Sniffer For Detecting Lost Mobiles: Submitted To Jawaharlal Nehru Technological University, Hyderabad
Sniffer For Detecting Lost Mobiles: Submitted To Jawaharlal Nehru Technological University, Hyderabad
Sniffer For Detecting Lost Mobiles: Submitted To Jawaharlal Nehru Technological University, Hyderabad
On
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING
Submitted
By
Rudra Haritha
(198R1A05M3)
2022-2023
CMR ENGINEERING COLLEGE
(Accredited by NBA, Approved by AICTE NEW DELHI, Affiliated to JNTU, Hyderabad)
CERTIFICATE
We are extremely grateful to Dr. A. Srinivasula Reddy, Principal and Dr.Sheo Kumar,
HOD,
Department of CSE, CMR Engineering College for their constant support.
I will be failing in duty if I do not acknowledge with grateful thanks to the authors of the
references and other literatures referred in this Project. I express my thanks to all staff
members and friends for all the help and co-ordination extended in bringing out this Project
successfully in time.
Finally, I am very much thankful to my parents who guided me for every step.
TOPIC PAGE NO
ABSTRACT i
LIST OF FIGURES ii
1. Introduction
1.1 Introduction 1
1.2 History 1
1.3 Objective 2-6
2. Literature survey 4-5
3. Methodology
3.1 Introduction 6
4. Software Configuration
8. References 19
ABSTRACT
Each and every day thousands of mobiles get misplaced or lost, though effective way for the
blocking of the lost mobile to prevent unauthorized person from making and receiving the
calls has been done by the manufacturers of the mobile with the help of International Mobile
Equipment Identifier (IMEI) has been done but however there has been no development or
very little progress for the detection of the misplaced mobile phone. For the detection of lost
mobile SNIFFER plays a vital role. The sniffer device has to be designed precisely and size
should be reduced for easy mobility for the purpose of detection .The device can be called as
a mobile Base station that includes Sniffer Base station, Unidirectional antenna. Tracking
software. The sniffer is a small base station that includes transceiver section. It should operate
at a frequency which is much different from the frequency of the current cell in which the
operation of detection is being carried out. The directional antenna is an important device that
is to be designed and used as it plays a major role.
i
LIST OF FIGURES
4.3.1 Unidirectional 8
Antenna
5.3 Framework 14
ii
CHAPTER 1
1. INTRODUCTION
1.1 Introduction
The Sniffer was the first product of Network General Corporation, founded on May 13,
1986 by Harry Saal and Len Shustek to develop and market network protocol analyzers.
The inspiration was an internal test tool that had been developed within Nestar Systems, a
personal computer networking company founded in October 1978 by Saal and Shustek
along with Jim Hinds and Nick Fortis. In 1982 engineers John Rowlands and Chris Reed at
Nestar’s UK subsidiary Zynar Ltd developed an ARCNET promiscuous packet receiver
and analyzer called TART (“Transmit and Receive Totaliser”) for use as an internal
engineering test tool. It used custom hardware, and software for an IBM PC written in a
combination of BASIC and 8086 assembly code. When Nestar was acquired by Digital
1
Switch Corporation (now DSC Communications) of Plano, Texas in 1986,[11] Saal and
Shustek received the rights to TART
1.3 Objectives
My aim is to find the lost mobile using IMEI number of phones.
A Brief Introduction to GSM: Global System for Mobile Communications (GSM) is the
most popular mobile phone system in the world. The Cellular Operators Association of
India (COA) has released its GSM subscriber figures for the month of February 2013. As
per the figures, the total number of GSM subscribers at the end of February 2013 stood at
655.59 million. It notes that the number of subscribers in this segment fell by 1.97 million
in February 2013, thereby registering a drop of 0.30 percent from the previous month. The
name GSM fint comes from a group called Group Special Mobile (GSM), which was
formed in 1982 by the European Conference of Post and Telecommunications
Administrations (CEPT) to develop a pan European cellular system that would replace the
many existing incompatible cellular systems already in place in Europe. But when GSM
service started in 1991, the abbreviation "GSM" was renuned to Global System for Mobile
Communications from Group Special Mobile. The typical architecture of GSM network
was shown in figure:
2
Fig:1.3.1 structure of GSM
The GSM network can be divided into three parts.
a) Mobile Station:
The mobile station (MS) consists of mobile equipment and a Subscriber Identity Module
(SIM) card. The most common mobile equipment is the mobile phone. By inserting the SIM
card into a cellular phone, the user is able to receive calls at that phone, make calls from
that phone, or receive other subscribed services. The mobile equipment uniquely identifies
the International Mobile Equipment Identity (IMEI).
3
CHAPTER-2
LITERATURE SURVEY
The proper studies on this research paper of "Sniffer For Tracking Lost MobilPhonesin this the
literature revealed the following: Abdelallah and Elhad (2002) in their research paper they
concluded that the sniffer combines searching for machine in promiscuous mode and using the
honey pot to detect the use of sniffer information. Sniffer covers all online detection as well as
after the information replay detection r of the platform. In addition, detection based on MAC
addressing makes it possible to detect any machine of the network which is in promiscuous
mode for the entire Windows platform or on Linux platforms.
Remo and Ogun in this research paper concluded that there are many available tools which are
used to capture network traffic, but some of the tools contain limitations. Without analysis
some tools only capture network traffic, or some require large memory size for the installation
therefore for analysis researcher has to use other tools to get traffic features as required and
also consider memory size of the system which is in use. This system captures network traffic
and analyzes its and allows to the user to take features what he needs. In this system requires
little memory size for the installation and enables user to store selected features in a file or
document for later use in work. This will reduce the memory which is used to store the data.
Finally, Sniffer contains some Functionality like 3D pie chart statistics and possible malicious
IP address detection. Patil at el. (2014) in their exploration paper inferred that this paper
android application for following the or lost cell phones which is made and introduced in cell
phones framework. This application works with assistance in constructed GPS in the cell
phones. The present longitude and scope data is sent as SMS when the obscure client endeavors
to change SIM card of wireless to the predetermined portable number without the knowing
about client. The precise area can be discovered utilizing Google maps Using the longitude and
scope esteems. Lomet at el. (2001) gave their view that If you are as of now a Sniffer client,
you haven't known about extra security highlights which can be utilized to compliment your
security safeguards. Furthermore, ability of influence existing advances in new ways offers an
amazing keeps an eye on of improving system security execution without affecting spending
plans. Previously, amid and after an assault Portable and Distributed Network Associates can
offer clients something beyond expanding system execution and up time - they can help secure
your system infrastructure. Sniffer Technologies, we are apply arrange examination aptitude
4
to furnish clients with arrangements of their system the board and security. Arvind and Negi
(2012) have the assistance of Sniffer Program in their examination paper that a software
engineer can tune in to a discussion with a PC. It's the most ideal approach to recognize portable
lost or lost. When all is said in done, 42% of lost cell phones have no information assurance
security.20% of the gadgets lost approached work messages • 20% contained delicate
individual data, for example, national protection numbers, locations and birth dates, 35%
approached long range informal communication accounts by means of applications or web
browsers. Period 2004-2011, concentrating on abnormal state assaults, for instance on
applications for clients. We bunch existing ways to deal with shield cell phones from these
sorts of assaults into various classifications, in view of the standards of recognition,
architecture, Data accumulation and working frameworks, with specific spotlight on models
and instruments dependent on IDS. With this classification we intend to give a simple and
compact perspective on each methodology's fundamental model. Shankar and Mahesh (2013)
deduce in their exploration paper that Distributed registering includes different PCs in the
system that can be cultivated by passing message or remote strategy calls (RPC). Adding new
measurement to appropriated processing is the recently created versatile operator technology.
Experts proposed the utilization of specialists in numerous web applications in the years to
come. Nonetheless, there are as yet numerous specialized obstacles that should be tended to,
with security being the most significant of them. The versatile operator Technology may be
generally acknowledged when security issues are legitimately tended to. Be that as it may, in
the event that the interloper changes our portable specialist stage or versatile operator, at that
point the whole procedure may fail.For the ensured security, along these lines, a couple of
greater safety efforts ought to be taken later on. Versatile specialist haphazardly chooses any
hub and researches that hub in the event that the system interface card finds exorbitant
approaching traffic, at that point report back to the system manager. So it is conceivable to
identify the sniffer.
Gupta (2013) inferred that catching or sniffing system traffic is precious to organize heads
investigating system issues, security engineers exploring system security issues, designers
troubleshooting the usage of correspondence conventions, or anybody attempting to figure out
how their systems work. Because aggressors use arrange acknowledgment sniffers and capture
transmitted accreditations and information, finding out about bundle sniffer abilities and
impediments is a significant feature of understanding security dangers.
5
CHAPTER 3
METHODOLOGY
3.1 Introduction
The GSM Module's IMEI (International Mobile Equipment Identity) numbering system is
a 15 digit unique code. It is used to identify the GSM (Global System Mobile) phone. When
your phone is switched on, then this unique IMEI number is transmitted and checked against
a data base of black listed or Grey listed phones in the network's EIR.
6
CHAPTER 4
SOFTWARE CONFIGURATION
Fig:4.2.1
The sniffer is a small base station, it includes transceiver section. It should operate at a
frequency that is much different from the frequency of the current cell in which the
operation of detection is being carried out. Some of the main important things are the
frequency that has to be generated by the transceiver section is around 900MHz range
which is a VHF range and it is necessarily to design the oscillator circuit for that
frequency range .Another important is the cooling that has to be provided to the circuit
while designing the circuit that is to be operated at 900MHz range of frequency. Hence
7
proper design of base station is an important thing in the design of the sniffer. Mobile
phones as well as the base station has low power transmitter is also transmitting at low
power. The transmitter of the sniffer has to be a low power transmitter. This helps in
the process of reducing the interference of the device with the devices that are in the
other cells.
Fig:4.3.1
In addition to this it is necessary that the transmitter should be a low power transmitter.
The Gain and directivity are intimately related in antennas. The directivity of an antenna
is a statement of how the RF energy is focused in one or two directions. Because the
amount of RF energy remains the same, but is distributed over less area, the apparent
signal strength is higher. This apparent increase in signal strength is the antenna gain.
The gain is measured in decibels over either a dipole (dBd) or a theoretical construct
called an Isotropic radiator (dBi).
8
The isotropic radiator is a spherical signal source that radiates equally well in all
directions.One way to view the omni directional pattern is that it is a slice taken
horizontally through the three dimensional sphere. The graphical representation of
Radiation pattern of the unidirectional antenna is shown in figure. The spherical co-
ordination system has three main components for the pattern representation and they
are (R, _ , _ ) .The shape of the radiation system is independent of R, as long R is chosen
to be sufficiently large and much greater than the wavelength as the largest dimension
of the antenna. The magnitude of the field strength in any direction varies inversely with
R. A complete radiation pattern requires the three dimensional representation.
The other factors that are to be taken into account during the development of the antenna
for the sniffer should be the gain and the directivity .As these features have a greater
effect while designing the antenna. The gain of the antenna is defined as the ability of
the antenna to radiate the power in a particular direction. The power radiated per unit
area in sany direction is given by the pointing vector and is equivalent to E2/_2 W/m2
W=_d
The average power that gets radiated is given as (avg)=W/4 (watts per steradian) The
Directivity of the antenna is the direction in which there is maximum gain for the
radiation that is being radiated, the gain of the antenna is given as a function of the
angles. The directivity value is constant for a particular direction. In addition to the
directivity and the gain of the antenna the other important thing that has to be taken into
account is the power that is being radiated by the antenna. The total power is given as
W and is the summation of the radiated power and the ohmic loss of the antenna. Here
the Wl represents the ohmic losses of the antenna.
Wt=Wr+Wl
The power gain of the antenna is given as
gp=4__/wt
The ratio of power to the directivity is referred as a measure of efficiency of the antenna
9
gp/gd=Wr/(Wr+Wl)
The power radiated by the antenna should be properly designed as this causes more
penetration of the electromagnetic radiation and thus it might have some effect in the
near by cells. The effective area of the antenna is another important factor that is mainly
required in the receiving antenna and it may be referred as the effective aperture or
capture area and is related to the directive gain of the antenna through the relation
A=gd_2/4
Since the sniffer device that is constructed is a device that has both the transmitting and
the receiving antenna. Effective gain has to be taken into account and this shows the
ability of the antenna to capture the signal that the lost mobileis transmitting.
Fig:4.4.1
The software part plays a major role in the tracking of the lost mobile phone It is the
base for the antenna to track the lost mobile the main feature of this software is that it
helps in the process of creation of the data base and this is mainly done using a Random
Access Memory. The mobile phone that is lost has certain IMEI number that is
embedded in the chip. This RAM of the sniffer device stores the IMEI number of the
lost mobile phone. Thus this acts as a data base or the directory of the lost mobile phone
number/The software that is to be designed in such a way that the software has the input
10
as the IMEI number of the lost mobile phone from the RAM and this ID done using the
SQL query that fetches the IMEI number.
Fig:4.4.2
After getting the input of the lost mobile phones IMEI number it checks the comport for
getting the information whether it obtains any signaling information from the lost device
that might respond to the signal sent by the sniffer The programming is done with C or
Java. However the C is most preferred as it is easily embedded with the chips. With VB
the front end is designed. The oracle SQL is the back end as it helps in retrieving the
input data from the RAM using the query. But however the sample program that we
have designed does not use the oracle it takes the input directly from the keyboard and
this is an example and a dummy program that has been created that helps in the
understanding of how the device would work.
CHAPTER 5
WORKING OF SNIFFER DEVICE
11
Sniffer is a transceiver which chips away at recurrence which is in unused range and it
is worked by specialist organization.Following graph demonstrates the sniffer working,
the principal chart demonstrates the typical association between the lost or lost cell
phone with cell systems. Firstly the IMEI number of the lost or lost PDA must be
accounted for to specialist organization, this administrations supplier keeps all record
of the lost cell phones in track.
MTSO is utilized to keeps it to track of all phones, that is IMEI numbers and their area
under which cell, and area under which BTS.
12
Fig:5.2 increased frequency
PRELIMINARIES
ii. GPRS (General Packet Radio Service) data transmission: It is a GPS following
framework. Each and every moment that sends the situation of the following item from
SIM card of lost or lost portable to the each and every moment versatile phones. Because
this framework contains day in and day out administration, Outdoor restriction
framework utilized GPS; it doesn't perform successfully in that indoor area. This is on
the grounds that it comes up short on the capacity to building divider and requires
custom frameworks for each region in that restriction to be performed.
13
Android is a stage for cell phone which created by Google. It gives wide arrangement
of programming improvement OS, Tools and APIs which important to manufactured
applications. Android is accustomed to creating versatile application. Android
administration was made for recovering the portable data and running the information
checking process from the lost versatile as foundation process, that won't be recognized
by the cheat.
FRAMEWORK ARCHITECTURE:
Fig:5.3 framework
•Misplaced or Lost portable: From companions versatile pones will make clients cell
phones to ring, in the event that telephone is lost or lost inside reachable range.
•GPS: From companions versatile will assist client with receiving his cell phones GPS
area data as a URL on companions portable.
•SIM Change Notification: If SIM can expel on clients portable, It will inform SIM
change action by sending SMS to companions cell phone numbers.
14
•MMS and Pictures: It is upgrades new innovation like MMS where utilizing you can
send video and picture to another PDA. By sending preview and little video it gives data
about the cheat. I is works regardless of whether the GPS don't give the best possible
area connect.
15
CHAPTER 6
RESULTS
Since the advancement of technology the mobile phone is one of the most used
technologies in communication field. Many of mobile phones are lost or misplaced with
some respective reasons, so this given paper is the basic idea for the Sniffer Technology
for Detection of Mobile Phones. For this process we used the three main components
that is earlier described as sniffer base station, unidirectional antenna and the software
for tracking process. The designing of the antenna is most important because the
detection is properly based on the signal strength or directivity, where the signal strength
is maximum the detection is done in similar direction.
However there are certain limitation, in this tracking process that are: the signal strength
is maximum the detection is done in similar direction. However there are certain
limitation in this tracking process that are:
1. The power of the lost device should be good so that it can be easily detectable by
the antenna pattern.
2. There should be no shadow.
ADVANTAGES:
Cost effective
Easy to design
16
APPLICATIONS:
Capture private info like usernames, passwords, credit card numbers, etc.
instant messages
17
CHAPTER 7
CONCLUSION
7.1 CONCLUSION
If there should arise an occurrence of the versatile taking the Sniffer innovation is
valuable. This innovation takes a shot at the recurrence which is typically utilized for
military. In the burglary dentifying methods this innovation contains its following
programming projects that make it mainstream. Following advances included this plan:
Sniffer base station structure. Unidirectional reception apparatus plan. Development of
programming following for track a lost or lost cell phone. The possibility of this
improvement "Sniffer for the following lost Mobile telephones" which the lost or lost
cell phones can recouped Let we all expectation for this innovation will be useful for
each individual who are lost or lost mobiles. This Technique seems complex including
plan of the sniffer yet the substantial scale location is viable expense of the structures
and identification scales are down. There are sure limit criteria that need to fit the bill
for the distinguishing proof of lost or lost versatile like intensity of the cell phone ought
to be sufficient. The cell phones ought not be in the shadow area., however utilizing
present day advancements and gadgets this technique can be improved.
18
CHAPTER 8
REFERENCES
19