Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
186 views5 pages

CEIR Based Smartphones Anti-Stolen System: Sassceir: Arun Kumar Bediya, Rajendra Kumar

This document summarizes a research paper on a proposed system called SASSCEIR (Smartphones Anti-Stolen System based on Central Equipment Identity Register) to address limitations in existing CEIR (Central Equipment Identity Register) systems for blocking stolen smartphones. The proposed SASSCEIR system aims to make stolen smartphones completely unusable by blocking them from all wireless networks and services, not just cellular. It describes testing a prototype SASSCEIR android app that communicates with a SASSCEIR system to authenticate mobile devices and block lost/stolen devices from all connectivity, closing loopholes exploited by thieves through WiFi use.

Uploaded by

logeswariselva74
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
186 views5 pages

CEIR Based Smartphones Anti-Stolen System: Sassceir: Arun Kumar Bediya, Rajendra Kumar

This document summarizes a research paper on a proposed system called SASSCEIR (Smartphones Anti-Stolen System based on Central Equipment Identity Register) to address limitations in existing CEIR (Central Equipment Identity Register) systems for blocking stolen smartphones. The proposed SASSCEIR system aims to make stolen smartphones completely unusable by blocking them from all wireless networks and services, not just cellular. It describes testing a prototype SASSCEIR android app that communicates with a SASSCEIR system to authenticate mobile devices and block lost/stolen devices from all connectivity, closing loopholes exploited by thieves through WiFi use.

Uploaded by

logeswariselva74
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

International Journal of Engineering and Advanced Technology (IJEAT)

ISSN: 2249-8958 (Online), Volume-9 Issue-1, October, 2019

CEIR based Smartphones Anti-stolen System:


SASSCEIR
Arun Kumar Bediya, Rajendra Kumar

Abstract: Mobile stolen has become a big problem all over the Stolen or lost mobiles can also be used in illegal activities
world. International Mobile Equipment Identity (IMEI) is a i.e. terrorists attack, kidnapping, blackmailing, identity
unique number which used to identify mobile device throughout frauds etc. It is necessary to have a system which can block
the world. An IMEI is to be made non editable number which
cannot be reprogrammed. Central Equipment Identity Register all services to lost/stolen mobile so that it cannot be used for
(CEIR) is systems that registers the stolen/theft mobiles and any malicious activities. Availability of system like this will
update all TSP’s local EIR with blacklisted IMEI. Many also de-motivate theft activity. Many countries like
countries have enabled CEIR system to terminate mobile stolen Australia, France, Philippines, Poland, Turkey , Pakistan
problem. Despite of many features CEIR is not able to stop and UK has enabled mobile anti stolen system to block
working of smartphone on Wi-Fi networks. Current CEIR system stolen/lost of mobile devices[1].
block the mobile devices by placing stolen devices in blacklist
hence telecom services get disabled for blacklisted mobiles. This An IMEI that is an identity code associated with all the
paper represents capacity of CEIR deployment in GSM handsets. Each Telecom service provider (TSP)
telecommunication network system and demonstrates the existing maintain a local Equipment Identity Register (EIR) of their
problem in CEIR. This paper also focuses on our proposed own subscribers, EIR is a system which maintain a database
solution SASSCEIR, for complete blocking of that comprise of all the IMEI/ESN numbers of the mobile
smartphones.SASSCEIR will help to alleviate the stealing of devices of all their subscribers that are allowed to work and
smartphones by making them completely futileto use. We have
performed test cases to analyze SASSCEIR concept by developing all the subscriber that are marked banned due to reported as
android based apps prototype of SASSCEIR and mobile side stolen/lost i.e. blacklisted. TSP checks its local EIR
TESTSASSCEIR app to communicate with SASSCEIR app. whenever a mobile switched-on and in each 4 hours.
Unfortunately all the TSPs maintain their own blacklist but
Keywords: Smartphones Anti Stolen, SASSCEIR, Mobile it is not shared and synchronized among the all TSPs and
Theft this is the reason that lost/stolen mobile device works
perfectly in different TSP.
I. INTRODUCTION: NEED OF SMARTPHONES At the point when the handset is connect to a specific
ANTI-STOLEN SYSTEM system, MSC ask for IMEI of that handset and after that it is
Smartphones have become the necessity of human life sent to EIR for further approval process. If IMEI is not
now a day because it provides the simplest way of found in local EIR blacklist i.e. the mobile devices are not
communication. Smartphones are enabled with internet blacklisted then only the device will be able to use telecom
accessing facility that powered the mobile device to the next services.
level email, voice messages, videos, picture and shopping Dong Hui, Huan Lei discussed importance of EIR system
are made easy via using various applications installed in based mobile security methods to control on smuggling and
smartphones. Smartphones turned human life easier in theft [2]. Gao Yongqing , Zhou Chunlai, Shang Dan
various prospects. Today’s smartphones stores consumer presented mobile anti theft method based on locking SIM
information like credit cards details, connectivity with card that can protect user information and prevent mobile to
banks, ATM and many private data of consumer etc. use by other persons [3]. Graham Farrell proposed method
It is very difficult to recover mobile if mobile is stolen or and seeking for government action for making law,
misplaced. The number associated with the mobile is regulation and codes of conduct for stolen/lost mobile to
connected to various applications such as banks, credit cards avoid crime related to mobile misuse and enable tracking of
and many financial components. Though the same mobile stolen mobile [4]. To implement CEIR in India the
number i.e. Mobile station international subscriber directory responsibility of TSP’s will play most important role. TSP’s
number (MSISDN) can be recovered from telecom service responses on CEIR are positive in terms of blocking of
provider (TSP) but recovery of same mobile device is very mobile phones but additional load on their network and
rare and arduous. TSP’s are deliberate to their customer base [5].
The rest of this paper is organized as follows. In Section
Revised Manuscript Received on October 30, 2019. II, we give a brief overview of the standard CEIR system
* Correspondence Author
Arun Kumar Bediya*, Center for Development of Telematics, New architecture and basic elements of CEIR. Section III
Delhi- India, [email protected] describes the limitations of existing CEIR and problem
Dr. Rajendra Kumar, Department of Computer Science, Jamia Millia which still exists in CEIR system. In Section IV,
Islamia, New Delhi-India, [email protected]
Introduction of the proposed solution of the provable
© The Authors. Published by Blue Eyes Intelligence Engineering and
Sciences Publication (BEIESP). This is an open access article under the CC
BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Retrieval Number: A2108109119/2019©BEIESP Published By:


DOI: 10.35940/ijeat.A2108.109119 Blue Eyes Intelligence Engineering
Journal Website: www.ijeat.org 6940 & Sciences Publication
CEIR based Smartphones Anti-stolen System: SASSCEIR

concept of Smartphones Anti-Stolen System based on lost/stolen mobile cannot be use by anyone for calls,
Central Equipment Identity Register (SASSCEIR) and its messaging etc.crime can be control related to mobile
implementation authenticate mobile device. In Section V fraudulent like stolen, misuse of mobile phones in
testbed of SASSCEIR and experiment with SASSCEIR, financials, terrorist etc. [7]. Cloned mobile receive less
results are demonstrated and the paper is concluded with a signals that alleviate TSP’s reputation therefore CEIR is
summary in Section VI. beneficial for TSP’s perspective as well [8].
Limitation of CEIR
II. CEIR MOBILE ANTI-STOLEN SYSTEM CEIR is capable to successfully block lost/stolen mobile
devices as blacklisted mobile not aspire to use telecom
The current model is just handling the IMEI numbers in
services on the mobile. Lost/stolen mobile is still able to
the EIR database of particular cellular network to which the
works in WiFi networks to use internet services via mobile
subscriber is latched. If the mobile subscriber lost mobile
applications such Whatsapp, Facebook, Google, Instagram
device, its service provider i.e. TSP blocks the IMEI of that
and many more. Mobiles that are blacklisted by CEIR are
device in its own network to make device futile and can't be
still works for E-commerce, bill payment, banking and
abused by the criminal. But criminal is able to change the
many other applications because mobile application does not
SIM card with SIM card of other TSP which has not blocked
required telecom services as it is not directly connected to
this device, consequently giving the criminal an approved
TSP’s networks. Thief can also make voice call using many
access to the network. These issues were persistently
android apps like Whatsapp, Skype, Imo, Google duo,
occurring before and telecom regulatory authority watched
hangout etc. These apps allow user to make calls and
these restrictions with the current model and looking to
messaging and therefore mobile becomes completely useful
another solution i.e. central equipment identity register
even though mobile is blacklisted by all TSP’s.
(CEIR) system[1].
CEIR is meant to block stolen reported and lost mobile
devices in all over the country. Fig. 1 represents the basic
architecture of CEIR system. It also explains how TSP’s
communicates with CEIR system to authenticate IMEI
before providing any telecom service. TSP will deactivate
all services on blacklisted mobiles as it is illegal to provide
telecom network services to blacklisted mobile.
A. Lost/Stolen Registration: This facility can be
available at LEA/TSP/Police i.e. a legal organizational
authority. Mobile device owner has report lost/stolen at
LEA/TSP with all proofs of ownership like invoice, last bill
etc. LEA/TSP register using registration module, the IMEI
of the device will be registered in CEIR system which store
IMEI in CEIR database.
B. CEIR Database: CEIR database keep all registered
IMEI of lost/stolen devices and further blacklist can be
generated. Database is updated each time when a new
lost/stolen is registered. Fig. 1 describes how a lost/stolen mobile can work
C. TSP: TSP operators plays a vital role in CEIR without using TSP’s services. This can be done in easy
system, when mobile devices switched on TSP get request steps. 1. Connect mobile device with WiFi router. 2. WiFi
from the mobile to provide network, TSP afterword check router connect device with Internet. 3. Install android/ios
authenticity of requested mobile IMEI in its local EIR. apps in mobile device. 4. Apps are now can be connect to
Local EIR contains the blacklist of IMEI provided by CEIR internet. 5. Now thief can perform any operation of mobile
to the TSP. When TSP confirmed authenticity of IMEI it i.e. browsing, chats, calls etc.
start providing telecom services to requested mobile
otherwise TSP block all kind of services for the mobile. III. SECURITY ASSESSMENT
D. Blacklist: Blacklist is the list of IMEI which are
reported lost/stolen. Blacklist is generated by CEIR and If we consider that mobile stolen report is registered and
periodically update to all TSP’[1, 6]. it is blacklisted by CEIR to all TSP’s, thus SIM get
E. Greylist: Greylist is the list of IMEI which are blocked and no telecom service will be enabled.
under observation and keep continue to use telecom To achieve the similar hypothesis we removed the SIM
services. card from testing mobile device. Now we can consider it as
F. Whitelist: Whitelist is the list of IMEI which are the practical scenario of mobile lost/stolen. We connect the
legal to access the telecom network services. test mobile device with private Wi-Fi network and
Once mobile device IMEI is registered with CEIR performed some test case on many major e-commerce
database, system update corresponding list black/grey and if mobile apps installed in the to elucidate the concernment of
IMEI is updated in blacklist, CEIR send blacklist to all the existing problem. Some of
TSP’s and TSP’s updated its local EIR blacklist, therefore them are listed below:
each TSP block all services to that mobile device i.e. the

Retrieval Number: A2108109119/2019©BEIESP Published By:


DOI: 10.35940/ijeat.A2108.109119 Blue Eyes Intelligence Engineering
Journal Website: www.ijeat.org 6941 & Sciences Publication
International Journal of Engineering and Advanced Technology (IJEAT)
ISSN: 2249-8958 (Online), Volume-9 Issue-1, October, 2019

1. Amazon pay: Mobile recharge, bill payment and receiving IMEI validity from blacklist and return the
make order using wallet balance available in the Amazon authenticity result for IMEI to mobile inbuilt function, so as
account. mobile function can decide that mobile should work
2. Flipkart: Mobile recharge, bill payment and make properly or notify user that mobile is not authentic or
order using wallet balance available in the Flipkart blacklisted. Similarly mobile apps can also check
account. authenticity of mobile by sending IMEI.
3. Paytm: We perform the Paytm balance transfer, There are two prerequisites for SASSCEIR to function
mobile recharges and various bill payments on the same appropriately to block mobile completely.
mobile device using wallet balance available on the Paytm 1. Legitimate mobile manufacturer to check IMEI
account. authenticity from SASSCEIR in a similar fashion that TPS’s
4. Myntra: Make buy order using Myntra credits authenticates the IMEI of mobile device with CEIR.
available in account, cancelled existing orders of the 2. Periodic update of blacklist from CEIR is
account. mandatory to perform SASSCEIR appropriately i.e. blacklist
5. Freecharge: Mobile recharge, bill payment using at both sides must be synchronized.
wallet balance. Mobile inbuilt function connects SASSCEIR via web
Mobile wallet applications are easy to use, and in future service to check IMEI authenticity. If above two
of all banking and transactions would be performed using requirement is considered SASSCEIR will proficiently
them, but mobile apps are not secure enough to handle block mobile to access internet facility and stolen of mobile
security issues similar to the test cases performed in our will not be useful for anyone thus stolen practices can be
experiment. Financial transaction performed using mobile ended completely.
apps must be safe and secure[9]. Other money transfer
mobile apps based on Unified Payments Interface (UPI)
like BHIM, GoogelPay, PhonePay etc. that transfer money
bank-to-bank checks the SIM (Subscriber Identity
Module) card availability in the mobile thus money
transfer from mobile without SIM from UPI apps is not
possible.
There are many anti theft and device tracking model
available and proposed[10][11][12][13][14] but complete
solution is still not available. Mobile theft still make
mobile usable and therefore the purpose are not delivered
even after registration and blacklisting mobile IMEI in
TSP’s with CEIR. Thus it is clear that CEIR is not
sufficient to establish the purpose i.e. making mobile
devices unserviceable after lost/stolen. It is needed to
strengthen the CEIR by facilitating more functionality or
providing some other solution that can handle these issues.
We are proposing solution which overcomes to determine Fig.2 demonstrates the functions of SASSCEIR.
such problems. Following are steps to perceive SASSCEIR work flow. 1.
Connect mobile device with Wi-Fi router. 2. Wi-Fi router
IV. PROPOSED SOLUTION: SASSCEIR connect device with Internet. 3. Mobile call to SASSCEIR
Complete blocking of mobile can be considered if with IMEI. 4. Open mobile apps. 5. If mobile is authentic
subscriber report theft/stolen mobile device and handset i.e. not found in blacklist of SASSCEIR, mobile will work
become futile i.e. mobile cannot be use for any kind of as properly and apps are now can connect to internet. 6.
work. It is found that if mobile device reported stolen and Now only valid mobile devices apps can works properly.
registered in CEIRits all kinds of telecom services will be
stopped but still it can perform various tasks using Wi-Fi
network and mobile apps discussed in section III.
Smartphones Anti-Stolen System based on Central
Equipment Identity Register (SASSCEIR) is a java based
application which maintains the blacklist of IMEI generated
by CEIR i.e. all new IMEI added in CEIR blacklist it must
be updated in SASSCEIR blacklist. SASSCEIR blacklist
can be updated using SOAP web service periodically. Thus
CEIR is the backbone system for SASSCEIR. This
application can be used by mobile manufacturer or mobile
app developerso that stolen of mobiles devices can be
avoided. To utilize SASSCEIR, Mobile manufacturer have
to make an inbuilt function to check the validity of mobile
by sending its IMEI to SASSCEIR. SASSCEIR check

Retrieval Number: A2108109119/2019©BEIESP Published By:


DOI: 10.35940/ijeat.A2108.109119 Blue Eyes Intelligence Engineering
Journal Website: www.ijeat.org 6942 & Sciences Publication
CEIR based Smartphones Anti-stolen System: SASSCEIR

Experiments outcome showsSASSCEIR is able to block


internet services for a stolen/lost reported smartphone i.e.
/* Algorithm for mobile side functionality */ smartphone will be authenticate IMEI to avoid its misuse for
/* Mobile inbuilt function to checks IMEI criminal activities as well as for general functionality
authenticity */ mentioned in section III. We scrutinized 100 smartphones
and installed TestSASSCEIR app and performed above test
fetch device imei; cases by adding and removing their IMEI in testing
If(checkImeiAuth(imei));
blacklist. As a result we found that presented concept of
{
work properly(); SASSCEIR application works as per expectations and it is
} able to help lost/stolen smartphones to make completely
else futile, it will also make stolen/theft of mobile devices
{ uninteresting to thieves.
alert(“This device is not authentic”);
exit(); //mobile should not connect to
VI. CONCLUSION AND FUTURE WORK
internet.
} This paper presented SASSCEIR functionality, its
development and test cases with results. SASSCEIR is able
to block mobile device completely after reporting lost/stolen
in CEIR. This can also lead to discourage for
/* Algorithm for SASSCEIR side functionality */ thefts/criminals and cyber crime and it may declined.
/* SASSCEIR function */ A law needs to be passed by authorities for mobile
manufacturer to check IMEI authenticity before performing
// receiveimei from the callee mobile any tasks as similar TSP’s authenticates IMEI of each
function checkImeiAuth(Argument IMEI) mobile.Both CEIR and SASSCEIR can also helps to track
{
define authflag = true; the mobile in real time once reported stolen by smartphones
search IMEI in database; users and it may lead to recover the lost/stolen smartphones.
If(found ); Cloning/duplicating of IMEI is also a serious predicament in
set authflag false; terms of blocking of mobile devices as multiple devices can
else be cloned with same IMEI.
return authflag; Finally we conclude that both CEIR and SASSCEIR are
}
V. EXPERIMENTS AND RESULTS able to completely block the stolen/lost mobile phone and
insure it that mobile will be non-usable once it is reported
It is presumed that blacklist is provided to SASSCEIR from stolen in CEIR. For future work we can enableSASSCEIR
CEIR. For testing two android based apps is developed. 1. to identify the cloned/duplicates IMEI and block the cloned
SASSCEIR (prototype version). 2. TestSASSCEIR app that device that is reported stolen.
performs some functions and uses internet services like
Whatsapp, to hypothesis the practical scenario. REFERENCES
TestSASSCEIR app included a function that check IMEI
1. TRAI, TRAI Consultation Paper on Issues relating to blocking of
authenticity of mobile in which it runs before performing IMEI for lost /stolen mobile handsets. Telecom Regulatory Authority
any task. Whilelaunching TestSASSCEIR app firstly it of India: New Delhi, 2010. p. 1-14.
checks the authenticity of IMEI of mobile device by sending 2. Hui, D. and H. Lei. EIR Based Mobile Communication Network
Security Technology. in 2011 Third International Conference on
IMEI to SASSCEIR application. Once SASSCEIR receive Multimedia Information Networking and Security. 2011. IEEE.
IMEI for authentication it examines received IMEI in 3. Gao, Y., C. Zhou, and D. Shang. A smart phone anti-theft solution
blacklist, if received IMEI is found in blacklist, SASSCEIR based on locking card of mobile phone. in 2011 International
Conference on Computational and Information Sciences. 2011.
set AuthFlag as ‘false’ which means the sender IMEI is IEEE.
blacklisted i.e. it is reported stolen and TSP services are 4. Farrell, G., Preventing phone theft and robbery: the need for
stopped on this device.On the other hand if received IMEI is government action and international coordination. Crime science,
2015. 4(1): p. 4.
not found in SASSCEIR blacklist it send AuthFlag as‘true’ 5. TRAI. TELECOM REGULATORY AUTHORITY OF INDIA -
which means the sender IMEI is not blacklisted and all Highlights of Telecom
services should be run on this device. Subscriptionm Data as on 31st January, 2015,”. 2015 [cited DATA
TESTCASE 1: Open the TestSASSCEIR app in mobile 18 / 2015 ].
6. Whitehead, S., et al., In safe hands: a review of mobile phone anti-
that is already blacklisted. So it will receive authflag as theft designs. European Journal on Criminal Policy and Research,
‘false’ from SASSCEIR hence TestSASSCEIR gives an alert 2008. 14(1): p. 39-60.
message “This device is not authentic” and TestSASSCEIR 7. Mailley, J., The prevention of mobile phone theft: a case study of
crime as pollution; rational choices and consumer demand. 2011, ©
will be closed automatically. JC Mailley.
TESTCASE 2: Open the TestSASSCEIR app in mobile 8. Loureiro, A.J.F., D. Gallegos, and G. Caldwell, Substandard cell
that is not blacklisted. TestSASSCEIR app will work phones: Impact on network quality and a new method to identify an
unlicensed IMEI in the network. IEEE Communications Magazine,
perfectly without any alert message. This is because 2014. 52(3): p. 90-96.
TestSSACEIR received authflagas ‘true’ i.e. mobile is not
blacklisted.

Retrieval Number: A2108109119/2019©BEIESP Published By:


DOI: 10.35940/ijeat.A2108.109119 Blue Eyes Intelligence Engineering
Journal Website: www.ijeat.org 6943 & Sciences Publication
International Journal of Engineering and Advanced Technology (IJEAT)
ISSN: 2249-8958 (Online), Volume-9 Issue-1, October, 2019

9. Darvish, H. and M. Husain. Security analysis of mobile money


applications on android. in 2018 IEEE International Conference on
Big Data (Big Data). 2018. IEEE.
10. Kwon, Y., et al. An Enhanced Java-Based Mobile Device Theft
Response System. in 2015 9th International Conference on
Innovative Mobile and Internet Services in Ubiquitous Computing.
2015. IEEE.
11. Yoon, S., Y. Jeon, and J. Kim. Mobile security technology for smart
devices. in 2015 International Conference on Information and
Communication Technology Convergence (ICTC). 2015. IEEE.
12. Dar, M.A. and J. Parvez. A live-tracking framework for
Smartphones. in 2015 International Conference on Innovations in
Information, Embedded and Communication Systems (ICIIECS).
2015. IEEE.
13. Ba, Z., S. Piao, and K. Ren. Defending against Speaker
Fingerprinting Based Device Tracking for Smartphones. in 2017
IEEE Symposium on Privacy-Aware Computing (PAC). 2017. IEEE.
14. Martinez, J.J.L. and N. Widjaya, Architecture for Lost Mobile
Tracker Application. International Journal of e-Education, e-
Business, e-Management and e-Learning, 2012. 2(3): p. 197.

AUTHOR PROFILE
Arun Kumar Bediya received B.E degree in
computer science and Engineering from SGSITS, in
2005 and completed M.Tech. (Computer science)
from MANIT, Bhopal in 2008. He joined Center for
Development of Telematics (C-DOT), New Delhi in
2008 and working as senior research engineer. He is
also pursuing PhD from JMI, New Delhi. He has a
wide research experience in the field of computer
science. He has published various research papers in
the conferences of international/national repute.

Dr. Rajendra Kumar is presently working as


Assistant Professor in the Department ofComputer
Science, Faculty of Natural Sciences, Jamia Millia
Islamia (Central University), New Delhi-110025,
INDIA. He has an excellent academic background with
a very sound academic and research experience. He
has published various research papers in the
conferences of international/national repute. His
research interest includes: cyber security, Cloud
Security and Privacy, Big DataAnalytics, Data Mining,
IoT, Software Security, Requirements Engineering,
Security Policies and Standards, Software Engineering, Access control and
Identity Management, Vulnerability Assessment etc.

Retrieval Number: A2108109119/2019©BEIESP Published By:


DOI: 10.35940/ijeat.A2108.109119 Blue Eyes Intelligence Engineering
Journal Website: www.ijeat.org 6944 & Sciences Publication

You might also like