Student Projects

cancel
Showing results for 
Search instead for 
Did you mean: 

Control of GSM mobile device appearance, MEPhI

Contact Information

University:National Research Nuclear University “MEPhI”

Team Members (with year of graduation):

1. Ponomarev Sergey

NRNU “MEPhI”, 4 th course of Study, Faculty of Cybernetics and Information Security – 2016, spsergey13@gmail.com

2. Volchkov Pavel

NRNU “MEPhI”, 4 th course of Study, Faculty of Cybernetics and Information Security – 2016, pashtetez@mail.ru


Faculty Advisers: Lukianenko Leonid Vladimirovich


Email Address: karuzagamb@gmail.com


Submission Language: English


Project Information

Title: Device for control of GSM mobile device appearance in the set area.


Description: 

1.                  “Sota” hardware and software complex is a system for collecting mobile devices identification data in the set area. The complex allows working in the black and white lists modes by sending notifications in case of unauthorized device appearing.

System for collection of mobile device identification data in the set area is a base (local) station, to which mobile devices are connecting. Mobile network made by the system occupies operating band of GSM standard and is defined by mobile devices.

Hardware and software complex disguises itself like mobile network base station. Automated connection (switching) of mobile devices to the complex is made by detecting the station with the strongest signal level by mobile device. Complex doesn’t need the usage and assistance of networks of the present mobile network operators. But the full-scale connection is not made; after identification data reception the system prohibits customer’s connection. After the connection is prohibited, the customer again switches to its real network.

All the processed data is stored in the complex own database. Filtration base changes can be made through the server and are applied immediately. Thus, latest information, its display and control over the identification data is possible right after its appearance. In case of policy violation full information on the intercepted object is presented.


Products: For development the following software was used:

·         LabView

·         GNU Radio

·         Python and C++

The Challenge:

Criminal groups number growth, free access to modern armament, informational systems and special machinery need security systems functions widening and is followed by the complication of its structure.

Key security threats:

- Emergency situations (fire, destruction, accident etc.);

- Thievery and property damage;

- Terrorist threats;

- Information theft.

But the modern level of information technologies growth allows monitoring of the mobile devices appearance within the controlled area. The proposed solution is a development of the system for mobile devices activity detection within the controlled area for transmission of the information to automated operator working place for unauthorized actions detection.

The Solution:

The device is used for perimeter control or object control and detects unauthorized mobile terminals. In this case there is no identification of mobile terminals and SIM-cards for the customer, and identifiers are not saved in the permanent memory, only their hash-sums. The device helps to detect not only the presence of active mobile terminals within the territory, but the frequency of equal identifiers appearance, mobile devices  accumulation and detects as well the presence of the working mobile terminals with the set identifiers in the corresponding work modes (black/white list). The device is used for control over the relocation of mobile terminals over the set borders for the following correlation of the mobile terminals, which are moved in or out of the controlled zone. The device can also be used for calculating mobile terminals number by analyzing with the help of a great number of changeable samples.  Samples help to identify network operators used by the mobile terminals (through SIM-card identifier), origin and device model and make detailed statistics.

For complex security of the rooms and audit of wireless situation the device for air analysis was developed, which helps to control radiofrequencies range between 100 MHz and 6 GHz.  The device detects the main wireless network standards (Wi-Fi, Bluetooth, Zigbee, GSM etc.) by collecting the information on radiating devices. The device can be used as wireless security system in the universities, hospitals, judicial, military and governmental bodies, finance institutions as well as in jails and penitentiary facilities. The device is full-passive and doesn’t produce any radiointerference.  


Contributors