sniffers
Seminar on sniffersSeminar on sniffers
Seminar on sniffers
 
Project soli
Project soliProject soli
Project soli
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Seminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin SystemSeminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin System
 
Underwater wireless communication
Underwater wireless communicationUnderwater wireless communication
Underwater wireless communication
 
advanced security system for women
advanced security system for womenadvanced security system for women
advanced security system for women
 
Wireless charging of mobile phones using microwaves ppt
Wireless charging of mobile phones using microwaves pptWireless charging of mobile phones using microwaves ppt
Wireless charging of mobile phones using microwaves ppt
 
A Modified Radar With Missile Tracking and Automatic Destruction
A Modified Radar With Missile Tracking and  Automatic DestructionA Modified Radar With Missile Tracking and  Automatic Destruction
A Modified Radar With Missile Tracking and Automatic Destruction
 
Tongue Operated Wheel Chair
Tongue Operated Wheel ChairTongue Operated Wheel Chair
Tongue Operated Wheel Chair
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Silentsound documentation
Silentsound documentationSilentsound documentation
Silentsound documentation
 
Final Year Engineering Project Title List for Electronics & Electrical Branch...
Final Year Engineering Project Title List for Electronics & Electrical Branch...Final Year Engineering Project Title List for Electronics & Electrical Branch...
Final Year Engineering Project Title List for Electronics & Electrical Branch...
 
ACCIDENT DETECTION USING MOBILE PHONE.pptx
ACCIDENT DETECTION USING MOBILE  PHONE.pptxACCIDENT DETECTION USING MOBILE  PHONE.pptx
ACCIDENT DETECTION USING MOBILE PHONE.pptx
 
Free space optics (fso) seminar report full
Free space optics (fso) seminar report fullFree space optics (fso) seminar report full
Free space optics (fso) seminar report full
 

Andere mochten auch

Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein TechnologyPapun Papun
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer vilss
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology pptdeepakmarndi
 
Sniffer for-detecting-lost-mobiles
Sniffer for-detecting-lost-mobilesSniffer for-detecting-lost-mobiles
Sniffer for-detecting-lost-mobilesRuqeya Afshan
 
Sniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost MobilesSniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost MobilesSumaiya Arjumand
 
When Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
When Attention is not Scarce – Detecting Boredom from Mobile Phone UsageWhen Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
When Attention is not Scarce – Detecting Boredom from Mobile Phone UsageMartin Pielot
 
SOS transmission through cellular phones to help accident victims
SOS transmission through cellular phones to help accident victimsSOS transmission through cellular phones to help accident victims
SOS transmission through cellular phones to help accident victimsAkhil Kumar
 

Andere mochten auch (16)

Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
Smart note-taker
Smart note-takerSmart note-taker
Smart note-taker
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer
 
Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology ppt
 
Sniffer for-detecting-lost-mobiles
Sniffer for-detecting-lost-mobilesSniffer for-detecting-lost-mobiles
Sniffer for-detecting-lost-mobiles
 
venkat (1)
venkat (1)venkat (1)
venkat (1)
 
Sniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost MobilesSniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost Mobiles
 
Sos ppt
Sos pptSos ppt
Sos ppt
 
When Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
When Attention is not Scarce – Detecting Boredom from Mobile Phone UsageWhen Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
When Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
 
Blue brain
Blue brainBlue brain
Blue brain
 
DRM Powerpoint
DRM PowerpointDRM Powerpoint
DRM Powerpoint
 
SOS transmission through cellular phones to help accident victims
SOS transmission through cellular phones to help accident victimsSOS transmission through cellular phones to help accident victims
SOS transmission through cellular phones to help accident victims
 
Wireless usb
Wireless usbWireless usb
Wireless usb
 

Ähnlich wie Sniffer for detecting lost mobiles

sniffer technology.pptx
sniffer technology.pptxsniffer technology.pptx
sniffer technology.pptxDivyaDewkathe
 
Snifferforthemobilephones 120304120929-phpapp02
Snifferforthemobilephones 120304120929-phpapp02Snifferforthemobilephones 120304120929-phpapp02
Snifferforthemobilephones 120304120929-phpapp02Anjali Verma
 
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)Edwin Manuel
 
GSM controlled robot with obstacle avoidance using IR sensors
GSM controlled robot with obstacle avoidance using IR sensorsGSM controlled robot with obstacle avoidance using IR sensors
GSM controlled robot with obstacle avoidance using IR sensorsRahul Sidhu
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 
SPY Mobile Software
SPY Mobile SoftwareSPY Mobile Software
SPY Mobile SoftwarePooja Seo
 
project presentation on cell phone operated land rover
project presentation on cell phone operated land roverproject presentation on cell phone operated land rover
project presentation on cell phone operated land roversunanda kothari
 
SNIFFER FOR DETECTING LOST MOBILE ppt arya
SNIFFER FOR DETECTING LOST MOBILE ppt  aryaSNIFFER FOR DETECTING LOST MOBILE ppt  arya
SNIFFER FOR DETECTING LOST MOBILE ppt aryayidegev626
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
Snifferfordetectinglostmobile 130811054537-phpapp01
Snifferfordetectinglostmobile 130811054537-phpapp01Snifferfordetectinglostmobile 130811054537-phpapp01
Snifferfordetectinglostmobile 130811054537-phpapp01puja kumari
 
Caller ID Android Application
 Caller ID Android Application Caller ID Android Application
Caller ID Android ApplicationSmitakshi Sen
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Mobile devices hardware characteristics
Mobile devices hardware characteristicsMobile devices hardware characteristics
Mobile devices hardware characteristicsHectorMolarGamboa
 
IOT Based Smart Parking and Damage Detection Using RFID
IOT Based Smart Parking and Damage Detection Using RFIDIOT Based Smart Parking and Damage Detection Using RFID
IOT Based Smart Parking and Damage Detection Using RFIDMaheshMoses
 
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...Yole Developpement
 

Ähnlich wie Sniffer for detecting lost mobiles (20)

sniffer technology.pptx
sniffer technology.pptxsniffer technology.pptx
sniffer technology.pptx
 
Snifferforthemobilephones 120304120929-phpapp02
Snifferforthemobilephones 120304120929-phpapp02Snifferforthemobilephones 120304120929-phpapp02
Snifferforthemobilephones 120304120929-phpapp02
 
Sniffer
SnifferSniffer
Sniffer
 
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
 
GSM controlled robot with obstacle avoidance using IR sensors
GSM controlled robot with obstacle avoidance using IR sensorsGSM controlled robot with obstacle avoidance using IR sensors
GSM controlled robot with obstacle avoidance using IR sensors
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
SPY Mobile Software
SPY Mobile SoftwareSPY Mobile Software
SPY Mobile Software
 
project presentation on cell phone operated land rover
project presentation on cell phone operated land roverproject presentation on cell phone operated land rover
project presentation on cell phone operated land rover
 
SNIFFER FOR DETECTING LOST MOBILE ppt arya
SNIFFER FOR DETECTING LOST MOBILE ppt  aryaSNIFFER FOR DETECTING LOST MOBILE ppt  arya
SNIFFER FOR DETECTING LOST MOBILE ppt arya
 
car accident.pptx
car accident.pptxcar accident.pptx
car accident.pptx
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Snifferfordetectinglostmobile 130811054537-phpapp01
Snifferfordetectinglostmobile 130811054537-phpapp01Snifferfordetectinglostmobile 130811054537-phpapp01
Snifferfordetectinglostmobile 130811054537-phpapp01
 
Caller ID Android Application
 Caller ID Android Application Caller ID Android Application
Caller ID Android Application
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile devices hardware characteristics
Mobile devices hardware characteristicsMobile devices hardware characteristics
Mobile devices hardware characteristics
 
IOT Based Smart Parking and Damage Detection Using RFID
IOT Based Smart Parking and Damage Detection Using RFIDIOT Based Smart Parking and Damage Detection Using RFID
IOT Based Smart Parking and Damage Detection Using RFID
 
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
 

Kürzlich hochgeladen

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Kürzlich hochgeladen (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

Sniffer for detecting lost mobiles

  • 1. Visvesvaraya Technological University Jnana Sangama, Belgaum Seminar On SNIFFERS Under the guidance of By, Department of Information Science and Engineering Rajiv Gandhi Institute of Technology Cholanagar, R T Nagar Post, Bangalore-32
  • 2. SNIFFER FOR DETECTING LOST MOBILE PHONES Presented by,
  • 3. CONTENTS • Introduction • What sniffer is ? • IMEI • Designing for the sniffer  Sniffer base station  Unidirectional Antenna  Software Tracking • Working of sniffer device • Advantages • Conclusion • References DEPT OF ISE RGIT,B'LORE 3
  • 4. INTRODUCTION • The main scope is to detect the lost mobiles. • Each and every day thousands of mobiles get misplaced or lost, though effective way for the blocking of the lost mobile. • To prevent unauthorized person from making and receiving the calls has been done by the manufacturers of the mobile with the help of IMEI number. DEPT OF ISE RGIT,B'LORE 4
  • 5. CONT’D…. • For the detection of lost mobile SNIFFER plays a vital role . • The sniffer device has to be designed precisely and size should be reduced for easy mobility for the purpose of detection . DEPT OF ISE RGIT,B'LORE 5
  • 6. What a SNIFFER is? • The sniffer is basically a transceiver that works in the frequency which is in the special unused range that is operated by the service provided or it can designed to operate at a frequency that is of much different frequency than the one that is being used. DEPT OF ISE RGIT,B'LORE 6
  • 7. INTRODUCTION TO IMEI • Each mobile device has a globally unique IMEI (International Mobile Equipment Identity) • IMEI (International Mobile Equipment Identity) numbering system is a 15 digit unique code that is used to identify the GSM phone • To know the IMEI number the *#06# has to be pressed, the number will be displayed in the LCD screen DEPT OF ISE RGIT,B'LORE 7
  • 8. CONT’D…. • When a phone is switched on, this unique IMEI number is transmitted and checked against a data base of black listed or grey listed phones in the network’s EIR • Grey listing will allow the phone to be used, but it can be tracked to see who has it (via the SIM information). • Black listing the phone from being used on any network where there is an EIR match. DEPT OF ISE RGIT,B'LORE 8
  • 9. DESIGNING FOR THE SNIFFER • The sniffer device can be called as a mobile base station that includes the following important components:  Sniffer base station  Unidirectional antenna  Tracking software DEPT OF ISE RGIT,B'LORE 9
  • 10. SNIFFER BASE STATION • The sniffer is a small base station, it includes transceiver section. • It should operate at a frequency that is much different from the frequency of the current cell in which the operation of detection is being carried out. DEPT OF ISE RGIT,B'LORE 10
  • 11. UNIDIRECTIONAL ANTENNA • The directional antenna acts as the eyes for the sniffer for the purpose of the detecting the lost mobile phones. • Antenna is a device which works at specified frequencies range for transmitting or receiving the data signal. • In general, antennas transmit power depending on lobe pattern which varies from one antenna to the other. DEPT OF ISE RGIT,B'LORE 11
  • 12. DEPT OF ISE RGIT,B'LORE 12 RADIATION PATTERN
  • 13. SOFTWARE FOR THE TRACKING • The software is used for the tracking of the lost mobile phone • The programming is done with C or Java. However the C is most preferred as it is easily embedded with the chips. DEPT OF ISE RGIT,B'LORE 13
  • 14. WORKING OF SNIFFERS • The working of sniffers is of two phases Before Sniffer increases the frequency After Sniffer increases the frequency DEPT OF ISE RGIT,B'LORE 14
  • 15. BEFORE SNIFFER INCREASES THE FREQUENCY DEPT OF ISE RGIT,B'LORE 15
  • 16. AFTER SNIFFER INCREASES THE FREQUENCY DEPT OF ISE RGIT,B'LORE 16
  • 17. EXPLANATION • From the above figure we have clearly observed the racing of the lost mobile. • We have identified the lost mobile using IMEI. But, • The location where it is present can be known by seeing at the output of the software. DEPT OF ISE RGIT,B'LORE 17
  • 18. ADVANTAGES • This method is used for finding the lost mobiles effectively • Cost effective • low power consumption • Easy to design DEPT OF ISE RGIT,B'LORE 18
  • 19. CONCLUSION • There are certain boundary conditions that have to be qualified for the identification of lost mobile like the power of the mobile should be good enough, the mobile phone should not be in the shadow region but however this method using modern technologies and devices. DEPT OF ISE RGIT,B'LORE 19
  • 20. REFERENCES • Schiller, “Mobile Communication”, Pearson Education 1 Edition, 7th reprint -2003. • John D Kraus, “Electromagnetic”, TMH • Jordan et al, “Electromagnetic waves and radiation system” , Printice Hall • www.gsmworld.com • http://ericsson.com DEPT OF ISE RGIT,B'LORE 20
  • 21. DEPT OF ISE RGIT,B'LORE 21
  • 22. DEPT OF ISE RGIT,B'LORE 22