You are on page 1of 28

A

Technical Seminar
On

“EVOLUTION OF ESIM ”
Submitted in Partial Fulfillment of the Requirement for the award of the
degree of
BACHELOR OF TECHNOLOGY
IN
ELECTRONICS AND COMMUNICATION ENGINEERING
SUBMITTED BY
K. SANDEEP 21D35A0409

Under the guidance of


Mrs. M. SNEHATEJA
Asst. Prof.

DEPARTMENT OF
ELECTRONICS AND COMMUNICATION ENGINEERING
INDUR INSTITUTE OF ENGINEERING & TECHNOLOGY
Ponnala (V), Siddipet (Dist.) – 502277, Telangana.
2023-2024
Department of Electronics and Communication Engineering

CERTIFICATE

This is to certify that the Technical seminar entitled “EVOLUTION OF


ESIM” is a bonafide work done and submitted by

K. SANDEEP 21D35A0409

In partial fulfillment of the requirement for the degree of B.TECH in the


Department of ELECTRONICS AND COMMUNICATION ENGINEERING from
INDUR INSTITUTE OF ENGINEERING & TECHNOLOGY, SIDDIPET
(Affiliated to JNTU Hyderabad) during the academic year 2023-2024 is a record of
bonafide work carried out under the guidance and supervision of Mrs.
M. SNEHATEJA, Asst.Prof.

Tech sem Supervisor Head of ECE Department


Mrs. M. SNEHATEJA Dr. G. MALLESHAM
Asst.Prof. Professor & HOD
DECLARATION

I hereby declared that the work reported in the present Techincal Seminar
entitled “EVOLUTION OF ESIM” is a record of work done by me under the
supervision of Mrs. M.SNEHATEJA, Assistant Professor, Department of
Electronics and Communication Engineering, Indur Institute of Engineering and
Technology, Siddipet.
No part of this is copied from books/journals/internet and wherever the portion
has been taken the same has been duly referred in the text. The reports are based on the
Techincal Seminar done entirely by me and not copied from any other. university for
award of any degree.

Name of the Student Roll No


K. SANDEEP 21D35A0409
ACKNOWLEDGEMENT

The satisfaction that accompanies the successful completion of any task would
be incomplete without the mentioning of the people who made it possible and whose
encouragement and supervision has been a source of inspiration throughout the course
of the project.
It is my privilege and pleasure to express my profound sense of gratitude and
indebtedness to my supervisor Mrs.M.SNEHATEJA,Asst.Prof. of Electronics and
Communication Engineering Department, Indur Institute of Engineering &Technology,
for her guidance, cogent discussion, constructive criticisms and encouragement
throughout this dissertation work.
I take the opportunity to offer my humble thanks to Dr. G. Mallesham,
Professor & Head of the Department, Electronics and Communication Engineering,
Indur Institute of Engineering & Technology, for his encouragement and constant help.
I also thank Dr. V. P. Raju, Principal, Indur Institute of Engineering&
Technology, for his support in this Endeavour.
In addition, I would like to thank all the Faculty members & Lab Staff
Department of Electronics and Communication Engineering, and Management, who
provided me with good lab facilities and helped me in carrying out the seminar
successfully.
I finally thank my family members and friends for giving moral strength and
support to complete this dissertation.

Student Name Roll No.


K.SANDEEP 21D35A0409

i
ABSTRACT

The evolution of eSIM (embedded SIM) technology represents a transformative


journey in the telecommunications landscape. Initially conceived as an alternative to
traditional physical SIM cards, eSIM has undergone significant advancements and
adaptations, shaping its role in modern connectivity. The conventional SIM card, with
its limitations in terms of size and single-operator functionality, paved the way for
eSIM's inception. The key innovation was embedding a programmable SIM directly
into devices, eliminating the need for physical cards and providing users with greater
flexibility to switch between carriers seamlessly. As eSIM technology progressed, it
extended its reach beyond smartphones to encompass a diverse range of IoT (Internet
of Things) devices. This expansion empowered IoT devices to connect autonomously
to cellular networks, streamlining deployment and management on a larger scale.
A crucial aspect of the eSIM evolution is the development of Remote SIM
Provisioning protocols. These protocols enable the remote management of SIM
profiles, facilitating over-the-air updates and simplifying the process of adding or
switching carriers without physical intervention.
Security has become a focal point in the ongoing evolution of eSIM technology.
Advanced security features are being integrated to protect against unauthorized access
and data breaches, especially as eSIM finds applications in critical sectors such as
connected cars, healthcare devices, and industrial IoT.

Keywords- Embedded SIM, Remote SIM provisioning, IoT

ii
CONTENTS
Title Page. No.

CERTIFICATE i
ACKNOWLEDGMENT ii
ABSTRACT v
INDEX vi
LIST OF FIGURES vii
CHAPTER 1: INTRODUCTION 1-3
1.1 What is a SIM 1-2
1.2 History of SIM 3
CHAPTER 2: SIM FORMAT 4-5
2.1 Full-size SIM 5
2.2 Mini-SIM 5
2.3 Micro-SIM 5
2.4 Nano-SIM 6
2.5 Embedded-SIM 6-7
CHAPTER 3: SIM EVOLUTION MANAGER 8-10
3.1 Subscription Manager 9
3.2 Subscription Manager Data Preparation 9
3.3 Subscription Manager Secure Routing 9
3.4 Subscription Manager Requirements 10
CHAPTER 4 ARCHITECTURE OF ESIM 11-13
CHAPTER 5: APPLICATIONS OF ESIM TECHNOLOGY 14
CHAPTER 6: NEW OPPORTUNITITES IN THE CONNECTED 15-16
MARKET
6.1 New opportunities in the connected market 15
6.2 Driving ESIM adoption 16
CHAPTER 7: ADVANTAGES AND DISADVANTAGES OF ESIM 17-18
7.1 Advantages 17
7.2 Disadvantages 18
CHAPTER 9: CONCULSION AND FUTURE SCOPE 19
REFERENCES 20

iii
LIST OF FIGURES

Fig.no. Figure/Images Pg.no.

1.1.1 SIM chip structure and packaging 2

2.1.1 SIM card evolution 4

2.1.3 Usage of ESIM 7

3.1.1 The SIM evolution 8

4.1.1 eSIM Architecture for consumer solutions 11

iv
LIST OF TABLES
Table no. Table Name Pg.no.

2.1.2 Comparison of SIM card format 5

v
CHAPTER-1
INTRODUCTION

In the ever-evolving domain of telecommunications, the advent of embedded


SIM (eSIM) technology has emerged as a groundbreaking catalyst, revolutionizing the
landscape of connectivity. Unlike its physical counterparts, the eSIM represents a
paradigm shift, embodying a virtualized and programmable Subscriber Identity Module
directly embedded into the hardware of mobile and IoT devices.

This seminar endeavors to dissect the intricate layers of eSIM technology,


offering a technical journey into its architecture, functionalities, and the transformative
impact it brings to the world of telecommunications. As we delve into the technical
intricacies, including Remote SIM Provisioning, Secure Element integration, and the
eUICC (embedded Universal Integrated Circuit Card), our aim is to provide a
comprehensive understanding of the inner workings of eSIM.

From the provisioning process that ensures secure and over-the-air management of
subscriber profiles to the interoperability challenges that eSIM addresses, this report
will navigate through the labyrinth of technicalities surrounding eSIM deployment.
Additionally, we will explore real-world applications across diverse sectors, shedding
light on how eSIM is reshaping the dynamics of connectivity for consumer electronics,
automobiles, industrial IoT, and beyond.

1.1 WHAT IS A SIM

A subscriber identity module or subscriber identification module (SIM), widely


known as a SIM card, is an integrated circuit that is intended to securely store the
international mobile subscriber identity (IMSI) number and its related key, which are
used to identify and authenticate subscribers on mobile telephony devices (such as
mobile phones and computers) It is also possible to store contact information on many
SIM cards.
The SIM circuit is part of the function of a universal integrated circuit card
(UICC) physical smart card, which is usually made of PVC with embedded contacts
and semiconductors. SIM cards are transferable between different mobile devices. The

1
first UICC smart cards were the size of credit and bank cards; sizes were reduced
several times over the years, usually keeping electrical contacts the same, so that a
larger card could be cut down to a smaller size.
A SIM card contains its unique serial number (ICCID), international mobile
subscriber identity (IMSI) number, security authentication and ciphering information,
temporary information related to the local network, a list of the services the user has
access to, and two passwords: a personal identification number (PIN) for ordinary use,
and a personal unblocking code (PUC) for PIN unlocking.
The first SIM card was developed in 1991 by Munich smart-card maker
Giesecke & Devrient, who sold the first 300 SIM cards to the Finnish wireless network
operator Radiolinja. Today, SIM cards are ubiquitous, allowing over 7 billion devices
to connect to cellular networks around the world. According to the International Card
Manufacturers Association (ICMA), there were 5.4 billion SIM cards manufactured
globally in 2016 creating over $6.5 billion in revenue for traditional SIM card vendors.
The rise of cellular IoT and 5G networks is predicted to drive the growth of the
addressable market for SIM card manufacturers to over 20 billion cellular devices by
2020. The introduction of Embedded SIM (eSIM) and remote SIM provisioning (RSP)
from the GSMA may disrupt the traditional SIM card ecosystem with the entrance of
new players specializing in "digital" SIM card provisioning and other value-added
services for mobile network operators.

Fig 1.1.1 – SIM chip structure and packaging

2
1.2 HISTORY OF SUBSCRIBER IDENTITY MODULE (SIM)
In 1991, Giesecke and Devrient supplied the first commercial SIM card to a
Finnish Network operator. The SIM card was originally designed to work on the
nascent GSM network and was similar in size to a credit card.
The primary role of the SIM card was twofold, both of these benefits remain valid
today:
1. Identity: the SIM card contains a unique reference number that identifies the SIM
card and therefore the subscription that accompanies that SIM card. The mobile
network can recognise the reference number and ensure that associated costs incurred
are allocated correctly
2. Authentication: in order to ensure that the identity is valid, the mobile network uses
a security mechanism to allow access to the network. This can achieved by the network
issuing a challenge (similar to a security question) that only that particular SIM card
can answer from the information it has stored in its memory. Once validated, access to
the network is granted.
Additionally, if the SIM card becomes damaged or the security compromised,
it can easily be removed and replaced with a new SIM card. Therefore, the secure
connectivity can be restored without replacing the entire handset. Similarly, if a
consumer wishes to change network provider, they can do so through replacing the
relatively inexpensive SIM card rather than the entire handset (assuming the device is
not locked to a particular operator). The SIM card also brings secondary benefits for
the end user
1. Portability: as the identity is stored on the SIM card, it can easily be moved to a new
device when the consumer upgrades or replaces their handset.
2. Memory: the SIM card provides memory for additional services such as storing
contact details/SMS. As these are stored in the SIM card memory, they can be retained
if the SIM card is moved to another device. Over time, some of this functionality such
as SMS storage and the address book has moved from the SIM card to the device
memory.

3
CHAPTER-2
SIM FORMAT

The physical SIM card itself has significantly reduced in size — driven by a
combination of smaller devices and the requirement to use the available space within a
device for an increasingly complex set of features and functionality. The 4FF SIM is
the smallest possible size whilst retaining the ability for users to confidently insert and
remove them. At the same time, the SIM itself has developed to take on more complex
functions

Fig 2.1.1 SIM card evolution


Shows how the size of the SIM has reduced from the original credit card size 1FF (FF
stands for form factor) SIM to the 4FF SIM (or “Nano SIM”) that is widely used in
new smartphones today.
SIM cards have been made smaller over the years; functionality is independent
of format. Full-size SIM were followed by mini-SIM, micro-SIM, and nano-SIM. SIM
cards are also made to embed in devices.

4
Table-2.1.2 Comparison of SIM card format
2.1 Full-size SIM
The full-size SIM (or 1FF, 1st form factor) was the first form factor to appear.
It has the size of a credit card (85.60 mm × 53.98 mm × 0.76 mm). Later smaller SIMs
are often supplied embedded in a full-size card from which they can be removed.

2.2. Mini-SIM
The mini-SIM (or 2FF) card has the same contact arrangement as the full-size
SIM card and is normally supplied within a full-size card carrier, attached by a number
of linking pieces. This arrangement (defined in ISO/IEC 7810 as ID-1/000) lets such a
card be used in a device that requires a full-size card – or in a device that requires a
mini-SIM card, after breaking the linking pieces. As the full-size SIM is no longer used,
some suppliers refer to the mini-SIM as a "standard SIM" or "regular SIM".

2.3 Micro-SIM
The micro-SIM (or 3FF) card has the same thickness and contact arrangements,
but reduced length and width as shown in the table above. The micro-SIM was
introduced by the European Telecommunications Standards Institute (ETSI) along with
SCP, 3GPP (UTRAN/GERAN), 3GPP2 (CDMA2000), ARIB, GSM Association
(GSMA SCaG and GSMNA), Global Platform, Liberty Alliance, and the Open Mobile
Alliance (OMA) for the purpose of fitting into devices too small for a mini-SIM card.

5
The form factor was mentioned in the December 1998 3GPP SMG9 UMTS Working
Party, which is the standards-setting body for GSM SIM cards,[19] and the form factor
was agreed upon in late 2003. The micro-SIM was designed for backward
compatibility. The major issue for backward compatibility was the contact area of the
chip. Retaining the same contact area makes the micro-SIM compatible with the prior,
larger SIM readers through the use of plastic cutout surrounds. The SIM was also
designed to run at the same speed (5 MHz) as the prior version.

2.4 Nano-SIM
The nano-SIM (or 4FF) card was introduced on 11 October 2012, when mobile
service providers in various countries started to supply it for phones that supported the
format. The nano-SIM measures 12.3 mm × 8.8 mm × 0.67 mm (0.484 in × 0.346 in ×
0.026 in) and reduces the previous format to the contact area while maintaining the
existing contact arrangements. A small rim of isolating material is left around the
contact area to avoid short circuits with the socket. The nano-SIM is 0.67 mm (0.026
in) thick, compared to the 0.76 mm (0.030 in) of its predecessor. 4FF can be put into
adapters for use with devices designed for 2FF or 3FF SIMs, and is made thinner for
that purpose, and telephone companies give due warning about this. The iPhone 5,
released in September 2012, was the first device to use a nano-SIM card, followed by
other handsets.

2.5 Embedded-SIM (eSIM):-


An embedded-SIM (eSIM) or embedded universal integrated circuit card
(eUICC) is a form of programmable SIM that is embedded directly into a device. The
surface mount format provides the same electrical interface as the full size, 2FF and
3FF SIM cards, but is soldered to a circuit board as part of the manufacturing process.
In M2M applications where there is no requirement to change the SIM card, this avoids
the requirement for a connector, improving reliability and security. An eSIM can be
provisioned remotely; end-users can add or remove operators without the need to
physically swap a SIM from the device
ESIM is a global specification by the GSMA which enables remote SIM provisioning
of any mobile device, and GSMA defines eSIM as the SIM for the next generation of

6
connected consumer device, and networking solution using eSIM technology can be
widely applicable to various IoT scenarios, including connected cars (smart rearview
mirror, OBD, vehicle hotspot), AI translator, Mi-Fi device, smart earphone, smart
metering, tracker, DTU, bike-sharing, advertising player, and video surveillance
devices, etc.
The GSMA had been discussing the possibilities of a software-based SIM card
since 2010. While Motorola noted that eUICC is geared at industrial devices, Apple
"disagreed that there is any statement forbidding the use of an embedded UICC in a
consumer product." In 2012, The European Commission has selected the Embedded
UICC format for its in-vehicle emergency call service known as eCall. All new car
models in the EU must have one by 2018 to instantly connect the car to the emergency
services in case of an accident. Russia has a similar plan with the GLONASS (national
satellite positioning system) called ERAGLONASS. Singapore is seeking public
opinions on introducing eSIM as a new standard as more compatible devices enter the
market.
Apple implemented eSIM support in its Apple Watch series 3 and second
generation iPad Pro devices. In October 2017, Google unveiled the Pixel 2, which
added eSIM support for use with its Google Fi service. One year later in September
2018, Apple released the iPhone XS and in October 2018 iPhone XR with eSIM
support. eSIM support on iPhone requires iOS 12.1 or later. In May 2019 Google
released the Pixel 3a and Pixel 3a XL with eSIM support for carriers other than Google
Fi[9]. Plintron implemented eSIM4Things product based on eSIM support for the
devices and available in 28 countries.

Fig 2.1.3 Usage of esim

7
CHAPTER-3
SIM EVOLUTION MANAGER

However in the context of this thesis the focus is not on the form factor of the
SIM but on the management of the SIM. The SIM evolution in terms of manage-ment
is still unclear and unsure due to a lot of political and economic factors. To give a
comprehensive view of the situation a simplified description of the evolution.

Fig 3.1.1 The SIM evolution


From the current removable SIM, which is a UICC with a pre-Installed SIM or USIM
application there are three evolution paths:
Evolution Path 1: Removable UICC
Evolution Path 2: M2M SIM
Evolution Path 3: Soft SIM

8
3.1 Subscription Manager (SM) :-
The embedded UICC will be switched to personal terms and other data will be
provisioned over-the-Air. The remote provisioning is called Subscription Manage-
ment. Therefore, for the soldered UICC with Subscription Manager there is an ability
to change the SIM operator. Subscription manager is a new role played by SIM venders
from the management and manufacture of reprogrammable SIMs. The Subscription
Manger is responsible for the secure process and technology via which a MNO is able
to submit a pro le to be loaded onto the eUICC.
Currently, the traditional SIM provisioning, MNOs send the vendors a le with
their specifications, such as the IMSI numbers of the SIM cards and SIM venders send
the personalized cards back to MNOs. MNO and SIM card vendors hold the
relationship. Thus, only two entities are involved in the supply chain before the
customer takes possession of the SIM card.

3.2 Subscription Manager Data Preparation (SM-DP) :-


For the secure preparation of delivering package to the eUICC and for working
with the SM-SR, SM-DP has responsibility. SM-DP includes following key functions:
Certification level and functional characteristic will manage by SM-DP Managing
The MNO credentials such as IMSI, K Computing the Over-the-Air packages for
downloading by SM-SR when a third party take on the responsibility of the SM-DP
function role instead of MNO, The security and trust relationship are critical. Each
MNO will have direct relationship with SM-DP.

3.3 Subscription Manager Secure Routing (SM-SR) :-


Secure routing and delivery of the credential package to the correct eUICC is
doing by SM-SR. Performance, reliability and scalability requirements are expected to
be signi cant for the SM-SR. SM-SR key functions include:
 The Over-the-Air communication manages by SM-SR through a ciphered VPN with
the eUICC.
 Building end to end link up to the eUICC, require managing the communication with
other SM-SR. (for example when MNO does not have a direct commercial relationship
with the particular SM that manage that eUICC).

9
 SM-SR manage the eUICC data that is provided by eUICC suppliers and used for
SM-SR OTA communication.

3.4 Subscription Manager Requirements :-


The SM-SR and the SM-DP shall be certi ed according to a GSMA agreed
certification scheme and implement an access control mechanism on the request for
execution of the SMSR and the SMDP functions only to authorized security realms.
Security realm of eUICC, SM-SR and SM-DP should have counter measure against
denial of services attacks. At least one of the two mechanisms, Web Services Security
standard (WS-standard) Or Mutual Authentication Transport Level Security (SSL) is
required to secure the message being sent between the entities. In the mutual
authentication, the entities concerned to authenticate each other are SM-DP to SM-SR
and SM-SR to SM-DP.

10
CHAPTER-4
ARCHITECTURE OF ESIM
GSMA has proposed a different architecture of eSIM for consumer devices.
Being GSMA-compliant solution, eSIM in consumer devices will be ensuring global
internet connectivity and easy portability.

The consumer solution has a different backend infrastructure and different roles
assigned to the architectural entities. While the M2M solution is server-driven and
based on a push model, the consumer solution is client-driven and based on a pull
model. To make the consumer model client-driven, Local Profile Assistant (LPA),
either integrated into the eSIM or the consumer device, manages the entire subscription
management. Let us have a look at architectural entities and the underlying architecture
of consumer solutions. The consumer solution is based on GSMA’s consumer dedicated
technical specifications – SGP.21, SGP.22, and SGP.23.

Fig-4.1.1 eSIM Architecture for consumer solutions

11
For consumer solutions, GSMA has specified remote SIM provisioning architecture, as
illustrated in the diagram below.
Let us discuss different entities and their roles in this architecture.

eUICC manufacturer – eUICC manufacturer (EUM) provides the eUICCs to the


consumer device manufacturers. The eUICC contains the initial cryptographic
configuration and security architecture. It may also contain Local Profile Assistant
(LPA) integrated into the eSIM or at least interface to connect with LPA integrated into
the consumer device. EUM is also responsible for issuing certification for eUICC
authentication and certificates for authenticated keyset establishment between eSIM
and SM-DP+.
Consumer Device Manufacturer – The device manufacturer implements the
LPA elements on the consumer device as well as applications that must reside on the
primary (consumer) device.
Operator and Communication Service Provider – Communication Service
Provider (CSP) has access to SM-DP+. When a customer selects a CSP, the service
provider initiates provisioning of a Profile package. The operator (MNO), on behalf of
the CSP, specifies Profile characteristics, features, and applications that apply to the
target eUICC.
SM-DP+ – When requested by the operator (MNO), SM-DP+ creates Profiles and is
responsible for their security and management. It is responsible for the delivery of a
Profile to the client device within a Bound Profile Package. It also requests for the
creation of ISD-P in the eUICC into which the Profile has to be installed. It remains
responsible for the lifecycle management of ISD-P installed on the eUICC.
SM-DS – Subscription Manager – Discovery Service (SM-DS) provides
mechanisms to inform Local Discovery Service (LDS) within a device that SM-DP+
wants to communicate with it. SM-DP+ sends an Event Registration message to the
SM-DS for a target consumer device. A Root SM-DS is configured on the eUICC,
which has a unique address. Local Discovery Service (LDS) on the target device polls
root SM-DS using the same address. If Root SM-DS has an event ID, it responds with
SM-DS+ address; otherwise, it sends back a null response. In the case of cascaded SM-
DS+, event registration is done with an alternative SM-DS. Then, this alternative SM-
DS cascades event registration to the root SM-DS.

12
Certificate Issuer – The certificate issuer is responsible for issuing certificates GSMA-
compliant Remote SIM Provisioning entities (EUM, SM-DP+, SM-DS). It acts as a
trusted third-party to authenticate different entities of the consumer solution.
Subscriber and end user – A Subscriber can be a contract partner of the communication
service provider (CSP). At the same time, the end-user is a customer, who may be using
the consumer device and services related to enabled Profiles.
In consumer solutions, eUICC operates on a pull-model. When subscribed to a
CSP, LPA on the eUICC facilitates the reception of Bound Profile Package. ISD-R then
creates an ISD-P, which is responsible for hosting a Profile. The enabled ISD-P
downloads and installs the requested Profile. The MNO-SD provides a secure OTA
channel through which various network applications and SIM applets access services
subscribed by the consumer device user. In a consumer solution, the client device that
manages all the subscription-related operations instead of those operations being
remotely managed by the SM-DP server.

13
CHAPTER-5
Application of eSIM Technology
5.1 Applications of eSIM Technology
The SIM card is a technology that most of us are familiar with, present in mobile
phones since the early nineties. A SIM card is a piece of hardware which contains data
that authenticates us with our mobile operator, enabling us to connect to a network and
receive a mobile connection. However, in the future, a huge array of connected devices
will connect to mobile networks without the need for a SIM card, thanks to embedded
SIM (eSIM) technology.
eSIM is a global specification developed by telecoms trade body the GSMA,
which involves a SIM card chip being embedded into a device. Due to Apple’s latest
iPhone launch, eSIM technology has been thrust into the public consciousness. One of
the main advantages of eSIM is that it enables users to change operator remotely,
straight from their phone, without having to acquire a new SIM card. It also allows
people to store multiple profiles on a single device, effectively having two or more
numbers, and switch between them at ease. This is ideal for anyone that may require an
additional number for travel or business, for example.

Mobile operators are now starting to support eSIM technology, including EE in


the UK, Vodafone in Germany, and Bell in Canada. As an increasing number of devices
offer eSIM technology, we are likely to see more mobile operators offering support for
the service, particularly as it gives them an opportunity to up and cross-sell new service
plans to their customers across the consumer and enterprise markets.

14
CHAPTER-6
NEW OPPORTUNITIES IN THE CONNECTED MARKET
6.1 New opportunities in the connected things market
eSIM technology will not just be used in smartphones, but also in a range of
consumer devices which require always-on connectivity. This includes wearables, such
as smartwatches and smart glasses, connected home devices, and computing devices
such as laptops and tablets. Technology which has traditionally connected to Wi-Fi will
benefit from the wider availability and security of cellular (4G) networks. As eSIM
enables subscribers to connect more devices to their mobile operator,
Operators can offer multi-device packages and bespoke data plans. With eSIM, device
bundling will become much easier, with consumers able to conveniently add new
devices to their plans without having to go in store or wait for a physical SIM card to
arrive in the post.

In turn, this presents new revenue opportunities for mobile operators, as their
customers scale-up their plans by adding new devices which require data. Businesses
with a large number of mobiles used by their employees will also benefit from the
convenience of eSIM. eSIM can deliver a streamlined user experience for managing
cellular connectivity, enabling IT teams to provision and deploy new devices in a rapid
and convenient fashion. Adding new phones to a corporate mobile service, or swapping
devices between users as they join and leave a company will become much more
efficient, as it can be achieved remotely. Profiles for each user can also be personalised
and data plans can be adjusted and optimised, via eSIM remote management tools.

eSIM will also benefit businesses that use IoT systems, and in particular
businesses that have large scale machine-to-machine deployments such as oil and gas,
power plants, manufacturing facilities and warehouses. If, for example, a company uses
thousands of individual pieces of hardware that require mobile connectivity, it involves
installing a SIM card into each unit, which would be a painstaking task. With eSIM,
businesses can remotely connect all of this technology to a mobile network.
Furthermore, if the technology is required to operate in another country, it can be
programmed remotely to connect to a local operator in that region.

15
eSIM uses less space and is cheaper than traditional SIM technology. This means that
mobile connectivity can now be introduced into hardware where it was previously not
are the feasible due to cost or space restrictions. Finally, as with the consumer market,
operators can create new data plans for businesses as their connectivity requirements
scale up. This could include new packages for previously unconnected devices, such as
connected cars or iPads, naturally resulting in new Revenue streams.

6.2 Driving eSIM adoption:-

eSIM adoption by consumers and businesses will partly down to technology


manufacturers and their ability to support the new technology. According to Orange,
all new smartphone devices will support eSIM by 2030, and other types of connected
technology will likely follow suit.

Equally, it is the operators’ responsibility to ensure they can support the


technology on their networks and provide a smooth experience for business and
consumer customers looking adopt it. Operators should aim to create a new experience
for onboarding customers using eSIM, via an online portal or application. These
applications can be developed specifically for a business, whilst offering more
mainstream portals for consumers. For this customer experience to be seamless,
operators must ensure that their eSIM technology is compatible with a variety of
different handset manufactures and eSIM vendors, to ensure they can support multiple
download and activation methods. This will also enable full visibility and control for a
customer service representative, who will need to provide care and support for a digital
entity.

16
CHAPTER-7
ADVANTAGES AND DISADVANTAGES OF ESIM

7.1 Advantages:-

1. It is more reliable :-
We will not easily lose the eSIM , it is not necessary to cut them and they will not wear
out. On the other hand, you do not have to go to the store to catch one or even pay for
one such as when companies charged SIM cards. And in the last place, it is not
necessary for a company to send it to you, since it is integrated in your mobile.

2. Remote provisioning :-
For people who have used eSIMs for a while, the experiences have been good. In the
Google Pixel 2 is activated instantly and the networks that are supporting the eSIM are
increasing. Therefore, it is not necessary to change an old SIM, for an eSIM.

3. One entry less, more space saving :-


It is a benefit for the manufacturers as they will have space for other implements. The
removal of the components to read a SIM card and the slot, eliminate complexities in
the design of the phones and eliminate a hole in the device.

4. Goodbye to the SIM extractor :-


Millions of smartphones have an extractor to eject the SIMs tray. But they always get
lost and we have to choose a pointy item that replaces it. With the eSIM that will no
longer be a problem, since we will not have a slot and therefore, we will not have an
extractor.

5. Better design:
Surely, the designers will manage to create more sophisticated phones, without borders,
now that it is not necessary to remove the back cover to remove the SIM or battery, so,
they would be more attractive to the eye.

17
6. Network availability :-
For people who move from country to country: by not having to buy a SIM card from
a specific operator, but with the eSIM you only have to call the telephone company and
request the connection, this cost can be reduced.

7.2 Disadvantages:-

1. Changing mobile is complicated :-


It is very useful to change the SIM from one mobile phone to another with the old ones,
since we only open the slot and that’s it. Imagine that you have to get rid of a mobile
phone by the SIM, since it will take time and effort to change the eSIM. And if you did
not know, there are no phones with dual eSIM (a normal and an eSIM), but it would be
very helpful in the future.

2. We can not disconnect from networks :-


We will always have an eSIM on our mobile and we will always be connected to a
network. In short our mobile will be easier to track by any government and can be a
problem for people who want privacy.

3. Piracy : -
It is easier for hackers to steal information, since we will not have a physical chip that
we can replace. However, operators should be concerned about the exchange of data,
and the configuration between the network and the mobile.

18
CONCLUSION AND FUTURE SCOPE

Hence we can conclude that esim is really a great technology evolved. Are you
afraid of losing your sim, or changing your sim card operator and going to those
crowded shops. Then no need to worry now? In the word of information technology,
technology is developing day by day and solving the most of problems. The technology
has been developing at rapid speed toward artificial intelligence. This article is going
to solve your problem. In this article, you will know about what is an esim, its
advantage, its application in your daily life, and its scope in the future.

It can be esteem that after twenty-five years the sim will disappear from the
world. Because the plastic sim that is being in use these days will be replaced by the
new technology of embedded sim. The capacity of eSim is also great it. This is also
the reason for its bright future. The uses of the internet are increasing day by day, and
eSim supports a good internet connection, along with sharing with others. Thus you
can connect a large number of devices with good speed. Also, it is easy to activate,
manage, and handle. These all factors decide the future of eSim and you can yourselves
think which sim is better for you.

19
REFERENCES

1]Germann C., (2008) SECURE SOFT SIM CREDENTIAL TRANSFER, WIPO


Patent No. WO/2008/128874.

[2]Schell S., Narang M., Caballero R., (2011) WIRELESS NETWORK


AUTHENTICATION APPARATUS AND METHODS, WIPO Patent No.
2011139795.

[3]GSMA, (2011), Embedded SIM Task Force Requirements and Use Cases 1.0
Retrieved from ftp://ftp.3gpp2.org/.

[4]GSMA, (2011), Embedded SIM Task Force Subscription Manager FAQs,


Retrieved from ftp://ftp.3gpp2.org/TSGS/Working/2011/2011-0505-TSG-
S+TSG-Cre eUICC/Embedded

[5]GSMA, (2012), Remote Provisioning Architecture for Embedded UICC, DRAFT


1.34, GSM Association.

[6] GSMA, (2011), Embedded Mobile Whitepaper Embedded Mobile Guide-lines


Version 2 Retrieved http://www.gsma.com/connectedliving/wp-
content/uploads/2012/04/ whitepaper embeddedmobileguidelinesv2.pdf

[7]GSMA, (2011), Embedded SIM Task Force Requirements and Use Cases 1.0
Retrieved from ftp://ftp.3gpp2.org/.

[8]Mouly M., Pautet M.B, Foreword B.T., (1992) The GSM system for mobile
communications. Telecom Publishing, ISBN 0945592154.

[9]Pagliusi P.S., (2002) A Contemporary Foreword on GSM Security, Journal of


Infrastructure Security, ScienceVolume 2437, pp 129-144.

[10]IUT-T, (2012) The international identi cation plan for public networks and
subscriptions, Technical Report, IUT-T Publications Retrieved from
http://www.itu.int/rec/T-REC-
E.212/en
[11]Meyer U., Wetzel S., (2011) A man-in-the-middle attack on UMTS, Proceeding
of the 3rd ACM workshop on Wireless security, Oct1-Oct01 Philadelphia , US.

20

You might also like