SlideShare una empresa de Scribd logo
1 de 46
Luca Bongiorni OpenBTS UNIVERSITY OF OSTRAVA Department of Telecommunication
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Terminology
What is ?! ,[object Object],[object Object]
Advantages ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How GSM works !? Mobile Stations Base Station  Subsystem Network  Management Subscriber and terminal  equipment databases BSC MSC VLR HLR EIR AUC OMC BTS BTS BTS
GSM Mobile Station ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Subscriber Identity Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Management Scheme ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Detection of Compromised Equipment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication and Encryption Scheme A3 Mobile Station Radio Link GSM Operator A8 A5 A3 A8 A5 K i K i K c K c SIM Challenge RAND m i Encrypted Data m i Signed response (SRES) SRES SRES F n F n
Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication Sequence
Authentication Sequence
Authentication Sequence
Authentication Features
A5 Encryption Mobile Stations Base Station  Subsystem Network  Management Subscriber and terminal  equipment databases BSC MSC VLR HLR EIR AUC OMC BTS BTS BTS A5 Encryption
A5 Streaming Implementation A5 output is 228 bit for both directions A5 K c  (64 bit) F n  (22 bit) 114 bit XOR Data (114 bit) A5 K c  (64 bit) F n  (22 bit) 114 bit XOR Ciphertext (114 bit) Data (114 bit) Mobile Station BTS
SMS Architecture ,[object Object],[object Object],[object Object],[object Object]
SIM Anatomy ,[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Card Anatomy
Microprocessor Cards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
USRP/GNU Radio: these unknown… ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Universal Software Radio Peripheral It is also designed to be flexible, allowing developers to make their own daughterboards for specific needs with regard to connectors, different frequency bands, etc.It is widely used in hobbyist, academic and commercial.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Universal Software Radio Peripheral
Features ,[object Object],[object Object],[object Object]
Hardware Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],OR
Software Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object]
GNU Radio ,[object Object]
Installation of Gnu Radio ,[object Object],[object Object],[object Object],[object Object],[object Object]
OpenBTS installation and settings ,[object Object],[object Object],[object Object],[object Object]
Configuring Asterisk ,[object Object],[object Object],[object Object]
Testing the OpenBTS ,[object Object],[object Object],[object Object],[object Object]
Practical Application ,[object Object],Aerial view of 2009 Burning Man site: 3 km wide, 43,000 people, 1 week.
Planned Services ,[object Object],[object Object],[object Object],[object Object],[object Object]
Hardware Used
Power System
GSM Network
Results ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Emergency GSM Messaging & Monitoring System for Civil Protection It is proposed as a solution ready-to-deploy in the event of natural disaster, in that areas where GSM networks are temporarily down. With the full handvover it also ensures the possibilty, by users, to move they from a BTS cell to another, so as to ensure optimum performance and usability of telephony / messaging system.
GSM Messaging & Monitoring System  With the graphical interface, web-based, it is possible to reach all users in a given area and with its database will be possible to operate a feedback system to monitor their actual receipt and act accordingly management of emergency vehicles to be sent in a given area.
GSM Triangulation Another service implemented, in case are deployed on the ground, at least 3 BTS, is able to triangulate the signal from a particular user, with good approximation.
Conclusions In these few slides we saw how could be simple… develop and deploy a low cost GSM network. Infact OpenBTS gives us all we need and as an open source project, we can extend research into all GSM know-how, thanks especially to big community of researchers.
Future Projects ,[object Object],[object Object]
Links ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bongiorni Luca –  http://www.securitycondition.com These slides are written and distributed under Attribution-NonCommercial 3.0 Unported Thank you for Attention

Más contenido relacionado

La actualidad más candente

LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
EC-Council
 
Overview Of Gsm Cellular Network & Operations
Overview Of Gsm Cellular Network & OperationsOverview Of Gsm Cellular Network & Operations
Overview Of Gsm Cellular Network & Operations
Deepak Sharma
 
Interworking wcdma to lte
Interworking wcdma to lteInterworking wcdma to lte
Interworking wcdma to lte
bahar
 
Total GSM Concept
Total GSM ConceptTotal GSM Concept
Total GSM Concept
Tempus Telcosys
 
Vulnerable Out of the Box: An Evaluation of Android Carrier Devices
Vulnerable Out of the Box: An Evaluation of Android Carrier DevicesVulnerable Out of the Box: An Evaluation of Android Carrier Devices
Vulnerable Out of the Box: An Evaluation of Android Carrier Devices
Priyanka Aash
 

La actualidad más candente (20)

LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
 
Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)
 
2 g data call flow
2 g data call flow2 g data call flow
2 g data call flow
 
Call flow
Call flowCall flow
Call flow
 
Channel element
Channel elementChannel element
Channel element
 
Nokia engineer basic_training_session_v1
Nokia engineer basic_training_session_v1Nokia engineer basic_training_session_v1
Nokia engineer basic_training_session_v1
 
Mobile Networks Architecture and Security (2G to 5G)
Mobile Networks Architecture and Security (2G to 5G)Mobile Networks Architecture and Security (2G to 5G)
Mobile Networks Architecture and Security (2G to 5G)
 
Basic GSM Call Flows
Basic GSM Call FlowsBasic GSM Call Flows
Basic GSM Call Flows
 
Overview Of Gsm Cellular Network & Operations
Overview Of Gsm Cellular Network & OperationsOverview Of Gsm Cellular Network & Operations
Overview Of Gsm Cellular Network & Operations
 
CS-Core Mobile Network (General)
CS-Core Mobile Network (General)CS-Core Mobile Network (General)
CS-Core Mobile Network (General)
 
Layer 3 messages (2G)
Layer 3 messages (2G)Layer 3 messages (2G)
Layer 3 messages (2G)
 
Interworking wcdma to lte
Interworking wcdma to lteInterworking wcdma to lte
Interworking wcdma to lte
 
Attach flow & srb
Attach flow & srbAttach flow & srb
Attach flow & srb
 
Total GSM Concept
Total GSM ConceptTotal GSM Concept
Total GSM Concept
 
Layer 3 messages
Layer 3 messagesLayer 3 messages
Layer 3 messages
 
Vulnerable Out of the Box: An Evaluation of Android Carrier Devices
Vulnerable Out of the Box: An Evaluation of Android Carrier DevicesVulnerable Out of the Box: An Evaluation of Android Carrier Devices
Vulnerable Out of the Box: An Evaluation of Android Carrier Devices
 
2G Handover Details (Huawei)
2G Handover Details (Huawei)2G Handover Details (Huawei)
2G Handover Details (Huawei)
 
Events in tems products
Events in tems productsEvents in tems products
Events in tems products
 
GSM channels
GSM channelsGSM channels
GSM channels
 
Lte irat-troubleshooting-guide
Lte irat-troubleshooting-guideLte irat-troubleshooting-guide
Lte irat-troubleshooting-guide
 

Destacado

Openbts animal farm david a burgess germany
Openbts animal farm david a burgess germanyOpenbts animal farm david a burgess germany
Openbts animal farm david a burgess germany
Daud Suleiman
 
Open bts guide_en_v0.1
Open bts guide_en_v0.1Open bts guide_en_v0.1
Open bts guide_en_v0.1
Daud Suleiman
 
Gsm security
Gsm securityGsm security
Gsm security
Ali Kamil
 
Bts Presentation, indosat cinta indonesia
Bts Presentation, indosat cinta indonesiaBts Presentation, indosat cinta indonesia
Bts Presentation, indosat cinta indonesia
nany wardhani
 

Destacado (20)

Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
 
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
 iParanoid: an IMSI Catcher - Stingray Intrusion Detection System iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
 
29c3 OpenBTS workshop - Hardware and sotware
29c3 OpenBTS workshop - Hardware and sotware29c3 OpenBTS workshop - Hardware and sotware
29c3 OpenBTS workshop - Hardware and sotware
 
OpenBTS - Building Real Mobile Networks, Big or Small
OpenBTS - Building Real Mobile Networks, Big or SmallOpenBTS - Building Real Mobile Networks, Big or Small
OpenBTS - Building Real Mobile Networks, Big or Small
 
OpenBTS AirPutih
OpenBTS AirPutihOpenBTS AirPutih
OpenBTS AirPutih
 
Catching imsi catchers
Catching imsi catchersCatching imsi catchers
Catching imsi catchers
 
Osmocom
OsmocomOsmocom
Osmocom
 
Successfully transforming BT's intranet using social media
Successfully transforming BT's intranet using social mediaSuccessfully transforming BT's intranet using social media
Successfully transforming BT's intranet using social media
 
Project Presentation Midyear
Project Presentation MidyearProject Presentation Midyear
Project Presentation Midyear
 
Openbts animal farm david a burgess germany
Openbts animal farm david a burgess germanyOpenbts animal farm david a burgess germany
Openbts animal farm david a burgess germany
 
Ome200301 gsm bts trouble shooting issue3.0
Ome200301 gsm bts trouble shooting issue3.0Ome200301 gsm bts trouble shooting issue3.0
Ome200301 gsm bts trouble shooting issue3.0
 
Open bts guide_en_v0.1
Open bts guide_en_v0.1Open bts guide_en_v0.1
Open bts guide_en_v0.1
 
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
 
Modèle de cahier des charges web
Modèle de cahier des charges webModèle de cahier des charges web
Modèle de cahier des charges web
 
Rédaction d'un cahier des charges web
Rédaction d'un cahier des charges webRédaction d'un cahier des charges web
Rédaction d'un cahier des charges web
 
Gsm security
Gsm securityGsm security
Gsm security
 
GSM Security
GSM SecurityGSM Security
GSM Security
 
Introduction à la gestion de projet web
Introduction à la gestion de projet webIntroduction à la gestion de projet web
Introduction à la gestion de projet web
 
Bts guidelines 2013 for diagnostic flexible bronchoscopy in
Bts guidelines 2013 for diagnostic flexible bronchoscopy inBts guidelines 2013 for diagnostic flexible bronchoscopy in
Bts guidelines 2013 for diagnostic flexible bronchoscopy in
 
Bts Presentation, indosat cinta indonesia
Bts Presentation, indosat cinta indonesiaBts Presentation, indosat cinta indonesia
Bts Presentation, indosat cinta indonesia
 

Similar a OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection

bsnl presentation on gsm
bsnl presentation on  gsm bsnl presentation on  gsm
bsnl presentation on gsm
Kapil Masatker
 
gsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdfgsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdf
samss12
 
gsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdfgsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdf
andutokicho
 

Similar a OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection (20)

Gsm Network
Gsm NetworkGsm Network
Gsm Network
 
Rk 3 gsm network
Rk 3 gsm networkRk 3 gsm network
Rk 3 gsm network
 
Rk 3 gsm network @guddu
Rk 3 gsm network @gudduRk 3 gsm network @guddu
Rk 3 gsm network @guddu
 
Mob. comp . prst
Mob. comp . prstMob. comp . prst
Mob. comp . prst
 
GSM Architecture.ppt
 GSM Architecture.ppt GSM Architecture.ppt
GSM Architecture.ppt
 
GSM network
GSM networkGSM network
GSM network
 
GSM WITH SATELLITE.pptx
GSM WITH SATELLITE.pptxGSM WITH SATELLITE.pptx
GSM WITH SATELLITE.pptx
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
PID3902073
PID3902073PID3902073
PID3902073
 
bsnl presentation on gsm
bsnl presentation on  gsm bsnl presentation on  gsm
bsnl presentation on gsm
 
gsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdfgsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdf
 
gsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdfgsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdf
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM Architecture
 
Gsm overview11
Gsm overview11Gsm overview11
Gsm overview11
 
105093_633617613676087500 GSM technology.ppt
105093_633617613676087500 GSM technology.ppt105093_633617613676087500 GSM technology.ppt
105093_633617613676087500 GSM technology.ppt
 
Journey of Evolution of UMTS and CDMA
Journey of Evolution of UMTS and CDMAJourney of Evolution of UMTS and CDMA
Journey of Evolution of UMTS and CDMA
 
GSM.ppt
GSM.pptGSM.ppt
GSM.ppt
 
GSM
GSMGSM
GSM
 
Mbile communication and computingGSM Network.ppt
Mbile communication and computingGSM Network.pptMbile communication and computingGSM Network.ppt
Mbile communication and computingGSM Network.ppt
 
GSM, GPRS and UMTS: easy handbook
GSM, GPRS and UMTS: easy handbookGSM, GPRS and UMTS: easy handbook
GSM, GPRS and UMTS: easy handbook
 

Más de Luca Bongiorni

Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Luca Bongiorni
 

Más de Luca Bongiorni (7)

HandPwning Security pitfalls of biometric hand-geometry recognition access co...
HandPwning Security pitfalls of biometric hand-geometry recognition access co...HandPwning Security pitfalls of biometric hand-geometry recognition access co...
HandPwning Security pitfalls of biometric hand-geometry recognition access co...
 
ANP catalog: the adversarial ninja playset
ANP catalog: the adversarial ninja playsetANP catalog: the adversarial ninja playset
ANP catalog: the adversarial ninja playset
 
Manufacturing Hardware Implants from Idea to Mass Production: A Hacker's Journey
Manufacturing Hardware Implants from Idea to Mass Production: A Hacker's JourneyManufacturing Hardware Implants from Idea to Mass Production: A Hacker's Journey
Manufacturing Hardware Implants from Idea to Mass Production: A Hacker's Journey
 
How to bring HID attacks to next level with WHID Injector & P4wnP1
How to bring HID attacks to next level with WHID Injector & P4wnP1How to bring HID attacks to next level with WHID Injector & P4wnP1
How to bring HID attacks to next level with WHID Injector & P4wnP1
 
Certificate Pinning in Mobile Applications
Certificate Pinning in Mobile ApplicationsCertificate Pinning in Mobile Applications
Certificate Pinning in Mobile Applications
 
Lockpicking Baltic Cyber Security Forum 2013
Lockpicking Baltic Cyber Security Forum 2013Lockpicking Baltic Cyber Security Forum 2013
Lockpicking Baltic Cyber Security Forum 2013
 
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection

  • 1. Luca Bongiorni OpenBTS UNIVERSITY OF OSTRAVA Department of Telecommunication
  • 2.
  • 3.
  • 4.
  • 5. How GSM works !? Mobile Stations Base Station Subsystem Network Management Subscriber and terminal equipment databases BSC MSC VLR HLR EIR AUC OMC BTS BTS BTS
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Authentication and Encryption Scheme A3 Mobile Station Radio Link GSM Operator A8 A5 A3 A8 A5 K i K i K c K c SIM Challenge RAND m i Encrypted Data m i Signed response (SRES) SRES SRES F n F n
  • 12.
  • 17. A5 Encryption Mobile Stations Base Station Subsystem Network Management Subscriber and terminal equipment databases BSC MSC VLR HLR EIR AUC OMC BTS BTS BTS A5 Encryption
  • 18. A5 Streaming Implementation A5 output is 228 bit for both directions A5 K c (64 bit) F n (22 bit) 114 bit XOR Data (114 bit) A5 K c (64 bit) F n (22 bit) 114 bit XOR Ciphertext (114 bit) Data (114 bit) Mobile Station BTS
  • 19.
  • 20.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 39.
  • 40. Emergency GSM Messaging & Monitoring System for Civil Protection It is proposed as a solution ready-to-deploy in the event of natural disaster, in that areas where GSM networks are temporarily down. With the full handvover it also ensures the possibilty, by users, to move they from a BTS cell to another, so as to ensure optimum performance and usability of telephony / messaging system.
  • 41. GSM Messaging & Monitoring System With the graphical interface, web-based, it is possible to reach all users in a given area and with its database will be possible to operate a feedback system to monitor their actual receipt and act accordingly management of emergency vehicles to be sent in a given area.
  • 42. GSM Triangulation Another service implemented, in case are deployed on the ground, at least 3 BTS, is able to triangulate the signal from a particular user, with good approximation.
  • 43. Conclusions In these few slides we saw how could be simple… develop and deploy a low cost GSM network. Infact OpenBTS gives us all we need and as an open source project, we can extend research into all GSM know-how, thanks especially to big community of researchers.
  • 44.
  • 45.
  • 46. Bongiorni Luca – http://www.securitycondition.com These slides are written and distributed under Attribution-NonCommercial 3.0 Unported Thank you for Attention