You are on page 1of 8

Scanned with CamScanner

Scanned with CamScanner


Scanned with CamScanner
Scanned with CamScanner
6) How to identify vehicle location using GSM .

• The location of the vehicle can be traced by using an gsm module which can be a mobile
phone device or a theft detection system using gsm protocol for location identity
management
• However, tracing through GPS is very prominent technique yet it is more power
consuming with less reliability at cheaper costs usually hence tracing through the base
station routes of the gsm Module is in prominence.

• The technology of locating is based on measuring power levels and antenna


patterns and uses the concept that a powered mobile GSM Module always
communicates wirelessly with one of the closest base stations, so knowledge of the
location of the base station implies the cell GSM Module is nearby.
• Advanced systems determine the sector in which the mobile GSM Module is located
and roughly estimate also the distance to the base station. Further approximation can
be done by interpolating signals between adjacent antenna towers.
• Qualified services may achieve a precision of down to 50 meters in urban areas where
mobile traffic and density of antenna towers (base stations) is sufficiently
high. GSM localization uses multilateration to determine the location of GSM
Modules, or dedicated trackers, usually with the intent to locate the user.
• Multilateration can also be used by a single receiver to locate itself, by measuring
signals emitted from synchronized transmitters at known locations (termed stations).
At least three emitters are needed for two-dimensional navigation; at least four emitters
are needed for three-dimensional navigation. For expository purposes, the emitters may
be regarded as each broadcasting pulses at exactly the same time on separate
frequencies (to avoid interference).

• The accuracy of network-based techniques varies, with cell identification as the least
accurate (due to differential signals transposing between towers, otherwise known as
"bouncing signals") and triangulation as moderately accurate, and newer "advanced
forward link trilateration" timing methods as the most accurate.
1. Trilateration is a method to determine the location of a movable vehicle or
stationary point in space using multiple ranges (distances) between the
vehicle/point and multiple spatially-separated known locations (often termed
'stations').
2. Two slant-ranges from two known locations can be used to locate a third point
in a two-dimensional Cartesian space (plane), which is a frequently applied
technique (e.g., in surveying). Similarly, two spherical ranges can be used to
locate a point on a sphere,
3. In two-dimensional geometry, it is known that if a point lies on two circles, then
the circle centres and the two radii provide sufficient information to narrow the
possible locations down to two – one of which is the desired solution and the
other is an ambiguous solution. Additional information often narrows the
possibilities down to a unique location.
The simplest algorithm employs analytic geometry and a station-based coordinate
frame. Thus, consider the circle centres (or stations) C1 and C2 in Fig. 1 which have
known coordinates (e.g., have already been surveyed) and thus whose separation U is
known. The figure 'page' contains C1 and C2. If a third 'point of interest' P,
(e.g., a vehicle or another point to be surveyed) is at unknown point (x, y), then
Pythagoras's theorem yields

• In order to route calls to a GSM Module, the cell towers listen for a signal sent from
the GSM Module and negotiate which tower is best able to communicate with the GSM
Module. As the GSM Module changes location, the antenna towers monitor the signal,
and the GSM Module is "roamed" to an adjacent tower as appropriate. By comparing
the relative signal strength from multiple antenna towers, a general location of a GSM
Module can be roughly determined.
Thus as the base station location is fixed and the mobile location in its area can be determined
by above procedures the location of the vehicle having a GSM module can be traced.
7) Explain security mechanism in GSM.
The main security measurements of GSM security can be written in 4 principles;
Authentication of a user; it provides the ability for mobile equipment to prove that it has access
to a particular account with the operator.
Ciphering of the data and signaling; it requires that all signaling and user data (such as text
messages and speech) are protected against interception by means of ciphering.
Confidentiality of a user identity; it provides IMSI’s (international mobile subscriber identity)
security. GSM communication uses IMSI rarely, it uses TMSI (Temporary Mobile Subscriber
Identity) to provide more secure communication and to avoid disclosing of user’s identity. This
means someone intercepting communications should not be able to learn if a particular mobile
user is in the area
Using SIM as security module; Incase SIM card was taken by opponent, there is still PIN code
measurement.

The Security is implemented in the following steps considering the factors above:
1. At the time of initiating a service, the mobile terminal is powered on the subscriber may
be required to enter 4-8 digits Password Identification Number (PIN) to validate the
ownership of the SIM.
2. the individual subscriber authentication key (Ki), the authentication algorithm (A3),
the cipher key generation algorithm (A8) and the encryption algorithm (A5) are
programmed into the SIM by GSM operator.
3. The A3 ciphering algorithm is used to authenticate each mobile by verifying the user
password within the SIM with the cryptographic key at the MSC. The A5 ciphering
algorithm is used for encryption. It provides scrambling for 114 coded bits sent in each
TS. The A8 is used for ciphering key.
4. The IMSI and the secret authentication key (Ki) are specific to each mobile station, the
authentication algorithm A3 and A8 are different for different networks and operators
encryption algorithm A5 is unique and needs to be used across all GSM network
operators.
5. The secret authentication key (Ki) is not known to mobile user and is the property of
service provider, the home system of the mobile station (MS) generates the random
number say Rand which is 126 bit number. This random number is sent to MS. The MS
uses A3 algorithm to authenticate the user. The algorithm A3 uses Ki and Rand number
to generate a signed result called s_RES. MS sends s_RES to home system of MS.
6. The A3 algorithm use Ki and Rand generated by home system to generate a signed
result called〖(s〗_RES). The s_RES generated by MS and authentication centre are
compared. If both s_RES are identical only then the user is valid and access is granted
otherwise not.
Fig 7.1. Secure Authentication of a mobile device to its base station

You might also like