Sniffer. J.DEEPTHI Associate Professor & HOD, Department of CSE,

Similar documents
CHAPTER 4 SYSTEM IMPLEMENTATION 4.1 INTRODUCTION

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017

Chapter 3 GSM and Similar Architectures

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN

Basics of GSM in depth

EUROPEAN ETS TELECOMMUNICATION November 1996 STANDARD

Cellular Communication

Cellular Mobile Systems and Services (TCOM1010) GSM Architecture

Understanding Carrier Wireless Systems

Information Technology Mobile Computing Module: GSM Handovers

Pertemuan 7 GSM Network. DAHLAN ABDULLAH

Design of a Routing Mechanism to Provide Multiple Mobile Network Service on a Single SIM Card Boobalan. P, Krishna. P, Udhayakumar. P, Santhosh.

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase

E2-E3: CONSUMER MOBILITY. CHAPTER-5 CDMA x OVERVIEW (Date of Creation: )

RF OPTIMIZATION FOR QUALITY IMPROVEMENT IN GSM NETWORK

Semi-Active GSM Monitoring System SCL-5020SE

Practical Operator Considerations Cellular Analog Cellular Rogue Base Station Tumbling Cloning

Mobility and Security Management in the GSM System

Signaling System 7 (SS7) By : Ali Mustafa

Designing Authentication for Wireless Communication Security Protocol

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Volume 1 Issue 6 (July 2014)

Telecommunication Services Engineering Lab

GSM System Overview. Ph.D. Phone Lin.

Nexus8610 Traffic Simulation System. Intersystem Handover Simulation. White Paper

Security of Cellular Networks: Man-in-the Middle Attacks

Telecommunication Services Engineering Lab

REPORT ON GUEST LECTURER (INDUSTRY) BTS, GSM ARCHITECTURE & CALL FLOW IN GSM

GSM Hacking. Wireless Mobile Phone Communication 30 th January 2014 UNRESTRICTED EXTERNAL

Hands-On Modern Mobile and Long Term Evolution LTE

ETSI ETR 109 TECHNICAL October 1993 REPORT

Avoidance of Bottleneck in PCS Network

Network Security: Cellular Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2013

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Advanced Computer Networks Exercise Session 4. Qin Yin Spring Semester 2013

ETSI TS V7.1.0 ( )

Mobile Communications

GPRS and UMTS T

Diminishing Signaling Traffic for Authentication in Mobile Communication System

Securing SMS of a GSM Network Message Center Using Asymmetric Encryption Technique Algorithm.

Short Message Service (SMS)

COMP327 Mobile Computing Session: Lecture Set 5 - Wireless Communication Part 2

10 Call Set-up. Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up.

EVOLUTION OF VERTICAL HANDOFF TO VOICE OVER LTE VIA GENERIC ACCESS (VOLGA)

GSM Open-source intelligence

A NEW ALGORITHM FOR CALL SETUP FROM A FIXED WIRELINE TO A ROAMING MOBILE STATION IN AN ADJACENT NETWORK

Communication Networks 2 Signaling 2 (Mobile)

Insights Into the SMS Industry and Market Trends

Wireless and Mobile Network Architecture

Client Server Programming and GSM Networking Protocols (SS7 Signaling)

INSE 7110 Winter 2004 Value Added Services Engineering in Next Generation Networks Week #1. Roch H. Glitho- Ericsson/Concordia University

Section 4 GSM Signaling BSSMAP

ETSI ETR 341 TECHNICAL December 1996 REPORT

Secure and Authentication Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography.

UNIT II NETWORKING

REGULATORY FRAMEWORK FOR THE ACTIVITY OF MOBILE VIRTUAL NETWORK OPERATORS (MVNO)

Method and Device to Communicate via SMS After a Security Intrusion

GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Electronics and communication Department

Evolution from GSM to UMTS

Chapter 5. Voice Network Concepts. Voice Network Concepts. Voice Communication Concepts and Technology

Mobility Management usually includes two parts: location management and handoff management.

Internal. GSM Fundamentals.

Advanced Intelligent Network for Wireless Communications

GSM and Similar Architectures Lesson 13 GPRS

Chapter 2 The 3G Mobile Communications

JP-3GA (R99) Network Architecture

Mobile Security / /

A Review on various Location Management and Update Mechanisms in Mobile Communication

Cellular Networks and Mobility

GSM. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides) GPRS

2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.

GLOSSARY OF CELLUAR TERMS

TELECOMMUNICATION SYSTEMS

28 Deploying IN Services in a Mobile Environment

Mobility: vocabulary

Personal Handyphone Systems in Urban Infrastructure

WELCOME Mobile Applications Testing. Copyright

Communication Systems for the Mobile Information Society

ISSN: International Journal of Innovative Research in Technology & Science (IJIRTS) Abstract. Cellular Networks.

Wireless LAN Security (RM12/2002)

GSM and Mobile Telephony Trends

Chapter 3. Wired and Wireless Communication. What You Will Learn... Computers Are Your Future. What You Will Learn...

TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003

TELECOMMUNICATION SYSTEMS

ETSI TS V1.1.1 ( )

Wireless and Mobile Network Architecture

E3-E4 (CM MODULE) CDMA x & EV-DO. For internal circulation of BSNL only

GSM security country report: Thailand

Integration of voice and data in an m-commerce situation

University of Agder Department of Information and Communication Technology EXAM

Last time?! Block 3: Lecture 1! Wireless networks! Ingredients 2: Antennas! Ingredients 1: Mobile Phones, PDAs & Co.! 20/05/14. Part 3: lecture 3!

)454 1 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU

Vehicular Monitoring and Tracking system using GSM and GPS Technologies

EUROPEAN ETS TELECOMMUNICATION September 1994 STANDARD

RFID Based Security for Exam Paper Leakage using Electromagnetic Lock System

SMS Based Household Appliance Monitoring and Controlling System Ms.Shraddha G.Rajkuwar*1, Ms.Rupali G.Bhople*2, Ms.Pooja V.

Signaling Protocol Encoding and Simulation for Third Generation CDMA Network Air-Interface

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018

VEHICLE THEFT DETECTION BY GSM D.Gurunath 1, Dr. Sreeja Mole S S 2, Rekha 3 1

3G TS V3.6.0 ( )

INTRODUCTION TO GSM DATA SERVICES. ETI25111 Monday, April 3, 2017

Transcription:

EDULAKANTI KAVYA B.Tech Student, Department of CSE, Sphoorthy Engineering College, Nadergul(Vill), Sagar Road, Saroonagar(Mdl),R.R Dist.T.S. Edulakanti Kavya* et al. Sniffer Mr. T. PAVAN KUMAR Associate Professor, Department of CSE, Sphoorthy Engineering College, Nadergul(Vill), Sagar Road, Saroonagar(Mdl),R.R Dist.T.S. J.DEEPTHI Associate Professor & HOD, Department of CSE, Sphoorthy Engineering College, Nadergul(Vill), Sagar Road, Saroonagar(Mdl),R.R Dist.T.S. Abstract: The sniffer is a small base station, it includes transceiver section. It should operate at a frequency that is much different from the frequency of the frequency of the current cell in which the operation of detection is being carried out. Some of the main things are the frequency that has to be generated by the transceiver section is around 900MHz range which is a VHF range and it is necessary to design the oscillator circuit for that frequency range. Another important thing is the cooling that has to be provided to the circuit while designing the circuit that is to be operated at 900MHz range of frequency. Hence proper design of base station is an important thing in the design of the sniffer. Mobile phones as well as the base station has low power transmitter is also transmitting at low power. The transmitter of the sniffer has to be a low power transmitter. This helps in the process of reducing the interference of the device with the devices that are in the other cells. I. INTRODUCTION The main scope of sniffer is to detect the lost mobiles. Each and every day thousands of mobiles get misplaced or lost, though effective way for the blocking of the lost mobile to prevent unauthorized person from making and receiving the calls has been one by the manufacturers of the mobile with the help of International Mobile Equipment Identifier (IMEI) has been done but however there has been no development or very little progress for the detection of the misplaced mobile phone. For the detection of lost mobile SNIFFER plays a vital role.the sniffer device has to be designed precisely and size should be reduced for easy mobility for the purpose of detection.the device can be called as a mobile Base station that includes Sniffer Base station, Unidirectional antenna, Tracking software. The sniffer is a small base station that includes transceiver section.it should operate at a frequency which is much different from the frequency of the current cell in which the operation of detection is being carried out. The directional antenna is an important device that is to be designed and used as it plays a major role.there are certain boundary conditions that have to be qualified for the identification of lost mobile like the power of the mobile should be good enough, the mobile phone should not be in the shadow region but however this method using modern devices.it seems to be a bit costlier for initial setup but the cost is gradually reduced when effectively and efficiently utilized for the purpose of detection. There are many available tools used to capture network traffic, but there are limitations in some of the tools. Some tools only capture network traffic without analysis, while some require large memory size for installation therefore the researcher has to use other tools for analysis to get the traffic features as required and also consider the memory size of the system in use. Our system captures network traffic and analyzes it and allows the user to take only the features he needs. Our system requires little memory size for installation and enables the user to store his/her selected features in a file for later use in his/her work. Consequently, this will reduce the memory that is used to store the data. Finally, P Sniffer contains additional functionalities like 3D pie chart statistics and possible malicious IP address detection. II. DESIGNING OF THE SNIFFER As stated this proposal is about the detection of lost mobile phone and for this purpose we are designing a new device called the Sniffer. The sniffer device has to be designed precisely and size should be reduced for easy mobility for the purpose of detection. The device can be called as a mobile base station that includes the following important components Sniffer base station Unidirectional antenna Tracking software SNIFFER BASE STATION The sniffer is a small base station, it includes transceiver section. It should operate at a frequency that is much different from the frequency of the current cell in which the operation of detection is being carried out. Some of the main important things are the frequency that has to be generated by the transceiver section is around 900MHz range which is a VHF range and it is necessarily to design the oscillator circuit for that frequency 2320 5547 @ 2013-2017 http://www.ijitr.com All rights Reserved. Page 5912

range. Another important is the cooling that has to be provided to the circuit while designing the circuit that is to be operated at 900MHz range of frequency. Hence proper design of base station is an important thing in the design of the sniffer. Mobile phones as well as the base station has low power transmitter is also transmitting at low power. The transmitter of the sniffer has to be a low power transmitter. This helps in the process of reducing the interference of the device with the devices that are in the other cells. There are many available tools used to capture network traffic, but there are limitations in some of the tools. Some tools only capture network traffic without analysis, while some require large memory size for installation therefore the researcher has to use other tools for analysis to get the traffic features as required and also consider the memory size of the system in use. Our system captures network traffic and analyzes it and allows the user to take only the features he needs. Our system requires little memory size for installation and enables the user to store his/her selected features in a file for later use in his/her work. Consequently, this will reduce the memory that is used to store the data. Finally, P Sniffer contains additional functionalities like 3D pie chart statistics and possible malicious IP address detection. III. SOFTWARE FOR THE TRACKING The software part plays a major role in the tracking of the lost mobile phone It is the base for the antenna to track the lost mobile the main feature of this software is that it helps in the process of creation of the data base and this is mainly done using a Random Access Memory. The mobile phone that is lost has certain IMEI number that is embedded in the chip. This RAM of the sniffer device stores the IMEI number of the lost mobile phone. Thus this acts as a data base or the directory of the lost mobile phone number/the software that is to be designed in such a way that the software has the input as the IMEI number of the lost mobile phone from the RAM and this ID done using the SQL query that fetches the IMEI number. After getting the input of the lost mobile phones IMEI number it checks the comport for getting the information whether it obtains any signaling information from the lost device that might respond to the signal sent by the sniffer The programming is done with C or Java. However the C is most preferred as it is easily embedded with the chips. With VB the front end is designed. The oracle SQL is the back end as it helps in retrieving the input data from the RAM using the query. But however the sample program that we have designed does not use the oracle it takes the input directly from the keyboard and this is an example and a dummy program that has been created that helps in the understanding of how the device would work. IV. ARCHITECTURE The main scope of sniffer is to detect the lost mobiles. Each and every day thousands of mobiles get misplaced or lost, though effective way for the blocking of the lost mobile to prevent unauthorized person from making and receiving the calls has been done by the manufacturers of the mobile with the help of International Mobile Equipment Identifier (IMEI) has been done but however there has been no development or very little progress forthedetection of the misplaced mobile phone. For the detection of lost mobile SNIFFER plays a vital role.the sniffer device has to be designed precisely and size should be reduced for easy mobility for the purpose of detection.the device can be called as a mobile Base station that includes Sniffer Base station, Unidirectional antenna,tracking software. The sniffer is a small base station that includes transceiver section. It should operate at a frequency which is much different from the frequency of the current cell in which the operation of detection is being carried out. The directional antenna is an important device that is to be designed and used as it plays a major role. There are certain boundary conditions that have to be qualified for the identification of lost mobile like the power of the mobile should be good enough, the mobile phone should not be in the shadow region but however this method using moderndevices.our paper seems to be a bit costlier for initial setup but the cost is gradually reduced when effectively and efficiently utilized for the purpose of detection.one of the most interesting things about cell phone is that it is really a radio an extremely sophisticated radio, which uses some band of frequency that has the basic working similar to the ordinary cordless phone. The mobile cellular communication has been appreciated since its birth in the early 70 s and the advancement in the field of VLSI has helped in designing less power, smaller size but efficient transceiver for the purpose of communication. But however the technology has not yet answered the loss or misplacement of the lost mobile phone which is significantly increasing. In this paper we discuss the problem and the probable solution that could be done. The IMEI number is a unique number that is embedded in the mobile phone the main purpose of which is the blocking of calls that is made by unauthorized person once the mobile is reported as stolen but here we use it effectively for the purpose of detection. ARCHITECTURE OF TRACKING SOFTWARE As the IMEI number gets stored in the RAM which acts as a database it gives the signal of the lost mobile as soon as it is switched on. 2320 5547 @ 2013-2017 http://www.ijitr.com All rights Reserved. Page 5913

Fig: Tracking software The software part also plays a major role in the tracking of the lost mobile phone. The mobile phone that is lost has certain IMEI number that is embedded into the chip. The software that is to be designed in such a way that the software has the input as the IMEI number of the lost mobile phone. After getting the input of the lost mobile phone s IMEI numbers it checks the common port for getting the information weather the information is available in regard to the lost IMEI number. In this way the software gets the information from the antenna, to detect the lost mobile phone. The programming can be done with C or JAVA with VB and Oracle at the back end providing the data base information. The android application for tracking the mobile phones is created and installed in a mobile phones system. This application basically works with the help of in built GPS in the mobile phones ARCHITECTURE OF GSM Fig: Architecture of GSM Global System for Mobile Communications (GSM) is the most popular mobile phone system in the world. The Cellular Operators Association of India (COAI) has released its GSM subscriber figures for the month of February 2013. As per the figures, the total number of GSM subscribers at the end of February 2013 stood at 655.59 million. It notes that the number of subscribers in this segment fell by 1.97 million in February 2013, thereby registering a drop of 0.30 percent from the previous month. The name GSM first comes from a group called Group Special Mobile (GSM), which was formed in 1982 by the European Conference of Post and Telecommunications Administrations (CEPT) to develop a pan-european cellular system that would replace the many existing incompatible cellular systems already in place in Europe. But when GSM service started in 1991, the abbreviation "GSM" was renamed to Global System for Mobile Communications from Group Special Mobile. The typical architecture of GSM network was shown in figure : International Journal of Innovations in Engineering and Technology (IJIET) Volume 4 Issue 4 December 2014 285 ISSN: 2319 1058. The GSM network can be divided into three parts. The Mobile Station carries the subscriber. The Base Station Subsystem controls the radio link with the Mobile Station. The Network Subsystem. The main part of which is the Mobile services Switching Centre, performs the switching of calls between the mobile and other fixed or mobile network users, as well as management of mobile services, such as authentication. Not shown is the Operations and Maintenance centre, which oversees the proper operation and setup of the network. The Mobile Station and the Base Station Subsystem communicate across the air interface or radio link. The Base Station Subsystem and the Network Subsystem are also called the fixed network. Mobile Station: The mobile station (MS) consists of mobile equipment and a Subscriber Identity Module (SIM) card. The most common mobile equipment is the mobile phone. By inserting the SIM card into a cellular phone, the user is able to receive calls at that phone, make calls from that phone, or receive other subscribed services. The mobile equipment uniquely identifies the International Mobile Equipment Identity (IMEI). The SIM card stores the sensitive information such as the International Mobile Subscriber Identity (IMSI), Ki (a secret key for authentication), and other user information. All this information may be protected by personal identity number (PIN). The SIM card itself is a smart card and is in accordance with the smart card standard (ISO 7816-1, -2). The GSM 11.11 has the detailed specification about the SIM card. Base Station Subsystem: The Base Station Subsystem consists of the Base Transceiver Station (BTS) and the Base Station Controller (BSC). The Base Transceiver Station houses the radio transceivers that define a cell and handles the Radio link protocols with the Mobile Station. In a large urban area, there will potentially be a large number of BTS deployed. The Base Station Controller manages the radio resources for one or more BTS. It handles Radio channel Setup, frequency hopping, and handovers. The BSC is the connection between the mobile and the Mobile service Switching Centre (MSC). The 2320 5547 @ 2013-2017 http://www.ijitr.com All rights Reserved. Page 5914

BSC also translates the 13 kbps voice channel used over the radio link to the standard 64 kbps channel used by the Public Switched Telephone Network or ISDN. Network Subsystem: The central component of the Network Subsystem is the Mobile services Switching Centre (MSC). It acts like a normal switching node of the PSTN or ISDN, and in addition provides all the functionality needed to handle a mobile subscriber, such as registration, authentication, location updating, handovers, and call routing to a roaming subscriber. These services are provided in conjunction with several functional entities, which together form the Network Subsystem. The MSC provides the connection to the public fixed network (PSTN or ISDN), International Journal of Innovations in Engineering and Technology (IJIET) Volume 4 Issue 4 December 2014 286 ISSN: 2319 1058 and signalling between functional entities uses the ITUT Signalling System Number 7 (SS7). The Home Location Register (HLR) and Visitor Location Register (VLR), together with the MSC, provide the Call routing and (possibly international) roaming capabilities of GSM. The HLR contains all the administrative information of each subscriber registered in the corresponding GSM network, along with the current location of the mobile. There is logically one HLR per GSM network, but it may be implemented as a distributed database. The Visitor Location Register contains selected administrative information from the HLR, necessary for call control and provision of the subscribed services, for each mobile currently located in the geographical area controlled by the VLR. Although each functional entity can be implemented as an independent unit, most manufacturers of switching equipment implement one VLR together with one MSC, so that the geographical area controlled by the MSC corresponds to that controlled by the VLR. The other two registers are used for authentication and security purposes. The Equipment Identity Register (EIR) is a database that contains a list of all valid mobile equipment on the network, where each mobile station is identified by its International Mobile Equipment Identity (IMEI). An IMEI is marked as invalid if it has been reported stolen or is not type approved. The Authentication Centre is a protected database that stores a copy of the secret key stored in each subscriber s SIM card, which is used for authentication and ciphering of the radio channel. WORKING OF THE SNIFFER DEVICE The sniffer is basically a transceiver that works in the frequency which is in the special unused range that is operated by the service provided or it can designed to operate at a frequency that is of much different frequency than the one that is being used by the nearby cells as there may be possibility of interference by the device with the devices in the nearby cells. The working for the device is as follows. It gives the normal operation of the mobile with the base station and there is a BTS that acts as a middle man in the process of communication between the mobile and the MTSO which is popularly known as MSC or Mobile Switching Centre.There is always a two way communication between devices and before the establishment of the communication the authentication of the SIM card that has the IMSI or the International Mobile Subscriber Identifier. This IMSI number helps in the authorization of the user. The second authentication is the authentication of the handset, which is done in EIR or the Equipment Identifier Register. This register is located at the MSC and it contains the IMEI number of the lost handset and if the signal is obtained from the normal one then the two way communication is established. The IMEI of the lost mobile phone number once has been reported to the service provider, who keeps in track of the record of lost mobile phones. The MTSO or the MSC which keeps in track of all the mobile phones with IMEI number and the IMSI number has the information of the lost mobile phones location which means the location of the cell where the lost device is because of the two way communication with the device the BTS of the lost device is known to MSC. From this information regarding the cell in which the device is located the sniffer device is introduced. Fig: Before Sniffer increases the frequency The next figure shows the sniffer that gets into work for the purpose of detection of the lost device. After the information regarding the IMEI number of the lost device is provided by the MTSO or MSC.This is then fed into the sniffers main memory the sniffer s located in particular cell gets into action of detecting the lost device. The sniffer uses a frequency that is different from the one that 2320 5547 @ 2013-2017 http://www.ijitr.com All rights Reserved. Page 5915

is being used by the base station and the located nearby cells.the base station disconnects the connection with the lost mobile phone, as there is a request regarding this action from the EIR part of the MSC. This causes the lost device to search the BTS to get locked with since each base station does not have authorization capability the lost device send appropriate connection request signal. Now when the sniffer device is being deployed and this device has in built authorization capability the lost device finds the sniffer to get itself locked to the frequency of the sniffer.while the connection between the sniffer and the mobile phone is established; the IMEI of the lost mobile is validated with the stored IMEI and after successful authorization the communication between the sniffer and the lost device is established. If the other devices in the same try to communicate with the sniffer the access is denied and this is done at the validation done based on the IME. Once the communication starts it is mainly with the antenna and the signal strength of the lost device the location can be tracked. However the process to searching can also be aided with the GPS system for more accurate and fast detection The main requirement is that the sniffer is operated in a frequency that is different from the frequency adopted by the cell and nearby ones. Hence the interference from the nearby cell can be avoided. The directional antenna is used in finding the location of the mobile phone. Fig: After Sniffer increases the frequency Here the signal strength of the received signal is obtain antenna pattern is plotted once the signal of the mobile is obtained. The no. of antenna pattern for different position of same mobile phone is used to find the exact location. But however in this method the directional antenna used much be of a very small beam width this helps in more accurate process of detection. Here the antenna pattern is plotted ones the signal of the mobile phone is obtained. The number of antenna pattern for different position of the same mobile phone is used to find the exact location, but however in this method the directional antenna used must be of very small beam width.. Fig.no. 2.5 The sniffer shown in fig tries to communicate with the lost mobile. After getting connected with the mobile it creates a virtual cell pattern and thus helps in the detection of lost mobile phones. ADVANTAGES It is used for detecting lost mobiles. It is cost effective. It is good for low power consumption. It is easy to design. DISADVANTAGES Power of the mobile should be good enough. The frequency of the mobile should be high though the mobile is switched on. It becomes impossible for detecting and receiving the signal from the lost mobile if the frequency is low. APPLICATIONS In common industry usage, a sniffer is a program that monitors and analyzes network traffic, detecting bottlenecks and problems. Using this information, a network manager can keep traffic flowing efficiently. A sniffer can also be used legitimately or illegitimately to capture data being transmitted on a network. A network router reads every packet of data passed to it, determining whether it is intended for a destination within the router's own network or whether it should be passed further along the Internet. 2320 5547 @ 2013-2017 http://www.ijitr.com All rights Reserved. Page 5916

A router with a sniffer, however, may be able to read the data in the packet as well as the source and destination addresses. Sniffers are often used on academic networks to prevent traffic bottlenecks caused by filesharing applications. V. CONCLUSION Since the boom of the mobile phone for the purpose of the communication there has been a large no. of complaints regarding the mobile phone that is being lost and there has been no effective method developed for detecting the lost device. The given paper dealt about the idea of development Sniffer for the detection of lost Mobile phones paves a way by means of which the lost mobile phones can be recovered. But the process of detection is yet to be developed through the software and demo has been developed and is with the authors. The demo has been written in VB that gives the over view of how the lost mobile is being detected and the software has been written in C. The SQL has to be used for the purpose of querying and the internal architecture is of lesser complexity compared to the base station as this mainly involves the control signal and there is no need for the voice process. Though this method appears to be a little bit complex involving the design of the sniffer but however for large scale detection the overall effective cost of the design and the detection scales down. VI. FUTURE ENHANCEMENT There are certain boundary conditions or criteria that have to be qualified for the identification of the lost mobile like the power of the mobile should be good enough, the mobile phone should not be in the shadow region etc., but however this method can be improved by using modern technologies and devices. VII. REFERENCES [1] Schiller, Mobile Communication, Pearson Education 1 Edition, 7th reprint - 2003. [2] John D Kraus, Electromagnetics, TMH, [3] Jordan et al, Electromagnetic waves and radiation system, Printice Hall [4] Network Sniffers, Alan Joch, 2001(Intro&Use.doc). [5] http://ericsson.com [6] http://iec.org [7] http://www.infoworld.com/articles/tc/xml/ 01/12/03/011203tcpackets. [8] MandyAndress,2001(network.htm). http://online.securityfocus.com/infocus/154 9. [9] MathiewTanase, 2002 (SecurityFocus Home infocus Sniffers what they are and how to protect yourself.htm). [10] http://123seminarsonly.com/seminar- Reports/043/78605740-Whitepaper.pdf Study on Packet Sniffing Tools for Educational. [20] Purpose, Computer Journal of Computing Sciences in Colleges,(Vol. 20, Number 4, pp. 169-176). [21] Muna, M., Jawhar, T. & Mehrotra, M. (2010). System Design for Packet Sniffer AUTHOR s PROFILE Edulakanti Kavya, B.Tech Student, Department of CSE, Sphoorthy Engineering College, Nadergul(Vill),Sagar Road, Saroonagar(Mdl),R.R Dist.T.S. Mr. T. Pavan Kumar, Associate Professor, Department of CSE, Sphoorthy Engineering College, Nadergul(Vill),Sagar Road, Saroonagar(Mdl),R.R Dist.T.S. J.Deepthi, Associate Professor & HOD, Department of CSE, Sphoorthy Engineering College, Nadergul(Vill),Sagar Road, Saroonagar(Mdl),R.R Dist.T.S 2320 5547 @ 2013-2017 http://www.ijitr.com All rights Reserved. Page 5917