SlideShare a Scribd company logo
1 of 46
Luca Bongiorni OpenBTS UNIVERSITY OF OSTRAVA Department of Telecommunication
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Terminology
What is ?! ,[object Object],[object Object]
Advantages ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How GSM works !? Mobile Stations Base Station  Subsystem Network  Management Subscriber and terminal  equipment databases BSC MSC VLR HLR EIR AUC OMC BTS BTS BTS
GSM Mobile Station ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Subscriber Identity Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Management Scheme ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Detection of Compromised Equipment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication and Encryption Scheme A3 Mobile Station Radio Link GSM Operator A8 A5 A3 A8 A5 K i K i K c K c SIM Challenge RAND m i Encrypted Data m i Signed response (SRES) SRES SRES F n F n
Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication Sequence
Authentication Sequence
Authentication Sequence
Authentication Features
A5 Encryption Mobile Stations Base Station  Subsystem Network  Management Subscriber and terminal  equipment databases BSC MSC VLR HLR EIR AUC OMC BTS BTS BTS A5 Encryption
A5 Streaming Implementation A5 output is 228 bit for both directions A5 K c  (64 bit) F n  (22 bit) 114 bit XOR Data (114 bit) A5 K c  (64 bit) F n  (22 bit) 114 bit XOR Ciphertext (114 bit) Data (114 bit) Mobile Station BTS
SMS Architecture ,[object Object],[object Object],[object Object],[object Object]
SIM Anatomy ,[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Card Anatomy
Microprocessor Cards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
USRP/GNU Radio: these unknown… ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Universal Software Radio Peripheral It is also designed to be flexible, allowing developers to make their own daughterboards for specific needs with regard to connectors, different frequency bands, etc.It is widely used in hobbyist, academic and commercial.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Universal Software Radio Peripheral
Features ,[object Object],[object Object],[object Object]
Hardware Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],OR
Software Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object]
GNU Radio ,[object Object]
Installation of Gnu Radio ,[object Object],[object Object],[object Object],[object Object],[object Object]
OpenBTS installation and settings ,[object Object],[object Object],[object Object],[object Object]
Configuring Asterisk ,[object Object],[object Object],[object Object]
Testing the OpenBTS ,[object Object],[object Object],[object Object],[object Object]
Practical Application ,[object Object],Aerial view of 2009 Burning Man site: 3 km wide, 43,000 people, 1 week.
Planned Services ,[object Object],[object Object],[object Object],[object Object],[object Object]
Hardware Used
Power System
GSM Network
Results ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Emergency GSM Messaging & Monitoring System for Civil Protection It is proposed as a solution ready-to-deploy in the event of natural disaster, in that areas where GSM networks are temporarily down. With the full handvover it also ensures the possibilty, by users, to move they from a BTS cell to another, so as to ensure optimum performance and usability of telephony / messaging system.
GSM Messaging & Monitoring System  With the graphical interface, web-based, it is possible to reach all users in a given area and with its database will be possible to operate a feedback system to monitor their actual receipt and act accordingly management of emergency vehicles to be sent in a given area.
GSM Triangulation Another service implemented, in case are deployed on the ground, at least 3 BTS, is able to triangulate the signal from a particular user, with good approximation.
Conclusions In these few slides we saw how could be simple… develop and deploy a low cost GSM network. Infact OpenBTS gives us all we need and as an open source project, we can extend research into all GSM know-how, thanks especially to big community of researchers.
Future Projects ,[object Object],[object Object]
Links ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bongiorni Luca –  http://www.securitycondition.com These slides are written and distributed under Attribution-NonCommercial 3.0 Unported Thank you for Attention

More Related Content

What's hot

What's hot (20)

Philippe Langlois - Hacking HLR HSS and MME core network elements
Philippe Langlois - Hacking HLR HSS and MME core network elementsPhilippe Langlois - Hacking HLR HSS and MME core network elements
Philippe Langlois - Hacking HLR HSS and MME core network elements
 
CDMA
CDMACDMA
CDMA
 
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALAGSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
 
Improving coverage and capacity in cellular systems
Improving coverage and capacity in cellular systemsImproving coverage and capacity in cellular systems
Improving coverage and capacity in cellular systems
 
Programmable SIM cards, SoftSIMs and eSIMs
Programmable SIM cards, SoftSIMs and eSIMsProgrammable SIM cards, SoftSIMs and eSIMs
Programmable SIM cards, SoftSIMs and eSIMs
 
Gsm
GsmGsm
Gsm
 
Amps
AmpsAmps
Amps
 
What is smart card on tam
What is smart card on tamWhat is smart card on tam
What is smart card on tam
 
comparison of CDMA, TDMA,OFDM,CDMA-2000, SSMA,WCDMA
comparison of CDMA, TDMA,OFDM,CDMA-2000, SSMA,WCDMA comparison of CDMA, TDMA,OFDM,CDMA-2000, SSMA,WCDMA
comparison of CDMA, TDMA,OFDM,CDMA-2000, SSMA,WCDMA
 
GSM Presentation
GSM PresentationGSM Presentation
GSM Presentation
 
Massive MIMO
Massive MIMOMassive MIMO
Massive MIMO
 
Pcs ch1
Pcs ch1Pcs ch1
Pcs ch1
 
clone sim card
clone sim cardclone sim card
clone sim card
 
Trends in Visualization for Armoured Vehicles
Trends in Visualization for Armoured VehiclesTrends in Visualization for Armoured Vehicles
Trends in Visualization for Armoured Vehicles
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
 
Rtos by shibu
Rtos by shibuRtos by shibu
Rtos by shibu
 
GPRS
GPRSGPRS
GPRS
 
Set Top Box
Set Top BoxSet Top Box
Set Top Box
 
GSM
GSMGSM
GSM
 
Beginners: UICC & SIM
Beginners: UICC & SIMBeginners: UICC & SIM
Beginners: UICC & SIM
 

Viewers also liked

Openbts animal farm david a burgess germany
Openbts animal farm david a burgess germanyOpenbts animal farm david a burgess germany
Openbts animal farm david a burgess germany
Daud Suleiman
 
Open bts guide_en_v0.1
Open bts guide_en_v0.1Open bts guide_en_v0.1
Open bts guide_en_v0.1
Daud Suleiman
 
Gsm security
Gsm securityGsm security
Gsm security
Ali Kamil
 
Bts Presentation, indosat cinta indonesia
Bts Presentation, indosat cinta indonesiaBts Presentation, indosat cinta indonesia
Bts Presentation, indosat cinta indonesia
nany wardhani
 

Viewers also liked (20)

Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
 
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
 iParanoid: an IMSI Catcher - Stingray Intrusion Detection System iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
 
29c3 OpenBTS workshop - Hardware and sotware
29c3 OpenBTS workshop - Hardware and sotware29c3 OpenBTS workshop - Hardware and sotware
29c3 OpenBTS workshop - Hardware and sotware
 
OpenBTS - Building Real Mobile Networks, Big or Small
OpenBTS - Building Real Mobile Networks, Big or SmallOpenBTS - Building Real Mobile Networks, Big or Small
OpenBTS - Building Real Mobile Networks, Big or Small
 
OpenBTS AirPutih
OpenBTS AirPutihOpenBTS AirPutih
OpenBTS AirPutih
 
Catching imsi catchers
Catching imsi catchersCatching imsi catchers
Catching imsi catchers
 
Osmocom
OsmocomOsmocom
Osmocom
 
Successfully transforming BT's intranet using social media
Successfully transforming BT's intranet using social mediaSuccessfully transforming BT's intranet using social media
Successfully transforming BT's intranet using social media
 
Project Presentation Midyear
Project Presentation MidyearProject Presentation Midyear
Project Presentation Midyear
 
Openbts animal farm david a burgess germany
Openbts animal farm david a burgess germanyOpenbts animal farm david a burgess germany
Openbts animal farm david a burgess germany
 
Ome200301 gsm bts trouble shooting issue3.0
Ome200301 gsm bts trouble shooting issue3.0Ome200301 gsm bts trouble shooting issue3.0
Ome200301 gsm bts trouble shooting issue3.0
 
Open bts guide_en_v0.1
Open bts guide_en_v0.1Open bts guide_en_v0.1
Open bts guide_en_v0.1
 
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
 
Modèle de cahier des charges web
Modèle de cahier des charges webModèle de cahier des charges web
Modèle de cahier des charges web
 
Rédaction d'un cahier des charges web
Rédaction d'un cahier des charges webRédaction d'un cahier des charges web
Rédaction d'un cahier des charges web
 
Gsm security
Gsm securityGsm security
Gsm security
 
GSM Security
GSM SecurityGSM Security
GSM Security
 
Introduction à la gestion de projet web
Introduction à la gestion de projet webIntroduction à la gestion de projet web
Introduction à la gestion de projet web
 
Bts guidelines 2013 for diagnostic flexible bronchoscopy in
Bts guidelines 2013 for diagnostic flexible bronchoscopy inBts guidelines 2013 for diagnostic flexible bronchoscopy in
Bts guidelines 2013 for diagnostic flexible bronchoscopy in
 
Bts Presentation, indosat cinta indonesia
Bts Presentation, indosat cinta indonesiaBts Presentation, indosat cinta indonesia
Bts Presentation, indosat cinta indonesia
 

Similar to OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection

bsnl presentation on gsm
bsnl presentation on  gsm bsnl presentation on  gsm
bsnl presentation on gsm
Kapil Masatker
 
gsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdfgsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdf
samss12
 
gsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdfgsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdf
andutokicho
 

Similar to OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection (20)

Gsm Network
Gsm NetworkGsm Network
Gsm Network
 
Rk 3 gsm network
Rk 3 gsm networkRk 3 gsm network
Rk 3 gsm network
 
Rk 3 gsm network @guddu
Rk 3 gsm network @gudduRk 3 gsm network @guddu
Rk 3 gsm network @guddu
 
Mob. comp . prst
Mob. comp . prstMob. comp . prst
Mob. comp . prst
 
GSM Architecture.ppt
 GSM Architecture.ppt GSM Architecture.ppt
GSM Architecture.ppt
 
GSM network
GSM networkGSM network
GSM network
 
GSM WITH SATELLITE.pptx
GSM WITH SATELLITE.pptxGSM WITH SATELLITE.pptx
GSM WITH SATELLITE.pptx
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
PID3902073
PID3902073PID3902073
PID3902073
 
bsnl presentation on gsm
bsnl presentation on  gsm bsnl presentation on  gsm
bsnl presentation on gsm
 
gsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdfgsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdf
 
gsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdfgsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdf
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM Architecture
 
Gsm overview11
Gsm overview11Gsm overview11
Gsm overview11
 
105093_633617613676087500 GSM technology.ppt
105093_633617613676087500 GSM technology.ppt105093_633617613676087500 GSM technology.ppt
105093_633617613676087500 GSM technology.ppt
 
Journey of Evolution of UMTS and CDMA
Journey of Evolution of UMTS and CDMAJourney of Evolution of UMTS and CDMA
Journey of Evolution of UMTS and CDMA
 
GSM.ppt
GSM.pptGSM.ppt
GSM.ppt
 
Mbile communication and computingGSM Network.ppt
Mbile communication and computingGSM Network.pptMbile communication and computingGSM Network.ppt
Mbile communication and computingGSM Network.ppt
 
GSM, GPRS and UMTS: easy handbook
GSM, GPRS and UMTS: easy handbookGSM, GPRS and UMTS: easy handbook
GSM, GPRS and UMTS: easy handbook
 
It2402 mobile communication unit3
It2402 mobile communication unit3It2402 mobile communication unit3
It2402 mobile communication unit3
 

More from Luca Bongiorni

Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Luca Bongiorni
 

More from Luca Bongiorni (7)

HandPwning Security pitfalls of biometric hand-geometry recognition access co...
HandPwning Security pitfalls of biometric hand-geometry recognition access co...HandPwning Security pitfalls of biometric hand-geometry recognition access co...
HandPwning Security pitfalls of biometric hand-geometry recognition access co...
 
ANP catalog: the adversarial ninja playset
ANP catalog: the adversarial ninja playsetANP catalog: the adversarial ninja playset
ANP catalog: the adversarial ninja playset
 
Manufacturing Hardware Implants from Idea to Mass Production: A Hacker's Journey
Manufacturing Hardware Implants from Idea to Mass Production: A Hacker's JourneyManufacturing Hardware Implants from Idea to Mass Production: A Hacker's Journey
Manufacturing Hardware Implants from Idea to Mass Production: A Hacker's Journey
 
How to bring HID attacks to next level with WHID Injector & P4wnP1
How to bring HID attacks to next level with WHID Injector & P4wnP1How to bring HID attacks to next level with WHID Injector & P4wnP1
How to bring HID attacks to next level with WHID Injector & P4wnP1
 
Certificate Pinning in Mobile Applications
Certificate Pinning in Mobile ApplicationsCertificate Pinning in Mobile Applications
Certificate Pinning in Mobile Applications
 
Lockpicking Baltic Cyber Security Forum 2013
Lockpicking Baltic Cyber Security Forum 2013Lockpicking Baltic Cyber Security Forum 2013
Lockpicking Baltic Cyber Security Forum 2013
 
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection

  • 1. Luca Bongiorni OpenBTS UNIVERSITY OF OSTRAVA Department of Telecommunication
  • 2.
  • 3.
  • 4.
  • 5. How GSM works !? Mobile Stations Base Station Subsystem Network Management Subscriber and terminal equipment databases BSC MSC VLR HLR EIR AUC OMC BTS BTS BTS
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Authentication and Encryption Scheme A3 Mobile Station Radio Link GSM Operator A8 A5 A3 A8 A5 K i K i K c K c SIM Challenge RAND m i Encrypted Data m i Signed response (SRES) SRES SRES F n F n
  • 12.
  • 17. A5 Encryption Mobile Stations Base Station Subsystem Network Management Subscriber and terminal equipment databases BSC MSC VLR HLR EIR AUC OMC BTS BTS BTS A5 Encryption
  • 18. A5 Streaming Implementation A5 output is 228 bit for both directions A5 K c (64 bit) F n (22 bit) 114 bit XOR Data (114 bit) A5 K c (64 bit) F n (22 bit) 114 bit XOR Ciphertext (114 bit) Data (114 bit) Mobile Station BTS
  • 19.
  • 20.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 39.
  • 40. Emergency GSM Messaging & Monitoring System for Civil Protection It is proposed as a solution ready-to-deploy in the event of natural disaster, in that areas where GSM networks are temporarily down. With the full handvover it also ensures the possibilty, by users, to move they from a BTS cell to another, so as to ensure optimum performance and usability of telephony / messaging system.
  • 41. GSM Messaging & Monitoring System With the graphical interface, web-based, it is possible to reach all users in a given area and with its database will be possible to operate a feedback system to monitor their actual receipt and act accordingly management of emergency vehicles to be sent in a given area.
  • 42. GSM Triangulation Another service implemented, in case are deployed on the ground, at least 3 BTS, is able to triangulate the signal from a particular user, with good approximation.
  • 43. Conclusions In these few slides we saw how could be simple… develop and deploy a low cost GSM network. Infact OpenBTS gives us all we need and as an open source project, we can extend research into all GSM know-how, thanks especially to big community of researchers.
  • 44.
  • 45.
  • 46. Bongiorni Luca – http://www.securitycondition.com These slides are written and distributed under Attribution-NonCommercial 3.0 Unported Thank you for Attention