INVISIBLE EYE:GSM MODEM,WIRELESS SECURITY CAMERA


GSM  MODEM
➢ It is a special type of modem which accepts SIM card.
➢ These GSM modem are more frequently used to provide mobile connectivity.
➢ Many of them can also be used for sending and receiving SMS.
➢ In this case we are using GSM modem for sending the message only.
GSM was intended to be a secure wireless system. It has considered the user authentication using a preshared key and challenge-response, and over-the-air encryption. However, GSM is vulnerable to different types of attack, each of them aimed at a different part of the network.

The development of UMTS introduces an optional Universal Subscriber Identity Module (USIM), that uses a longer authentication key to give greater security, as well as mutually authenticating the network and the user, whereas GSM only authenticates the user to the network (and not vice versa). The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no non- repudiation.
GSM uses several cryptographic algorithms for security. The A5/1, A5/2, and A5/3 stream ciphers are used for ensuring over-the-air voice privacy. A5/1 was developed first and is a stronger algorithm used within Europe and the United States; A5/2 is weaker and used in other countries. Serious weaknesses have been found in both algorithms: it is possible to break A5/2 in real-time with a ciphertextonly attack, and in January 2007, The Hacker's Choice started the A5/1 cracking project with plans to use FPGAs that allow A5/1 to be broken with a rainbow table attack. The system supports multiple algorithms so operators may replace that cipher with a stronger one.

Since 2000, different efforts have been done in order to crack the A5 encryption algorithms. Both A5/1 and A5/2 algorithms are broken, and their cryptanalysis has been considered in the literature. As an example,Karsten Nohl developed a number of rainbow tables (static values which reduce the time needed to carry out an attack) and have found new sources for known plaintext attacks. He said that it is possible to build "a full GSM interceptor...from open-source components" but that they had not done so because of legal concerns. Nohl claimed that he was able to intercept voice and text conversations by impersonating another user to listen to voicemail, make calls, or send text messages using a seven-year-old Motorola cell phone and decryption software available for free online.
New attacks have been observed that take advantage of poor security implementations, architecture, and development for smart phone applications. Some wiretapping and eavesdropping techniques hijack the audio input and output providing an opportunity for a third party to listen in to the conversation.GSM uses General Packet Radio Service (GPRS) for data transmissions like browsing the web. The most commonly deployed GPRS ciphers were publicly broken in 2011.
The researchers revealed flaws in the commonly used GEA/1 and GEA/2 ciphers and published the opensource "gprs decode" software for sniffing GPRS networks. They also noted that some carriers do not encrypt the data (i.e., using GEA/0) in order to detect the use of traffic or protocols they do not like (e.g.,Skype), leaving customers unprotected. GEA/3 seems to remain relatively hard to break and is said to be in use on some more modern networks. If used with USIM to prevent connections to fake base stations and downgrade attacks, users will be protected in the medium term, though migration to 128-bit GEA/4 is still recommended.

Camera
Wireless security cameras are closed-circuit television (CCTV) cameras that transmit a video and audio signal to a wireless receiver through a radio band. Many wireless security cameras require at least one cable or wire for power; "wireless" refers to the transmission of video/audio. However, some wireless security cameras are battery-powered, making the cameras truly wireless from top to bottom.

Wireless cameras are proving very popular among modern security consumers due to their low installation costs(there is no need to run expensive video extension cables) and flexible mounting options; wireless cameras can be mounted/installed in locations previously unavailable to standard wired cameras. In addition to the ease of use and convenience of access, wireless security camera allows users to leverage broadband wireless internet to provide seamless video streaming over-internet.

Digital wireless is the transmission of audio and video analog signals encoded as digital packets over high bandwidth radio frequencies.

Advantages include:
Wide transmission range—usually close to 450 feet (open space, clear line of sight between camera and receiver)
High quality video and audio
Two-way communication between the camera and the receiver
Digital signal means you can transmit commands and functions, such as turning lights on and off.
You can connect multiple receivers to one recording device, such as security DVR


Wireless Range
Wireless security cameras function best when there is a clear line of sight between the camera(s) and the receiver. Outdoors, and with clear line of sight, digital wireless cameras typically have a range between 250 to 450 feet. Indoors, the range can be limited to 100 to 150 feet. Cubical walls, drywall, glass, and windows
generally do not degrade wireless signal strength. Brick, concrete floors, and walls degrade signal strength.Trees that are in the line of sight of the wireless camera and receiver may impact signal strength.

The signal range also depends on whether there are competing signals using the same frequency as the camera.For example, signals from cordless phones or routers may affect signal strength. When this happens, the camera image may freeze, or appear "choppy". Typical solution involves locking the channel that wireless router operates on.

NEXT COMING:::PERSONAL COMPUTER,WORKING,ADVANTAGES & DISADVANTAGES,APPLICATIONS,CONCLUSION