scispace - formally typeset
Search or ask a question

Showing papers on "GSM published in 2015"


Posted Content
TL;DR: In this paper, the authors introduce a new approach to provide connectivity in the IoT scenario, discussing its advantages over the established paradigms in terms of efficiency, effectiveness, and architectural design, in particular for the typical Smart Cities applications.
Abstract: Connectivity is probably the most basic building block of the Internet of Things (IoT) paradigm. Up to know, the two main approaches to provide data access to the \emph{things} have been based either on multi-hop mesh networks using short-range communication technologies in the unlicensed spectrum, or on long-range, legacy cellular technologies, mainly 2G/GSM, operating in the corresponding licensed frequency bands. Recently, these reference models have been challenged by a new type of wireless connectivity, characterized by low-rate, long-range transmission technologies in the unlicensed sub-GHz frequency bands, used to realize access networks with star topology which are referred to a \emph{Low-Power Wide Area Networks} (LPWANs). In this paper, we introduce this new approach to provide connectivity in the IoT scenario, discussing its advantages over the established paradigms in terms of efficiency, effectiveness, and architectural design, in particular for the typical Smart Cities applications.

748 citations


Journal ArticleDOI
TL;DR: This paper presents a comprehensive review of Wireless Communications Technologies (WCTs) for implementation of smart grid in a systematic way and compares the communications technologies in smart grid context.
Abstract: Smart grid is envisioned to meet the 21st century energy requirements in a sophisticated manner with real time approach by integrating the latest digital communications and advanced control technologies to the existing power grid. It will connect the global users through energy efficiency and awareness corridor. This paper presents a comprehensive review of Wireless Communications Technologies (WCTs) for implementation of smart grid in a systematic way. Various network attributes like internet protocol (IP) support, power usage, data rate etc. are considered to compare the communications technologies in smart grid context. Techniques suitable for Home Area Networks (HANs) like ZigBee, Bluetooth, Wi-Fi, 6LoWPAN and Z-Wave are discussed and compared in context of consumer concerns and network attributes. A similar approach in context of utilities concerns is adopted for wireless communications techniques for Neighborhood Area Networks (NANs) which include WiMAX and GSM based cellular standards. Smart grid applications, associated network issues and challenges are elaborated at the end.

297 citations


Proceedings Article
12 Aug 2015
TL;DR: GSMem, a malware that can exfiltrate data through an air-gap over cellular frequencies, is presented and its efficacy and feasibility are demonstrated, achieving an effective transmission distance of 1 - 5.5 meters with a standard mobile phone.
Abstract: Air-gapped networks are isolated, separated both logically and physically from public networks Although the feasibility of invading such systems has been demonstrated in recent years, exfiltration of data from air-gapped networks is still a challenging task In this paper we present GSMem, a malware that can exfiltrate data through an air-gap over cellular frequencies Rogue software on an infected target computer modulates and transmits electromagnetic signals at cellular frequencies by invoking specific memory-related instructions and utilizing the multichannel memory architecture to amplify the transmission Furthermore, we show that the transmitted signals can be received and demodulated by a rootkit placed in the baseband firmware of a nearby cellular phone We present crucial design issues such as signal generation and reception, data modulation, and transmission detection We implement a prototype of GSMem consisting of a transmitter and a receiver and evaluate its performance and limitations Our current results demonstrate its efficacy and feasibility, achieving an effective transmission distance of 1 - 55 meters with a standard mobile phone When using a dedicated, yet affordable hardware receiver, the effective distance reached over 30 meters

140 citations


Proceedings ArticleDOI
12 Oct 2015
TL;DR: This work proposes a solution, which essentially replaces the IMSIs with changing pseudonyms that are only identifiable by the home network of the SIM's own network provider, and therefore mitigate both passive and active attacks.
Abstract: IMSI catching is a problem on all generations of mobile telecommunication networks, i.e., 2G (GSM, GPRS), 3G (HDSPA, EDGE, UMTS) and 4G (LTE, LTE+). Currently, the SIM card of a mobile phone has to reveal its identity over an insecure plaintext transmission, before encryption is enabled. This identifier (the IMSI) can be intercepted by adversaries that mount a passive or active attack. Such identity exposure attacks are commonly referred to as 'IMSI catching'. Since the IMSI is uniquely identifying, unauthorized exposure can lead to various location privacy attacks. We propose a solution, which essentially replaces the IMSIs with changing pseudonyms that are only identifiable by the home network of the SIM's own network provider. Consequently, these pseudonyms are unlinkable by intermediate network providers and malicious adversaries, and therefore mitigate both passive and active attacks, which we also formally verified using ProVerif. Our solution is compatible with the current specifications of the mobile standards and therefore requires no change in the infrastructure or any of the already massively deployed network equipment. The proposed method only requires limited changes to the SIM and the authentication server, both of which are under control of the user's network provider. Therefore, any individual (virtual) provider that distributes SIM cards and controls its own authentication server can deploy a more privacy friendly mobile network that is resilient against IMSI catching attacks.

81 citations


Proceedings ArticleDOI
21 May 2015
TL;DR: The integration of the Arduino and GSM Short Message Service provide the meter reading system with some automatic functions that are predefined, and the project is able to provide all required services remotely for metering and billing with high fidelity.
Abstract: Every management system is trying to make automatic, portable and remote control. This work presents a novel smart energy meter for an automatic and superior metering and billing system. The integration of the Arduino and GSM Short Message Service (SMS) provide the meter reading system with some automatic functions that are predefined. Firstly, we have simulated the project in PROTEUS 8.0 then successfully implemented on the circuit board in laboratory. The proposed energy meter system can incorporate with embedded controller and GSM modem to transmit the data like consumed energy in kWh, generated bill, security services (line Cut/On) over GSM mobile network such as data can be then fed and integrated into existing energy management systems located at power companies or organizations to provide the services among the customers without man-power. Our implemented project is able to provide all required services remotely for metering and billing with high fidelity.

72 citations


Journal ArticleDOI
TL;DR: The study shows how GSM/ GPRS and LTE cellular system performance behaves with current generation and next generation smart meter traffic, where it is clearly seen that the PMU data will seriously challenge these wireless systems.
Abstract: The introduction of smart electricity meters with cellular radio interfaces has placed an additional load on wireless cellular networks. Currently, these meters are designed for low duty cycle billing and occasional system check, which generates low-rate sporadic traffic. As the number of distributed energy resources increases, household power will become more variable and thus unpredictable from the viewpoint of the distribution system operator (DSO). Therefore, it is expected that in the near future there will be an increase in the number of wide area measurement system (WAMS) devices with phasor measurement unit (PMU)-like capabilities in the distribution grid, thus allowing utilities to monitor the low voltage grid quality while providing information required for tighter grid control. From a communication standpoint, the traffic profile will change drastically toward higher data volumes and higher rates per device. In this paper we characterize the current traffic generated by smart electricity meters, and we discuss the potential traffic requirements resulting from the introduction of enhanced smart meters, i.e. meters with PMUlike capabilities. Our study shows how GSM/ GPRS and LTE cellular system performance behaves with current generation and next generation smart meter traffic, where it is clearly seen that the PMU data will seriously challenge these wireless systems. We conclude by highlighting the possible solutions for upgrading the cellular standards, in order to cope with the upcoming smart metering traffic.

67 citations


Proceedings ArticleDOI
19 Mar 2015
TL;DR: The design and development of a home security system, based on human face recognition technology and remotely monitoring technology, to confirm visitor identity and to control door accessibility has been reported in this paper.
Abstract: Smart home security control system has became indispensable in daily life. The design and development of a home security system, based on human face recognition technology and remotely monitoring technology, to confirm visitor identity and to control door accessibility has been reported in this paper. This paper describes about the implementation and deployment of wireless control system and accessibility in to a home environment for authenticated people only. A wireless network technique ZigBee based and image processing technique PCA based, dedicatedly make the security system alive as per the request. ZigBee module and electromagnetic door lock module combinedly operate the door accessibility, has been designed and developed. Face detection and recognition algorithms, as well as a wireless interface are used to detect and identify visitors and send an email and/or an alert message about the current home environment status via GSM network automatically to the home owner's mobile phone or any communication devices. The concerned authority can control the system through his/her mobile phone or any communication devices by sending AT Commands to GSM MODEM or by taking necessary actions for authentication through email, which is again password protected. Users can monitor visitors and control the door lock on active Web pages enhanced with JavaScript and HTML. This system finds a wide application in areas where physical presence is not possible all the time. The entire control system is built using ARM1176JZF-S microcontroller and tested for actual use in home environment.

59 citations


01 Jan 2015
TL;DR: In this article, the authors focus on mobile phones antenna design with brief description about the historical development, basic parameters and the types of antennas which are used in mobile phones and propose two PIFA antennas.
Abstract: This thesis focuses on mobile phones antenna design with brief description about the historical development, basic parameters and the types of antennas which are used in mobile phones. Mobile phones antenna design section consists of two proposed PIFA antennas. The first design concerns a single band antenna with resonant frequency at GPS frequency (1.575GHz). The first model is designed with main consideration that is to have the lower possible PIFA single band dimensions with reasonable return loss (S11) and the efficiencies. Second design concerns in a wideband PIFA antenna which cover the range from 1800MHz to 2600MHz. This range covers certain important bands: GSM (1800MHz & 1900MHz), UMTS (2100MHz), Bluetooth & Wi-Fi (2.4GHz) and LTE system (2.3GHz, 2.5GHz, and 2.6GHz). The wideband PIFA design is achieved by using slotted ground plane technique. The simulations for both models are performed in COMSOL Multiphysics. The last two parts of the thesis present the problems of mobile phones antenna. Starting with Specific absorption rate (SAR) problem, efficiency of Mobile phones antenna, and hand-held environment.

57 citations


06 Mar 2015
TL;DR: In this paper, the authors have made an attempt to design a system, which would control the valve action based on the sensors output through GSM, along with this it also prevents permanent damage of motor from fluctuations in electricity.
Abstract: It has been seen that, in the agriculture, wastage of water and valve controlling is one of the major concern. At present it is operated manually which leads to great man power requirement. Also adequate and required supply of water is needed in agriculture. Along with these concerns, fluctuations in electricity lead to damage the motor permanently. So we have made an attempt to design a system, which would control the valve action based on the sensors output through GSM. Along with this it also prevents permanent damage of motor from fluctuations in electricity. The main aim of the project is to read the sensors output and to control the valves through the GSM technology. Input signal 230v ac given to the transformer of 12vdc and 12v dc signal is send to microcontroller. Status of the field is sent through the GSM based on the output of the sensors. Depending on this status, valve controlling action is performed. After the adequate supply of water, valves are closed automatically depending on the updated status of the sensors. In this project, we have also improved on automatic action taken to control the valve action in case of GSM facility failure.

51 citations


Proceedings ArticleDOI
01 Jan 2015
TL;DR: An advanced vehicle monitoring and tracking system is designed for monitoring the school vehicle from any location A to location B at real time and provide safety environment to the traveler by using LPG Gas leakage sensor MQ6 and temperature sensor DS18B20.
Abstract: An advanced vehicle monitoring and tracking system is designed for monitoring the school vehicle from any location A to location B at real time and provide safety environment to the traveler. The proposed system would make good use of new technology that based on Embedded Linux board namely Raspberry Pi and its advanced feature of storing database at real time. The proposed system works on Global Positioning System (GPS) and Global System for Mobile Communication (GSM) which is used for vehicle tracking and monitoring mechanism. For this purpose SIM908 Module is used which includes all the three things namely GPS GPRS GSM. The GPS gives current location of the vehicle; GPRS sends the tracking information to the server and the GSM is used for sending alert message to vehicle's owner mobile. The proposed system would place inside the vehicle whose position is to be determined on the web page and monitored at real time. In the proposed system, there is comparison between the current vehicle path and already specified path inside the file system of Raspberry pi. Hence if the driver drives the vehicle on the wrong path then the alert message will be sent from the proposed system to the vehicle's owner mobile and if the vehicle's speed goes beyond the specified value of the speed, then also the warning message will be sent from system to the owner mobile. The proposed system also took care of the traveler's safety by using LPG Gas leakage sensor MQ6 and temperature sensor DS18B20.

50 citations


Proceedings ArticleDOI
23 Apr 2015
TL;DR: The principles behind positioning techniques used in satellite networks, mobile networks and Wireless Local Area Networks are explained, hybrid localization methods that exploit the coexistence of several radio access technologies in the same region are described, and the location based services are classified into several categories.
Abstract: Positioning techniques are known in a wide variety of wireless radio access technologies. Traditionally, Global Positioning System (GPS) is the most popular outdoor positioning system. Localization also exists in mobile networks such as Global System for Mobile communications (GSM). Recently, Wireless Local Area Networks (WLAN) become widely deployed, and they are also used for localizing wireless-enabled clients. Many techniques are used to estimate client position in a wireless network. They are based on the characteristics of the received wireless signals: power, time or angle of arrival. In addition, hybrid positioning techniques make use of the collaboration between different wireless radio access technologies existing in the same geographical area. Client positioning allows the introduction of numerous services like real-time tracking, security alerts, informational services and entertainment applications. Such services are known as Location Based Services (LBS), and they are useful in both commerce and security sectors. In this paper, we explain the principles behind positioning techniques used in satellite networks, mobile networks and Wireless Local Area Networks. We also describe hybrid localization methods that exploit the coexistence of several radio access technologies in the same region, and we classify the location based services into several categories. When localization accuracy is improved, position-dependant services become more robust and efficient, and user satisfaction increases.

Posted Content
TL;DR: Analysis and simulation results show that GSM in VLC outperforms the other considered MIMO schemes at moderate to high SNRs; for example, for 8 bits per channel use, GSM outperforms SMP and GSSK by about 21 dB, and SM by about 10 dB at $10^{-4}$ BER.
Abstract: In this paper, we investigate the performance of generalized spatial modulation (GSM) in indoor wireless visible light communication (VLC) systems. GSM uses $N_t$ light emitting diodes (LED), but activates only $N_a$ of them at a given time. Spatial modulation and spatial multiplexing are special cases of GSM with $N_{a}=1$ and $N_{a}=N_t$, respectively. We first derive an analytical upper bound on the bit error rate (BER) for maximum likelihood (ML) detection of GSM in VLC systems. Analysis and simulation results show that the derived upper bound is very tight at medium to high signal-to-noise ratios (SNR). The channel gains and channel correlations influence the GSM performance such that the best BER is achieved at an optimum LED spacing. Also, for a fixed transmission efficiency, the performance of GSM in VLC improves as the half-power semi-angle of the LEDs is decreased. We then compare the performance of GSM in VLC systems with those of other MIMO schemes such as spatial multiplexing (SMP), space shift keying (SSK), generalized space shift keying (GSSK), and spatial modulation (SM). Analysis and simulation results show that GSM in VLC outperforms the other considered MIMO schemes at moderate to high SNRs; for example, for 8 bits per channel use, GSM outperforms SMP and GSSK by about 21 dB, and SM by about 10 dB at $10^{-4}$ BER.

Book ChapterDOI
21 Sep 2015
TL;DR: This paper analyzes instances of cards from a variety of operators and manufacturers, and describes successful Differential Power Analysis attacks that recover encryption keys and other secrets needed to clone the USIM cards within a few minutes.
Abstract: Side-channel attacks are an increasingly important concern for the security of cryptographic embedded devices, such as the SIM cards used in mobile phones. Previous works have exhibited such attacks against implementations of the 2G GSM algorithms COMP-128, A5. In this paper, we show that they remain an important issue for USIM cards implementing the AES-based MILENAGE algorithm used in 3G/4G communications. In particular, we analyze instances of cards from a variety of operators and manufacturers, and describe successful Differential Power Analysis attacks that recover encryption keys and other secrets needed to clone the USIM cards within a few minutes. Further, we discuss the impact of the operator-defined secret parameters in MILENAGE on the difficulty to perform Differential Power Analysis, and show that they do not improve implementation security. Our results back up the observation that physical security issues raise long-term challenges that should be solved early in the development of cryptographic implementations, with adequatei¾źcountermeasures.

Book
11 Sep 2015
TL;DR: This book introduces readers to SDR methods by viewing and analysing downconverted RF signals in the time and frequency domains, and provides extensive DSP enabled SDR design exercises which the reader can learn from.
Abstract: The availability of the RTL-SDR device for less than $20 brings software defined radio (SDR) to the home and work desktops of EE students, professional engineers and the maker community. The RTL-SDR can be used to acquire and sample RF (radio frequency) signals transmitted in the frequency range 25MHz to 1.75GHz, and the MATLAB and Simulink environment can be used to develop receivers using first principles DSP (digital signal processing) algorithms. Signals that the RTL-SDR hardware can receive include: FM radio, UHF band signals, ISM signals, GSM, 3G and LTE mobile radio, GPS and satellite signals, and any that the reader can (legally) transmit of course! In this book we introduce readers to SDR methods by viewing and analysing downconverted RF signals in the time and frequency domains, and then provide extensive DSP enabled SDR design exercises which the reader can learn from. The hands-on SDR design examples begin with simple AM and FM receivers, and move on to the more challenging aspects of PHY layer DSP, where receive filter chains, real-time channelisers, and advanced concepts such as carrier synchronisers, digital PLL designs and QPSK timing and phase synchronisers are implemented. In the book we will also show how the RTL-SDR can be used with SDR transmitters to develop complete communication systems, capable of transmitting payloads such as simple text strings, images and audio across the lab desktop.

01 Jan 2015
TL;DR: An introduction to basic GSM thoughts, conditions, networks, and facilities is provided, including ISDN compatibility and worldwide roaming in other GSM networks.
Abstract: Global system for mobile communication (GSM) is universally accepted standard for digital cellular communication. GSM is the name of a calibrationgroup established in 1982 to create a common European mobile telephone standard that would formulate specifications for a pan-European mobile cellular radio system operating at 900 MHz this paper provides an introduction to basic GSM thoughts, conditions, networks, and facilities. A short antiquity of network evolution is provided in order to set the background for understanding GSM. In addition to digital transmission, GSM includes many advanced services and landscapes, including ISDN compatibility and worldwide roaming in other GSM networks.

Journal ArticleDOI
14 Apr 2015
TL;DR: Analytical modeling of passive rectifying circuits and the harvesting of electromagnetic (EM) power from intentionally generated as well as from ubiquitous sources are presented and the model provides an accurate method of determining the output characteristics of rectification circuits.
Abstract: In this paper, analytical modeling of passive rectifying circuits and the harvesting of electromagnetic (EM) power from intentionally generated as well as from ubiquitous sources are presented. The presented model is based on the linearization of rectifying circuits. The model provides an accurate method of determining the output characteristics of rectifying circuits. The model was verified with Advance Design System (ADS) Harmonic balance (HB) simulations and measurements. The results from the presented model were in agreement with simulations and measurements. Consequently design considerations and trade-off of radio frequency (RF) harvesters are discussed. To verify the exploitation of ambient RF power sources for operation of sensors, a dual-band antenna with a size of ~λ/4 at 900MHz and a passive dual-band rectifier that is able to power a commercial Thermo-Hygrometer requiring ~1.3V and 0.5MΩ from a global system for mobile communications (GSM) base station is demonstrated. The RF power delivered by the receiving dual-band antenna at a distance of about 110 m from the GSM base station ranges from -27 dBm to -50 dBm from the various GSM frequency bands. Additionally, wireless range measurements of the RF harvesters in the industrial, scientific and medical (ISM) band 868MHz is presented at indoor conditions.

Proceedings ArticleDOI
04 Apr 2015
TL;DR: A detailed comparative study of communication protocols that can be implemented in Smart Grid Communication focuses on various aspects such as network spanning, data rates, power consumption, data security and encryption standards, data access and spread spectrum techniques, modulation and duplexing schemes for all the communication standards in Smart grid.
Abstract: Since 2005, Smart Grid technology has revolutionized the electric power system industry. Researchers have shown a lot of interest in the opportunities offered by ICT(Information and Communication Technologies), to modernize the operation of electrical networks. This is possible by decarbonizing them as well as monitoring and controlling them with sophisticated communication standards. For this purpose, merging the technologies offered by electrical and telecommunication sector is very crucial. Various wireless communication standards viz. WiMAX, Zig Bee, Bluetooth, Wi-Fi, GSM, GPRS, UMTS etc. Can be exploited to develop Smart Grid Network and extend communication throughout the distributed system. This paper gives a detailed comparative study of communication protocols that can be implemented in this domain. It focuses on various aspects such as network spanning, data rates, power consumption, data security and encryption standards, data access and spread spectrum techniques, modulation and duplexing schemes for all the communication standards in Smart Grid. Hence by addressing all the critical issues, this paper provides a contemporary look in the still open research areas in Smart Grid Communication.

Proceedings ArticleDOI
19 Mar 2015
TL;DR: The proposed system would place inside the vehicle whose position is to be determined on the web page and monitored at real time and took care of the traveler's safety by using LPG Gas leakage sensor MQ6 and temperature sensor DS18B20.
Abstract: An advanced vehicle monitoring and tracking system based on Embedded Linux Board and android application is designed and implemented for monitoring the school vehicle from any location A to location B at real time The proposed system would make good use of new technology that based on Embedded Linux board namely Raspberry Pi and Smartphone android application The proposed system works on GPS/GPRS/GSM SIM900A Module which includes all the three things namely GPS GPRS GSM The GPS current location of the vehicle; GPRS sends the tracking information to the server and the GSM is used for sending alert message to vehicle's owner mobile The proposed system would place inside the vehicle whose position is to be determined on the web page and monitored at real time In the proposed system, there is comparison between the current vehicle path and already specified path into the file system of raspberry pi Here in the proposed system the already specified path inside the raspberry pi's file system taken from vehicle owner's android smartphone using android application Means the selection of path from location A to B takes place from vehicle owner's android application which gives more safety and secures traveling to the traveler Hence the driver drives the vehicle only on the vehicle owner's specified path If the driver drives the vehicle on the wrong path then the alert message will be sent from the proposed system to the vehicle's owner mobile and also speakers alert driven using Raspberry pi's audio jack If the vehicle's speed goes beyond the specified value of the speed, then also the warning message will be sent from system to the owner mobile The proposed system also took care of the traveler's safety by using LPG Gas leakage sensor MQ6 and temperature sensor DS18B20

Journal Article
TL;DR: An overview on IoT and technologies used in IoT is provided and things like Zigbee, Radio Frequency Identification, Gsm, WSN (Wireless Sensors Network), and Actuators etc.
Abstract: IoT is nothing but the Internet-of-Things in which where daily life all things connected to internet and can be monitor & can be operate remotely from anywhere. Daily life things like urban management, Green agriculture, industrial wireless sensor network or Industrial management, Environmental monitoring, Tele-medicine, intelligent transportation and smart homes etc. To develop such systems smart or standard technologies are used like Zigbee, Radio Frequency Identification, Gsm, WSN (Wireless Sensors Network), and Actuators etc. This paper provides an overview on IoT and technologies used in IoT.

Journal ArticleDOI
TL;DR: The results of practical circuit show the proper functions of the microcontroller based home security system and also verify the reliable security within reasonable cost.
Abstract: In this paper, design and implement of a microcontroller based home security system with GSM technology have been presented and analyzed. Two microcontrollers with other peripheral devices which include Light Emitting Diode (LED), Liquid Crystal Display (LCD), Buzzer and Global System for Mobile Communication (GSM) Module are responsible for reliable operation of the proposed security system. In addition, a mobile phone is interfaced with microcontroller through a Bluetooth device in order to control the system. Moreover, a manual keypad is another way to lock or unlock the system. A Compiler Code Vision AVR is used to design a program that controls the system along with maintaining all security functions. The designed program is applied in Proteus Software for simulation. At last, the results of practical circuit show the proper functions and also verify the reliable security within reasonable cost.

Proceedings ArticleDOI
09 Apr 2015
TL;DR: This paper presents an unmanned aerial vehicle (UAV) based software defined radio (SDR) platform which can be rapidly deployed for use in emergency communication scenarios and serves as flying GSM base stations and can provide cellular network coverage to users within their vicinity.
Abstract: Communications infrastructure can be damaged during natural disasters or terrorist attacks For example, the 2011 Tsunami in Japan has severely damaged the cellular network infrastructure, which negatively affects search and rescue operations, emergency communications, and coordination among first responders In this paper, we present an unmanned aerial vehicle (UAV) based software defined radio (SDR) platform which can be rapidly deployed for use in emergency communication scenarios In particular, the UAVs serve as flying GSM base stations and can provide cellular network coverage to users within their vicinity The Universal Software Radio Peripheral (USRP) are used as the SDR equipment, which run OpenBTS software for implementing the GSM technology We present the design and implementation of the considered platform in this extended abstract

01 Jan 2015
TL;DR: A “GPS and GSM based vehicle tracking and women employee security system” that provides the combination of GPS device and specialized software to track the vehicle’s location as well as provide alerts and messages with an emergency button trigger is described.
Abstract: Women’s security is a critical issue in today’s wor ld and its very much needed for every individual to be acting over such an issue. This paper describes a “GPS and GSM based vehicle tracking and women employee security system” that provides the combination of GPS device and specialized software to track the vehicle’s location as well as provide alerts and messages with an emergency button trigger. Now a days due to rece ntly happened cases such as rape by drivers or coll eagues, burglary etc., employee security, especially women employee security has become the foremost priority of the companie s. System uses the Global Positioning System technology to find out th e location of vehicle. The information of vehicle p osition provided by the device can be viewed on Google maps using Internet or specialized software. The IT companies are looki ng forward to the security problem and requires a system that will ef ficiently evaluate the problem of women employees security working in night shifts. This paper focuses on the proposed model th at can be used to deal with the problem of security issue of women employees using GPS and GSM based vehicle tracking .

Patent
Li Kewei, Qiu Yiwu, Shen Yuebo, Dan Jianfei, Xu Wei 
20 May 2015
TL;DR: In this paper, the authors presented an electric bicycle intelligent networking system consisting of a battery, a battery charger, a GSM/GPRS data transmission module, a positioning module, bluetooth module, speed measuring module, triaxial acceleration sensor, and a triaxisial gyroscope module.
Abstract: The utility model discloses an electric bicycle intelligent networking terminal and an electric bicycle intelligent networking system. The electric bicycle intelligent networking terminal comprises a main controller; a battery, a GSM/GPRS data transmission module, a positioning module, a bluetooth module, a speed measuring module, a triaxial acceleration sensor, and a triaxial gyroscope module, which are connected with the main controller. The GSM/GPRS data transmission module can be used to realize the bidirectional communication between the electric bicycle intelligent networking terminal and the server. The positioning module adopts the way of combining the GPS, the Beidou satellite, the base station, and the wifi together for positioning. The bluetooth module is paired with the bluetooth of the cell phone terminal to realize the bidirectional communication. The speed measuring module, the triaxial acceleration sensor, and the triaxial gyroscope module are used for measuring the driving speed and the driving direction of the electric bicycle, and can be used to transmit the data of the driving speed and the driving direction of the electric bicycle to the main controller. The electric bicycle intelligent networking terminal has advantages of good anti-theft alarming function, good abnormity monitoring function, good intelligent locking function, and good battery electric quantity monitoring function.

Proceedings ArticleDOI
Wael Guibene1, Keith Nolan1, Mark Kelly1
01 Oct 2015
TL;DR: This paper starts by introducing the context of C-IoT and demonstrate how this technology is closely linked to the Low Power-Wide Area technologies and networks.
Abstract: In this paper we investigate the proposals made by various industries for the Cellular Internet of Things (C-IoT). We start by introducing the context of C-IoT and demonstrate how this technology is closely linked to the Low Power-Wide Area (LPWA) technologies and networks. An in-depth look and system level evaluation is given for each clean slate technology and a comparison is made based on its specifications.

Journal ArticleDOI
TL;DR: A decentralized cooperative method called PulseCounting for DTN localization and a probabilistic tracking method called ProbTracking to confront this challenge of positioning and tracking in a sparse disruption tolerant network are proposed.
Abstract: With the increasing number of location-dependent applications, positioning and tracking a mobile device becomes more and more important to enable pervasive and context-aware service. While extensive research has been performed in physical localization and logical localization for satellite, GSM and WiFi communication networks where fixed reference points are densely-deployed, positioning and tracking techniques in a sparse disruption tolerant network (DTN) have not been well addressed. In this paper, we propose a decentralized cooperative method called PulseCounting for DTN localization and a probabilistic tracking method called ProbTracking to confront this challenge. PulseCounting evaluates the user walking steps and movement orientations using accelerometer and electronic compass equipped in cellphones. It estimates user location by accumulating the walking segments, and improves the estimation accuracy by exploiting the encounters of mobile nodes. Several methods to refine the location estimation are discussed, which include the adjustment of trajectory based on reference points and the mutual refinement of location estimation for encountering nodes based on maximum-likelihood. To track user movement, the proposed ProbTracking method uses Markov chain to describe movement patterns and determines the most possible user walking trajectories without full record of user locations. We implemented the positioning and tracking system in Android phones and deployed a testbed in the campus of Nanjing University. Extensive experiments are conducted to evaluate the effectiveness and accuracy of the proposed methods, which show an average deviation of 9m in our system compared to GPS.

Book ChapterDOI
15 Dec 2015
TL;DR: In this paper, the authors proposed an approach which does not require any changes to the existing deployed network infrastructures, i.e. to the serving networks or the mobile devices, but offers improved user identity protection over the air interface.
Abstract: Although the security properties of 3G and 4G mobile networks have significantly improved by comparison with 2G GSM, significant shortcomings remain with respect to user privacy. A number of possible modifications to 2G, 3G and 4G protocols have been proposed designed to provide greater user privacy; however, they all require significant alterations to the existing deployed infrastructures, which are almost certainly impractical to achieve in practice. In this article we propose an approach which does not require any changes to the existing deployed network infrastructures, i.e. to the serving networks or the mobile devices, but offers improved user identity protection over the air interface. The proposed scheme makes use of multiple IMSIs for an individual USIM to offer a degree of pseudonymity for a user. The only changes required are to the operation of the authentication centre in the home network and to the USIM, both owned by a single entity in the mobile telephony system. The scheme could be deployed immediately since it is completely transparent to the existing mobile telephony infrastructure. We present two different approaches to the use and management of multiple IMSIs, and report on experiments to validate its deployability.

Journal ArticleDOI
TL;DR: Based on the experimental analysis of simultaneous radio frequency measurements from two different radio frequency systems, a RFID localization mechanism that is able to integrate macrocellular technologies information is proposed, showing improved results in terms of accuracy.
Abstract: Indoor localization, this means solutions providing the position of mobile objects/persons in indoor environments (e.g., hospitals, malls, etc.), is one of the most cutting-edge services with growing demand in smart applications such as robotics for care, pedestrian navigations, etc. With the objective of providing indoor localization, this paper presents the experimental analysis of simultaneous radio frequency measurements from two different radio frequency systems: Ultra High Frequency Radio Frequency IDentification (UHF RFID) and macrocellular networks. Extensively deployed cellular technologies (Global System for Mobile communications (GSM) and Universal Mobile Telecommunications System (UMTS)) are here evaluated with the purpose of enhancing pre-existent RFID-based localization systems at reduced costs. Temporal and statistical analysis of the measurements gathered from each technology is performed, and its applicability for localization is assessed. Based on this analysis, a RFID localization mechanism that is able to integrate macrocellular technologies information is proposed, showing improved results in terms of accuracy.

Journal ArticleDOI
TL;DR: In this article, the impact of radiated transient interferences generated by sparks in a GSM-railway signaling system was evaluated using base-band simulation and amplitude probability distribution detector.
Abstract: A common source of noise for digital communication systems is the radiated transient interference. As an example, it has been reported that the degradation is produced to the Global System for Mobile (GSM)-Railway signaling system when the impulsive noise is generated by sparks caused by the discontinuity between the catenary and the pantograph. Concerning the measurement and evaluation procedures defined in the electromagnetic compatibility standards, they are not suitable for these types of transient disturbances. Therefore, new techniques must be developed to determine, with a high confidence level, the degradation that impulsive noise will produce in communication systems. In this paper, novel time-domain measurement procedures are carried out to acquire transient interferences generated by sparks properly. Moreover, two different evaluation methodologies, employing base-band simulation and amplitude probability distribution detector, are used to analyze the impact of the disturbance applied into a GSM system interference scenario. Finally, the results obtained with the developed methodologies are successfully compared with a reference measure where the GSM downlink channel quality is monitored by a mobile station test unit.

Proceedings ArticleDOI
11 May 2015
TL;DR: A novel ASI algorithm is proposed for the identification of GSM and LTE signals, which is based on the pilot-induced second-order cyclostationarity, which provides a very good performance at low signal-to-noise ratios and short observation times, with no need for channel estimation, and timing and frequency synchronization.
Abstract: Automatic signal identification (ASI) has various millitary and commercial applications, such as spectrum surveillance and cognitive radio. In this paper, a novel ASI algorithm is proposed for the identification of GSM and LTE signals, which is based on the pilot-induced second-order cyclostationarity. The proposed algorithm provides a very good performance at low signal-to-noise ratios and short observation times, with no need for channel estimation, and timing and frequency synchronization. Simulations and off-the-air signals acquired with the ThinkRF WSA4000 receiver are used to confirm the findings.

Proceedings ArticleDOI
19 Mar 2015
TL;DR: In this paper, a new system based on ARM-Cortex M3 processor is proposed to protect the energy meter from phase line bypassing, neutral line disconnection, whole meter bypassing and meter tampering.
Abstract: Electricity theft is a common practice in developing countries which cannot be controlled by the governments due to lack of technology Emerging trends such as Automatic Meter Reading (AMR) eliminate the need of person visiting each house but this advancement further increases Non-Technical losses (NTL) because of no regular inspection at the residence However traditional meter reading by human operator is inefficient to meet the future residential development needs This paper proposes a new system based on ARM-Cortex M3 processor to protect the energy meter from phase line bypassing, neutral line disconnection, whole meter bypassing and meter tampering A SMS automatically send to utility server through Global System for Mobile (GSM) network when these measures detected In this paper a novel method is proposed to solve the problem with AMR systems without affecting its major advantage of remote monitoring Integrating this new feature into smart meters provides a robust metering solution