Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 30

EVOLUTION OF THE SIM TO ESIM

CHAPTER 1

INTRODUCTION

Introduction :-

A subscriber identity module or subscriber identification module (SIM), widely known as


a SIM card, is an integrated circuit that is intended to securely store the international mobile
subscriber identity (IMSI) number and its related key, which are used to identify and
authenticate subscribers on mobile telephony devices (such as mobile phones and computers).
It is also possible to store contact information on many SIM cards. SIM cards are always used
on GSM phones; for CDMA phones, they are only needed for newer LTE-capable handsets.
SIM cards can also be used in satellite phones, smart watches, computers, or cameras[1].

The SIM circuit is part of the function of a universal integrated circuit card (UICC)
physical smart card, which is usually made of PVC with embedded contacts
and semiconductors. SIM cards are transferable between different mobile devices. The first
UICC smart cards were the size of credit and bank cards; sizes were reduced several times
over the years, usually keeping electrical contacts the same, so that a larger card could be cut
down to a smaller size.

A SIM card contains its unique serial number (ICCID), international mobile
subscriber identity (IMSI) number, security authentication and ciphering information,
temporary information related to the local network, a list of the services the user has access
to, and two passwords: a personal identification number (PIN) for ordinary use, and
a personal unblocking code (PUC) for PIN unlocking.

Section 1.1- Introduce the background of Subscriber identity module(SIM), Section


1.2- Introduce the Design of Sim, Section 1.3- Introduce the Significance of The Report,
Section 1.4- Introduce the Aim of system, Section 1.5- Introduce Report organization, Section
1.6- Summary

1.1 Background

The SIM was initially specified by the European Telecommunications Standards Institute in


the specification with the number TS 11.11. This specification describes the physical and

KCES’s COEIT, Jalgaon Page 1


EVOLUTION OF THE SIM TO ESIM

logical behaviour of the SIM. With the development of UMTS, the specification work was
partially transferred to 3GPP. 3GPP is now responsible for the further development of
applications like SIM (TS 51.011) and USIM (TS 31.102) and ETSI for the further
development of the physical card UICC[2].

The first SIM card was developed in 1991 by Munich smart-card maker Giesecke &
Devrient, who sold the first 300 SIM cards to the Finnish wireless network
operator Radiolinja.

Today, SIM cards are ubiquitous, allowing over 7 billion devices to connect to
cellular networks around the world. According to the International Card Manufacturers
Association (ICMA), there were 5.4 billion SIM cards manufactured globally in 2016
creating over $6.5 billion in revenue for traditional SIM card vendors. The rise of cellular IoT
and 5G networks is predicted to drive the growth of the addressable market for SIM card
manufacturers to over 20 billion cellular devices by 2020. The introduction of Embedded
SIM (eSIM) and remote SIM provisioning (RSP) from the GSMA may disrupt the traditional
SIM card ecosystem with the entrance of new players specializing in "digital" SIM card
provisioning and other value-added services for mobile network operators.

1.2 Design
There are three operating voltages for SIM cards: 5 V, 3 V and 1.8 V (ISO/IEC 7816-3
classes A, B and C, respectively). The operating voltage of the majority of SIM cards
launched before 1998 was 5 V. SIM cards produced subsequently are compatible with 3
V and 5 V. Modern cards support 5 V, 3 V and 1.8 V.
Modern SIM cards allow applications to load when the SIM is in use by the
subscriber. These applications communicate with the handset or a server using SIM
Application Toolkit, which was initially specified by 3GPP in TS 11.14. (There is an
identical ETSI specification with different numbering.) ETSI and 3GPP maintain the SIM
specifications. The main specifications are: ETSI TS 102 223 (the toolkit for smartcards),
ETSI TS 102 241 (API), ETSI TS 102 588 (application invocation), and ETSI TS 131 111
(toolkit for more SIM-likes). SIM toolkit applications were initially written in native code
using proprietary APIs. To provide interoperability of the applications, ETSI choose Java
Card. A multi-company collaboration called Global Platform defines some extensions on the
cards, with additional APIs and features like more cryptographic security
and RFID contactless use added[3].

KCES’s COEIT, Jalgaon Page 2


EVOLUTION OF THE SIM TO ESIM

Figure No. 1.1- SIM chip structure and packaging

1.3 Significance Of The Report

A SIM card can be switched easily from one phone to another and this portability of data
offers a number of benefits. For example, a user that buys a new phone can install the current
SIM card to associate the new phone with the same number and user preferences as the old
one. In another common situation, if a phone's battery runs out of power, the user can easily
install the card to another subscriber's phone to borrow it without running up that user's
minutes. Some vendors offer prepaid SIM cards that can provide travelers with local
numbers, as long as their cell phones are not locked to a specific carrier.

1.4 Aim

Since extract, modify, or insert content in the SIM module in the removable SIM and tamper
resistant devices are almost impossible for unauthorized user, hence the subscriber identity
and credentials (e.g., secret key for the authentication) are very well protected and the fraud
probability is very low.

With the original removable SIM the user’s IMSI and credentials are very well
protected and with the newer version of the authentication algorithms it is almost impossible
to extract the secret key for authentication.

KCES’s COEIT, Jalgaon Page 3


EVOLUTION OF THE SIM TO ESIM

The emergence of M2M applications has created the need of separating the SIM
application from the UICC and allowing over-the-air downloading of the SIM to the UICC.
Although convenient for M2M applications this modi cation will surely bring new security
threats that can be fatal but still unknown[4].

The main objective of this thesis is to shed light to the security challenges that the
soft-SIM could introduces. More speci cally, the main tasks of this thesis are:

1.5 Report Organization

Chapter 1: Introduction of Subscriber Identity Module(SIM) :-

This chapter introduce the background of Subscriber identity module(SIM) and also
what is actual significance, design and aim behind given this system.

Chapter 2: Literature Survey .

This chapter introduce us Literature Survey .

Chapter 3: Methodology.

This chapter introduce full detail of SIM Methedology.

Chapter 4: Implementation.

This chapter introduce diagrammatically representation of ESIM Implementation.

1.6 Summary

In this chapter, the discussion about Subscriber Identification Module (SIM). Also the
background, aim of project, significance of the report, and design, contribution are discussed

Next chapter introduced the background information of sim there detail information.

KCES’s COEIT, Jalgaon Page 4


EVOLUTION OF THE SIM TO ESIM

CHAPTER 2

LITERATURE SURVEY

In chapter will discussed about the Literature survay and the related information of
requirements.

Section 2.1- Introduce the History of the subscriber identity module (SIM), Section
2.2- Introduce the SIM Format, Section 1.3- Introduce the Current SIM deployments, Section
2.4- Introduce the Device categories, Section 2.5- Introduce the Tablets Traditional SIM card,
Section 2.6- Summary

2.1 History of the subscriber identity module (SIM) :-

In 1991, Giesecke and Devrient supplied the first commercial SIM card to a Finnish Network
operator. The SIM card was originally designed to work on the nascent GSM network and
was similar in size to a credit card[5].

The primary role of the SIM card was twofold, both of these benefits remain valid today:

1. Identity: the SIM card contains a unique reference number that identifies the SIM
card and therefore the subscription that accompanies that SIM card. The mobile
network can recognise the reference number and ensure that associated costs incurred
are allocated correctly
2. Authentication: in order to ensure that the identity is valid, the mobile network uses
a security mechanism to allow access to the network. This is achieved by the network
issuing a challenge (similar to a security question) that only that particular SIM card
can answer from the information it has stored in its memory. Once validated, access to
the network is granted

Additionally, if the SIM card becomes damaged or the security compromised, it can easily be
removed and replaced with a new SIM card. Therefore, the secure connectivity can be
restored without replacing the entire handset. Similarly, if a consumer wishes to change
network provider, they can do so through replacing the relatively inexpensive SIM card rather
than the entire handset (assuming the device is not locked to a particular operator). The SIM
card also brings secondary benefits for the end user:

KCES’s COEIT, Jalgaon Page 5


EVOLUTION OF THE SIM TO ESIM

1. Portability: as the identity is stored on the SIM card, it can easily be moved to a new
device when the consumer upgrades or replaces their handset.
2. Memory: the SIM card provides memory for additional services such as storing
contact details/SMS. As these are stored in the SIM card memory, they can be
retained if the SIM card is moved to another device. Over time, some of this
functionality such as SMS storage and the address book has moved from the SIM card
to the device memory.

2.2 SIM Format :-

The physical SIM card itself has significantly reduced in size — driven by a combination of
smaller devices and the requirement to use the available space within a device for an
increasingly complex set of features and functionality. The 4FF SIM is the smallest possible
size whilst retaining the ability for users to confidently insert and remove them. At the same
time, the SIM itself has developed to take on more complex functions (e.g. NFC, see
definitions page for an explanation of NFC)[6].

Figure No. 2.1- GSM SIM card evolution

Shows how the size of the SIM has reduced from the original credit card size 1FF (FF
stands for form factor) SIM to the 4FF SIM (or “Nano SIM”) that is widely used in new
smartphones today.

KCES’s COEIT, Jalgaon Page 6


EVOLUTION OF THE SIM TO ESIM

SIM cards have been made smaller over the years; functionality is independent of
format. Full-size SIM were followed by mini-SIM, micro-SIM, and nano-SIM. SIM cards are
also made to embed in devices.

Table No. 2.1- SIM card formats and dimensions

All versions of the non-embedded SIM cards share the same ISO/IEC 7816 pin arrangement.

2.2.1 Full-size SIM

The full-size SIM (or 1FF, 1st form factor) was the first form factor to appear. It has the size
of a credit card (85.60 mm × 53.98 mm × 0.76 mm). Later smaller SIMs are often supplied
embedded in a full-size card from which they can be removed.

2.2.2 Mini-SIM

The mini-SIM (or 2FF) card has the same contact arrangement as the full-size SIM card and
is normally supplied within a full-size card carrier, attached by a number of linking pieces.
This arrangement (defined in ISO/IEC 7810 as ID-1/000) lets such a card be used in a device
that requires a full-size card – or in a device that requires a mini-SIM card, after breaking the
linking pieces. As the full-size SIM is no longer used, some suppliers refer to the mini-SIM
as a "standard SIM" or "regular SIM".

KCES’s COEIT, Jalgaon Page 7


EVOLUTION OF THE SIM TO ESIM

2.2.3 Micro-SIM

The micro-SIM (or 3FF) card has the same thickness and contact arrangements, but reduced
length and width as shown in the table above.

The micro-SIM was introduced by the European Telecommunications Standards


Institute (ETSI) along with SCP, 3GPP (UTRAN/GERAN), 3GPP2 (CDMA2000), ARIB, 
GSM Association (GSMA SCaG and GSMNA), GlobalPlatform, Liberty Alliance, and
the Open Mobile Alliance (OMA) for the purpose of fitting into devices too small for a mini-
SIM card.

The form factor was mentioned in the December 1998 3GPP SMG9 UMTS Working
Party, which is the standards-setting body for GSM SIM cards,[19] and the form factor was
agreed upon in late 2003.

The micro-SIM was designed for backward compatibility. The major issue for
backward compatibility was the contact area of the chip. Retaining the same contact area
makes the micro-SIM compatible with the prior, larger SIM readers through the use of plastic
cutout surrounds. The SIM was also designed to run at the same speed (5 MHz) as the prior
version. The same size and positions of pins resulted in numerous "How-to" tutorials and
YouTube video with detailed instructions how to cut a mini-SIM card to micro-SIM size.

The chairman of EP SCP, Dr. Klaus Vedder, said

ETSI has responded to a market need from ETSI customers, but additionally there is a
strong desire not to invalidate, overnight, the existing interface, nor reduce the performance
of the cards[7].

Micro-SIM cards were introduced by various mobile service providers for the launch
of the original iPad, and later for smartphones, from April 2010. The iPhone 4 was the first
smartphone to use a micro-SIM card in June 2010, followed by many others.

2.2.4 Nano-SIM

The nano-SIM (or 4FF) card was introduced on 11 October 2012, when mobile service
providers in various countries started to supply it for phones that supported the format. The
nano-SIM measures 12.3 mm × 8.8 mm × 0.67 mm (0.484 in × 0.346 in × 0.026 in) and
reduces the previous format to the contact area while maintaining the existing contact
arrangements. A small rim of isolating material is left around the contact area to avoid short
circuits with the socket. The nano-SIM is 0.67 mm (0.026 in) thick, compared to the 0.76 mm

KCES’s COEIT, Jalgaon Page 8


EVOLUTION OF THE SIM TO ESIM

(0.030 in) of its predecessor. 4FF can be put into adapters for use with devices designed for
2FF or 3FF SIMs, and is made thinner for that purpose, and telephone companies give due
warning about this.

The iPhone 5, released in September 2012, was the first device to use a nano-SIM
card, followed by other handsets.

2.2.5 Embedded-SIM (eSIM):-

An embedded-SIM (eSIM) or embedded universal integrated circuit card (eUICC) is a form


of programmable SIM that is embedded directly into a device. The surface mount format
provides the same electrical interface as the full size, 2FF and 3FF SIM cards, but is soldered
to a circuit board as part of the manufacturing process. In M2M applications where there is
no requirement to change the SIM card, this avoids the requirement for a connector,
improving reliability and security. An eSIM can be provisioned remotely; end-users can add
or remove operators without the need to physically swap a SIM from the device[8].

Figure No. 2.2- eSIM frontend Figure No. 2.3- eSIM backend

ESIM is a global specification by the GSMA which enables remote SIM provisioning
of any mobile device, and GSMA defines eSIM as the SIM for the next generation of
connected consumer device, and networking solution using eSIM technology can be widely
applicable to various IoT scenarios, including connected cars (smart rearview mirror, OBD,
vehicle hotspot), AI translator, Mi-Fi device, smart earphone, smart metering, tracker, DTU,
bike-sharing, advertising player, and video surveillance devices, etc.

KCES’s COEIT, Jalgaon Page 9


EVOLUTION OF THE SIM TO ESIM

The GSMA had been discussing the possibilities of a software-based SIM card since
2010. While Motorola noted that eUICC is geared at industrial devices, Apple "disagreed that
there is any statement forbidding the use of an embedded UICC in a consumer product." In
2012, The European Commission has selected the Embedded UICC format for its in-vehicle
emergency call service known as eCall. All new car models in the EU must have one by 2018
to instantly connect the car to the emergency services in case of an accident. Russia has a
similar plan with the GLONASS (national satellite positioning system) called ERA-
GLONASS. Singapore is seeking public opinions on introducing eSIM as a new standard as
more compatible devices enter the market.

Apple implemented eSIM support in its Apple Watch series 3 and second generation


iPad Pro devices. In October 2017, Google unveiled the Pixel 2, which added eSIM support
for use with its Google Fi service. One year later in September 2018, Apple released
the iPhone XS and in October 2018 iPhone XR with eSIM support. eSIM support on iPhone
requires iOS 12.1 or later. In May 2019 Google released the Pixel 3a and Pixel 3a XL with
eSIM support for carriers other than Google Fi[9].

Plintron implemented eSIM4Things product based on eSIM support for the devices


and available in 28 countries.

2.3 Current SIM deployments :-

In this section we will first explain what is meant by “Traditional SIM card approach,”
“Embedded SIM” and “Remote Provisioning.” Following these definitions, we will look at
the different device segments and the SIM solutions currently being deployed in each[10].

2.3.1 Traditional SIM card approach :-

The traditional SIM card is a piece of hardware that a consumer can remove from the device.
The SIM card stores an operator defined profile which is programmed during manufacture.
The operator profile is the information that enables identification and authentication of the
SIM card with the selected mobile networks.

From a technical perspective, the traditional SIM is built on Smart Card (UICC)
technology, just like bank cards. The UICC is a physically secure computing device that can
be used across multiple vertical sectors including mobile telecommunications.

KCES’s COEIT, Jalgaon Page 10


EVOLUTION OF THE SIM TO ESIM

The UICC conforms to the specifications written and maintained by the ETSI Smart
Card Platform Project.

2.3.2 Embedded SIM :-

An embedded SIM is one which is physically integrated into the device — i.e. it cannot be
removed from the device and replaced with another SIM.

2.3.3 Remote provisioning :-

Remote Provisioning is the ability to remotely change the SIM profile on a deployed SIM
without having to physically change the SIM itself. This technology can be implemented on
any SIM form factor, including removable and soldered SIMs.

In order to achieve this, the SIM has extra memory and is therefore capable of holding
more than one operator profile (rather than only one on the traditional SIM).

When a consumer purchases a service package from a specific operator, the operator
profile is downloaded and saved onto the SIM memory. If a second operator package is
subsequently purchased, the new operator profile is downloaded and also saved to the SIM –
both operator profiles are now saved on a single SIM card and there is an ability to swap
between the two installed profiles. This swap effectively mimics the actions a user would
undertake when swapping the SIM card in a device[11].

The term eUICC3 is being used to represent a SIM card that can be remotely
provisioned.

2.4 Device categories :-

We will now look at the different device segments to understand how the current SIM
deployments are being used:

2.4.1 Handsets/smartphones

Handsets and Smartphones currently use a traditional SIM card model i.e. a physical SIM
card that stores a single operator profile. The SIM card itself can be removed from the device
and placed into another device, transferring the identity and authentication functionality.
Alternatively, the SIM can be swapped for a new SIM card in the original device (for
example, if the handset changes ownership or the SIM card becomes damaged).

KCES’s COEIT, Jalgaon Page 11


EVOLUTION OF THE SIM TO ESIM

An operator is able to lock a SIM card so that it can only be used in conjunction with
a specific device (or vice versa). This is commonly used when a device is subsidised at the
time of purchased – and therefore helps to ensure the operator can recoup the subsidy.

2.4.2 Machine-to-machine (M2M)

Whilst many M2M devices use the traditional SIM card approach, M2M devices present
unique challenges to the role of the traditional SIM card. The devices are often located across
very diverse, unsupervised locations and subject to external influences such as weather (e.g.
remote sensors / vending machines), and temperature and vibration (e.g. automobiles)[12].

In such cases the SIM card needs to be protected and kept in a secure part of the
device where it will not be damaged or open to theft.

Furthermore, the lifespan of M2M devices is often tens of years and, for various
reasons, the owner may wish (or be forced) to change the operator providing the cellular
connectivity.

Replacing the SIM card would be impractical and expensive, for example:

• Many devices in diverse geographical locations

• The SIM card being embedded in a hard to reach, protected part of a vehicle

The GSMA has worked with leading operators and SIM hardware providers from
around the world to develop a practical solution to the unique challenges in the M2M market.

The resulting GSMA Embedded SIM Specification4 enables a SIM card to be fully
embedded in an M2M device but also have Remote Provisioning functionality.

This specification ensures that the SIM card is protected from theft and external
elements by being physically integrated within the device. The Remote Provisioning aspect
allows the mobile network provider to be changed without removing the SIM (i.e. it cannot
be removed from the device, but a user can change to a new network provider if needed, or
hold multiple operator profiles if the user needs to swap between networks).

Initially designed for the automotive sector, the GSMA Embedded SIM Specification
has been widely adopted and become the de-facto approach for embedded SIMs in M2M
devices.

KCES’s COEIT, Jalgaon Page 12


EVOLUTION OF THE SIM TO ESIM

Companies who have launched or committed to launch GSMA Embedded SIM


Specification compliant solutions include América Móvil, AT&T, China Mobile, NTT
Docomo, Ericsson, Etisalat, Gemalto, Giesecke & Devrient, Jasper, KDDI, Orange, Oberthur,
Telefónica, Telenor, Telit, Safran, Sierra Wireless, Tele2 and Vodafone5. In March, the
GSMA announced that operator members of leading M2M alliances including the Global
M2M Association (GMA) and the M2M World Alliance will deploy services using the
GSMA Embedded SIM Specification for the remote over-the-air provisioning of machine-to-
machine (M2M) devices[13].

2.4.3 Wearables

As the form factors and functionality of the wearables segment evolve, we believe that a fully
embedded SIM card with remote provisioning will prove to be an attractive option to provide
flexibility and connectivity.

Whilst wearables are still a nascent market, these devices highlight the need for
further evolution of the SIM to accommodate smaller devices addressing new consumers
segments.

Currently, the majority of cellular enabled wearable devices use the traditional SIM
method outlined above. However, moving to an Embedded solution with Remote
Provisioning will eliminate the need for incorporating SIM housing components and help
maximise the space available in the device. Remote Provisioning would allow flexibility in
choice of mobile network operator without the need to remove the SIM.

2.5 Tablets :-

2.5.1 Traditional SIM card:-

The majority of cellular capable tablets available today use the same SIM approach as is used
in handsets and smartphones – i.e. a physical SIM card that stores a single operator profile. A
user can switch between operators (if the tablet itself is not locked to an operator) but this
does require removing the SIM card and replacing it with a SIM card from the new
operator[14].

2.5.2 Removable SIM with Remote Provisioning :-

KCES’s COEIT, Jalgaon Page 13


EVOLUTION OF THE SIM TO ESIM

With the launch of the most recent iPad Air and iPad Mini models, Apple also introduced the
Apple SIM which uses Remote Provisioning, rather than the traditional SIM card approach.

It is important to note that the Apple SIM is a physical, removable SIM (in the same
way that traditional SIM’s can be removed from handsets or smartphones). This is not a ‘Soft
SIM’ — a ‘Soft SIM’ would have no hardware layer and all functions would be performed at
the software layer (more details of what is meant by the term Soft SIM can be found later in
this report).

Apple SIM reduces the barriers for consumers to purchase and use cellular
connectivity when the device is purchased through non-operator retail. It could encourage
consumers to purchase the, higher priced, cellular enabled tablets (rather than the versions
that only have Wi-Fi connectivity)[15].

The consumer can purchase prepaid data packages from more than one operator for
use at different times or locations and then select which package to use through the device
settings.

2.6 Summary

In this chapter, discussed the Evolution of SIM. Next chapter will study on SIM
Management.

CHAPTER 3

KCES’s COEIT, Jalgaon Page 14


EVOLUTION OF THE SIM TO ESIM

METHODOLOGY

In this chapter will see the SIM cards store network-specific information used to authenticate
and identify subscribers on the network. And also we will see about the background
information of SIM.

Section 3.1- Introduce the SIM Background Data, Section 3.2- Introduce the SIM
Format ICCID, Section 3.3- Introduce the International mobile subscriber identity (IMSI),
Section 3.4- Introduce the Authentication key (Ki), Section 3.5- Introduce the Location area
identity, Section 3.6- Introdus theSMS messages and contacts, Section 3.7- Summary

3.1 SIM Background Data:-

SIM cards store network-specific information used to authenticate and identify subscribers on
the network. The most important of these are the ICCID, IMSI, Authentication Key (Ki),
Local Area Identity (LAI) and Operator-Specific Emergency Number. The SIM also stores
other carrier-specific data such as the SMSC (Short Message Service Center) number,
Service Provider Name (SPN), Service Dialing Numbers (SDN), Advice-Of-Charge
parameters and Value Added Service (VAS) applications.

SIM cards can come in various data capacities, from 8 KB to at least 256 KB. All can
store a maximum of 250 contacts on the SIM, but while the 32 KB has room for 33 Mobile
Network Codes (MNCs) or network identifiers, the 64 KB version has room for 80 MNCs.
This is used by network operators to store data on preferred networks, mostly used when the
SIM is not in its home network but is roaming. The network operator that issued the SIM card
can use this to have a phone connect to a preferred network that is more economic for the
provider instead of having to pay the network operator that the phone 'saw' first. This does
not mean that a phone containing this SIM card can connect to a maximum of only 33 or 80
networks, but it means that the SIM card issuer can specify only up to that number of
preferred networks[16].

3.2 ICCID :-

KCES’s COEIT, Jalgaon Page 15


EVOLUTION OF THE SIM TO ESIM

Each SIM is internationally identified by its integrated circuit card identifier (ICCID). ICCID
is the identifier of the actual SIM card itself – i.e. an identifier for the SIM chip. Nowadays
ICCID numbers are also used to identify eSIM profiles, and not only physical SIM cards.

ICCIDs are stored in the SIM cards and are also engraved or printed on the SIM card
body during a process called personalisation. The ICCID is defined by the ITU-T
recommendation E.118 as the Primary Account Number. Its layout is based on ISO/IEC
7812. According to E.118, the number can be up to 22 digits long, including a single check
digit calculated using the Luhn algorithm. However, the GSM Phase 1 defined the ICCID
length as an opaque data field, 10 octets (20 digits) in length, whose structure is specific to
a mobile network operator.

The number is composed of the following subparts:

3.2.1 Issuer identification number (IIN)

Maximum of seven digits:

 Major industry identifier (MII), 2 fixed digits, 89 for telecommunication purposes.


 Country code, 2 or 3 digits, as defined by ITU-T recommendation E.164.
o NANP countries, apart from Canada, use 01, i.e. prepending a zero to their
common calling code +1
o Canada uses 302
o Russia uses 701, i.e. appending 01 to its calling code +7
o Kazakhstan uses 997, even though it shares the calling code +7 with Russia

 Issuer identifier, 1–4 digits.


o Often identical to the Mobile Network Code (MNC).

3.2.2 Individual account identification

 Individual account identification number. Its length is variable, but every number
under one IIN has the same length.
o Often identical to the Mobile Subscription Identification Number (MSIN).

3.2.3 Check digit

 Single digit calculated from the other digits using the Luhn algorithm.

KCES’s COEIT, Jalgaon Page 16


EVOLUTION OF THE SIM TO ESIM

With the GSM Phase 1 specification using 10 octets into which ICCID is stored as packed
BCD, the data field has room for 20 digits with hexadecimal digit "F" being used as filler
when necessary. In practice, this means that on GSM SIM cards there are 20-digit (19+1) and
19-digit (18+1) ICCIDs in use, depending upon the issuer. However, a single issuer always
uses the same size for its ICCIDs.

To confuse matters more, SIM factories seem to have varying ways of delivering
electronic copies of SIM personalization datasets. Some datasets are without the ICCID
checksum digit, others are with the digit.

As required by E.118, the ITU-T updates a list of all current internationally assigned
IIN codes in its Operational Bulletins which are published twice a month (the last is No. 1163
from 1 January 2019). ITU-T also publishes complete lists: as of January 2019, the list issued
on 1 December 2018 was current, having all issuer identifier numbers before 1 December
2018.

3.3 International mobile subscriber identity (IMSI) :-

SIM cards are identified on their individual operator networks by a unique International


Mobile Subscriber Identity (IMSI). Mobile network operators connect mobile phone calls and
communicate with their market SIM cards using their IMSIs.

The format is:

 The first three digits represent the Mobile Country Code (MCC).


 The next two or three digits represent the Mobile Network Code (MNC). Three-digit
MNC codes are allowed by E.212 but are mainly used in the United States and Canada.
 The next digits represent the mobile subscriber identification number (MSIN).
Normally there are 10 digits, but can be fewer in the case of a 3-digit MNC or if national
regulations indicate that the total length of the IMSI should be less than 15 digits.
 Digits are different from country to country[17].

3.4 Authentication key (Ki) :-

The Ki is a 128-bit value used in authenticating the SIMs on a GSM mobile network
(for USIM network, you still need Ki but other parameters are also needed). Each SIM holds

KCES’s COEIT, Jalgaon Page 17


EVOLUTION OF THE SIM TO ESIM

a unique Ki assigned to it by the operator during the personalization process. The Ki is also
stored in a database (termed authentication center or AuC) on the carrier's network.

The SIM card is designed to prevent someone from getting the Ki by using the smart-
card interface. Instead, the SIM card provides a function, Run GSM Algorithm, that the
phone uses to pass data to the SIM card to be signed with the K i. This, by design, makes
using the SIM card mandatory unless the Ki can be extracted from the SIM card, or the carrier
is willing to reveal the Ki. In practice, the GSM cryptographic algorithm for computing
SRES_2 (see step 4, below) from the Ki has certain vulnerabilities that can allow the
extraction of the Ki from a SIM card and the making of a duplicate SIM card[18].

Authentication process:

1. When the mobile equipment starts up, it obtains the international mobile subscriber
identity (IMSI) from the SIM card, and passes this to the mobile operator, requesting
access and authentication. The mobile equipment may have to pass a PIN to the SIM
card before the SIM card reveals this information.
2. The operator network searches its database for the incoming IMSI and its associated
Ki.
3. The operator network then generates a random number (RAND, which is a nonce) and
signs it with the Ki associated with the IMSI (and stored on the SIM card), computing
another number, that is split into the Signed Response 1 (SRES_1, 32 bits) and the
encryption key Kc (64 bits).
4. The operator network then sends the RAND to the mobile equipment, which passes it
to the SIM card. The SIM card signs it with its Ki, producing SRES_2 and Kc, which
it gives to the mobile equipment. The mobile equipment passes SRES_2 on to the
operator network.

3.5 Location area identity :-

The SIM stores network state information, which is received from the Location Area
Identity (LAI). Operator networks are divided into Location Areas, each having a unique LAI
number. When the device changes locations, it stores the new LAI to the SIM and sends it
back to the operator network with its new location. If the device is power cycled, it takes data
off the SIM, and searches for the prior LAI.

KCES’s COEIT, Jalgaon Page 18


EVOLUTION OF THE SIM TO ESIM

3.6 SMS messages and contacts :-

Most SIM cards store a number of SMS messages and phone book contacts. It stores the
contacts in simple "name and number" pairs. Entries that contain multiple phone numbers and
additional phone numbers are usually not stored on the SIM card. When a user tries to copy
such entries to a SIM, the handset's software breaks them into multiple entries, discarding
information that is not a phone number. The number of contacts and messages stored depends
on the SIM; early models stored as few as five messages and 20 contacts, while modern SIM
cards can usually store over 250 contacts.

3.7 Summary

In this chapter, discussed about the see SIM cards store network-specific information used to
authenticate and identify subscribers on the network. And also we will see about the
background information of SIM.

KCES’s COEIT, Jalgaon Page 19


EVOLUTION OF THE SIM TO ESIM

CHAPTER 4

IMPLEMENTATION

In above Chapter see about the working of SIM and Implementation. Now we will see the
Switch to SIM to ESIM.

Section 4.1- Introduce the SIM Evolution manager, Section 4.2- Introduce the
Subscription Manager (SM), Section 4.3- Summary

4.1 SIM Evolution manager :-

However in the context of this thesis the focus is not on the form factor of the SIM but on
the management of the SIM. The SIM evolution in terms of manage-ment is still unclear and
unsure due to a lot of political and economic factors. To give a comprehensive view of the
situation a simpli ed description of the evolution.

Figure 4.1- The SIM evolution

KCES’s COEIT, Jalgaon Page 20


EVOLUTION OF THE SIM TO ESIM

As shown in Figure 4.1 from the current removable SIM, which is a UICC with a pre-
installed SIM or USIM application there are three evolution paths:

Evolution Path 1: Removable UICC

Evolution Path 2: M2M SIM

Evolution Path 3: Soft SIM

4.2 Subscription Manager (SM) :-

The embedded UICC will be switched to personal terms and other data will be provisioned
Over-the-Air. The remote provisioning is called Subscription Manage-ment. Therefore, for
the soldered UICC with Subscription Manager there is an ability to change the SIM operator.
Subscription manager is a new role played by SIM venders from the management and
manufacture of reprogrammable SIMs. The Subscription Manger is responsible for the secure
process and technology via which a MNO is able to submit a pro le to be loaded onto the
eUICC.

Currently, the traditional SIM provisioning, MNOs send the vendors a le with their
speci cations, such as the IMSI numbers of the SIM cards and SIM venders send the
personalized cards back to MNOs. MNO and SIM card vendors hold the relationship. Thus,
only two entities are involved in the supply chain before the customer takes possession of the
SIM card[19].

4.2.1 Subscription Manager Data Preparation (SM-DP) :-

For the secure preparation of delivering package to the eUICC and for working with the SM-
SR, SM-DP has responsibility. SM-DP includes following key functions:

Certi cation level and functional characteristic will manage by SM-DP Managing
theMNO credentials such as IMSI, K

Computing the Over-the-Air packages for downloading by SM-SR

KCES’s COEIT, Jalgaon Page 21


EVOLUTION OF THE SIM TO ESIM

When a third party take on the responsibility of the SM-DP function role instead of MNO,
the security and trust relationship are critical. Each MNO will have direct relationship with
speci c SM-DP.

4.2.2 Subscription Manager Secure Routing (SM-SR) :-

Secure routing and delivery of the credential package to the correct eUICC is doing by SM-
SR. Performance, reliability and scalability requirements are expected to be signi cant for the
SM-SR. SM-SR key functions include:

 The Over-the-Air communication manages by SM-SR through a ciphered VPN with


the eUICC.
 Building end to end link up to the eUICC, require managing the communi-cation with
other SM-SR. ( for example when MNO does not have a direct commercial
relationship with the particular SM that manage that eUICC).
 SM-SR manage the eUICC data that is provided by eUICC suppliers and used for
SM-SR OTA communication.

4.2.3 Subscription Manager Requirements :-

The SM-SR and the SM-DP shall be certi ed according to a GSMA agreed cer-ti cation
scheme and implement an access control mechanism on the request for execution of the
SMSR and the SMDP functions only to authorized security realms. Security realm of eUICC,
SM-SR and SM-DP should have counter measure against denial of services attacks.

At least one of the two mechanisms, Web Services Security standard (WS-standard)
or Mutual Authentication Transport Level Security (SSL) is required to secure the message
being sent between the entities. In the mutual authentication, the entities concerned to
authenticate each other are SM-DP to SM-SR and SM-SR to SM-DP.

4.3 Summary

In this chapter, we study on SIM Management. Next chapter will see the problem and
solution of ESIM .

KCES’s COEIT, Jalgaon Page 22


EVOLUTION OF THE SIM TO ESIM

APPLICATIONS

5.1 Application of eSIM Technology :-

The SIM card is a technology that most of us are familiar with, present in mobile phones
since the early nineties. A SIM card is a piece of hardware which contains data that
authenticates us with our mobile operator, enabling us to connect to a network and receive a
mobile connection. However, in the future, a huge array of connected devices will connect to
mobile networks without the need for a SIM card, thanks to embedded SIM (eSIM)
technology[20].

eSIM is a global specification developed by telecoms trade body the GSMA, which


involves a SIM card chip being embedded into a device. Due to Apple’s latest iPhone launch,
eSIM technology has been thrust into the public consciousness. One of the main advantages
of eSIM is that it enables users to change operator remotely, straight from their phone,
without having to acquire a new SIM card. It also allows people to store multiple profiles on
a single device, effectively having two or more numbers, and switch between them at ease.
This is ideal for anyone that may require an additional number for travel or business, for
example.

Mobile operators are now starting to support eSIM technology, including EE in the
UK, Vodafone in Germany, and Bell in Canada. As an increasing number of devices offer
eSIM technology, we are likely to see more mobile operators offering support for the service,
particularly as it gives them an opportunity to up and cross-sell new service plans to their
customers across the consumer and enterprise markets.

5.2 New opportunities in the connected things market :-

eSIM technology will not just be used in smartphones, but also in a range of consumer
devices which require always-on connectivity. This includes wearables, such as smartwatches
and smart glasses, connected home devices, and computing devices such as laptops and

KCES’s COEIT, Jalgaon Page 23


EVOLUTION OF THE SIM TO ESIM

tablets. Technology which has traditionally connected to Wi-Fi will benefit from the wider
availability and security of cellular (4G) networks.

As eSIM enables subscribers to connect more devices to their mobile operator,


operators can offer multi-device packages and bespoke data plans. With eSIM, device
bundling will become much easier, with consumers able to conveniently add new devices to
their plans without having to go in store or wait for a physical SIM card to arrive in the post.
In turn, this presents new revenue opportunities for mobile operators, as their customers
scale-up their plans by adding new devices which require data.

Businesses with a large number of mobiles used by their employees will also benefit
from the convenience of eSIM. eSIM can deliver a streamlined user experience for managing
cellular connectivity, enabling IT teams to provision and deploy new devices in a rapid and
convenient fashion. Adding new phones to a corporate mobile service, or swapping devices
between users as they join and leave a company will become much more efficient, as it can
be achieved remotely. Profiles for each user can also be personalised and data plans can be
adjusted and optimised, via eSIM remote management tools[20].

eSIM will also benefit businesses that use IoT systems, and in particular businesses
that have large scale machine-to-machine deployments such as oil and gas, power plants,
manufacturing facilities and warehouses. If, for example, a company uses thousands of
individual pieces of hardware that require mobile connectivity, it involves installing a SIM
card into each unit, which would be a painstaking task. With eSIM, businesses can remotely
connect all of this technology to a mobile network. Furthermore, if the technology is required
to operate in another country, it can be programmed remotely to connect to a local operator in
that region.

eSIM uses less space and is cheaper than traditional SIM technology. This means that
mobile connectivity can now be introduced into hardware where it was previously not are the

feasible due to cost or space restrictions.

Finally, as with the consumer market, operators can create new data plans for
businesses as their connectivity requirements scale up. This could include new packages for

KCES’s COEIT, Jalgaon Page 24


EVOLUTION OF THE SIM TO ESIM

previously unconnected devices, such as connected cars or iPads, naturally resulting in new
revenue streams.

5.3 Driving eSIM adoption:-

eSIM adoption by consumers and businesses will partly down to technology manufacturers
and their ability to support the new technology. According to Orange, all new smartphone
devices will support eSIM by 2030, and other types of connected technology will likely
follow suit.

Equally, it is the operators’ responsibility to ensure they can support the technology
on their networks and provide a smooth experience for business and consumer customers
looking adopt it. Operators should aim to create a new experience for onboarding customers
using eSIM, via an online portal or application. These applications can be developed
specifically for a business, whilst offering more mainstream portals for consumers.

For this customer experience to be seamless, operators must ensure that their eSIM
technology is compatible with a variety of different handset manufactures and eSIM vendors,
to ensure they can support multiple download and activation methods. This will also enable
full visibility and control for a customer service representative, who will need to provide care
and support for a digital entity.

5.4 Summary

In this chapter, we see the various application of Esim technology.

KCES’s COEIT, Jalgaon Page 25


EVOLUTION OF THE SIM TO ESIM

ADVANTAGES AND DISADVANTAGES

6.1 Advantages and Disadvantages for ESIM:-

Advantages:-

1. It is more reliable :-
We will not easily lose the eSIM , it is not necessary to cut them and they will
not wear out. On the other hand, you do not have to go to the store to catch one or even
pay for one such as when companies charged SIM cards. And in the last place, it is not
necessary for a company to send it to you, since it is integrated in your mobile.

2. Remote provisioning :-
For people who have used eSIMs for a while, the experiences have been
good. In the Google Pixel 2 is activated instantly and the networks that are supporting
the eSIM are increasing. Therefore, it is not necessary to change an old SIM, for an
eSIM.

3. One entry less, more space saving :-


It is a benefit for the manufacturers as they will have space for other
implements. The removal of the components to read a SIM card and the slot,
eliminate complexities in the design of the phones and eliminate a hole in the device.

4. Goodbye to the SIM extractor :-


Millions of smartphones have an extractor to eject the SIMs tray. But they
always get lost and we have to choose a pointy item that replaces it. With the eSIM
that will no longer be a problem, since we will not have a slot and therefore, we will
not have an extractor.

5. Better design:-

KCES’s COEIT, Jalgaon Page 26


EVOLUTION OF THE SIM TO ESIM

surely, the designers will manage to create more sophisticated phones, without
borders, now that it is not necessary to remove the back cover to remove the SIM or
battery, so, they would be more attractive to the eye.

6. Network availability :-
For people who move from country to country: by not having to buy a SIM
card from a specific operator, but with the eSIM you only have to call the telephone
company and request the connection, this cost can be reduced.

Disadvantages:-

1. Changing mobile is complicated :-


It is very useful to change the SIM from one mobile phone to another with the old
ones, since we only open the slot and that’s it. Imagine that you have to get rid of a
mobile phone by the SIM, since it will take time and effort to change the eSIM. And if
you did not know, there are no phones with dual eSIM (a normal and an eSIM), but it
would be very helpful in the future.

2. We can not disconnect from networks :-


We will always have an eSIM on our mobile and we will always be connected to a
network. In short our mobile will be easier to track by any government and can be a
problem for people who want privacy.

3. Piracy : -
It is easier for hackers to steal information, since we will not have a physical chip
that we can replace. However, operators should be concerned about the exchange of data,
and the configuration between the network and the mobile.

6.2 Summary

In this chapter, explain all advantages as well as disadvantages of Esim technology.


Next chapter will introduce the various application of Esim technology.

KCES’s COEIT, Jalgaon Page 27


EVOLUTION OF THE SIM TO ESIM

CONCLUSION AND FUTURE SCOPE

Hence we can conclude that esim is really a great technology evolved. Are you afraid of
losing your sim, or changing your sim card operator and going to those crowded shops. Then
no need to worry now? In the word of information technology, technology is developing day
by day and solving the most of problems. The technology has been developing at rapid speed
toward artificial intelligence. This article is going to solve your problem. In this article, you
will know about what is an esim, its advantage, its application in your daily life, and its scope
in the future.
It can be esteem that after twenty-five years the sim will disappear from the world.
Because the plastic sim that is being in use these days will be replaced by the new technology
of embedded sim. The capacity of eSim is also great it. This is also the reason for its bright
future. The uses of the internet are increasing day by day, and eSim supports a good internet
connection, along with sharing with others. Thus you can connect a large number of devices
with good speed. Also, it is easy to activate, manage, and handle. These all factors decide the
future of eSim and you can yourselves think which sim is better for you.

KCES’s COEIT, Jalgaon Page 28


EVOLUTION OF THE SIM TO ESIM

REFERENCES

[1]Germann C., (2008) SECURE SOFT SIM CREDENTIAL TRANSFER, WIPO Patent
No. WO/2008/128874.

[2]Schell S., Narang M., Caballero R., (2011) WIRELESS NETWORK


AUTHENTICATION APPARATUS AND METHODS, WIPO Patent No. 2011139795.

[3]GSMA, (2011), Embedded SIM Task Force Requirements and Use Cases 1.0 Retrieved
from ftp://ftp.3gpp2.org/.

[4]GSMA, (2011), Embedded SIM Task Force Subscription Manager FAQs, Retrieved from
ftp://ftp.3gpp2.org/TSGS/Working/2011/2011-0505-TSG-S+TSG-Cre eUICC/Embedded

[5]GSMA, (2012), Remote Provisioning Architecture for Embedded UICC, DRAFT 1.34,
GSM Association.

[6] GSMA, (2011), Embedded Mobile Whitepaper Embedded Mobile Guide-lines Version 2
Retrieved http://www.gsma.com/connectedliving/wp-content/uploads/2012/04/
whitepaper embeddedmobileguidelinesv2.pdf

[7]GSMA, (2011), Embedded SIM Task Force Requirements and Use Cases 1.0 Retrieved
from ftp://ftp.3gpp2.org/.

[8]Mouly M., Pautet M.B, Foreword B.T., (1992) The GSM system for mobile
communications. Telecom Publishing, ISBN 0945592154.

[9]Pagliusi P.S., (2002) A Contemporary Foreword on GSM Security, Journal of


Infrastructure Security, ScienceVolume 2437, pp 129-144.

[10]IUT-T, (2012) The international identi cation plan for public networks and subscriptions,
Technical Report, IUT-T Publications Retrieved from http://www.itu.int/rec/T-REC-
E.212/en

KCES’s COEIT, Jalgaon Page 29


EVOLUTION OF THE SIM TO ESIM

[11]Meyer U., Wetzel S., (2011) A man-in-the-middle attack on UMTS, Proceeding of the
3rd ACM workshop on Wireless security, Oct1-Oct01 Philadelphia , US.

[12]Audestad J.A., (2008) Technologies and Systems for Access and Transport Networks,
Boston US, Artech House.

[13]Eisl F., (2004) Smart Card Security Service for an Open Application En-vironment used
in Mobile Phones (Master Thesis), Department of Informa-tion Technology, Lund
University, Retrieved from Dissertations and Theses database
(http://www.iicm.tugraz.at/)

[14]Markantonakis K., Mayes K.m (2004) Smart Cards, Tokens, Security and Ap-plications,
New York, Springer, ISBN:9780387721972.

[15]Holcombe B., (Feb. 2004) Government smart card handbook, Retrieved from
http://www.smartcardalliance.org/resources/pdf/smartcardhandbook.pdf

[16]CDMA Subscriber Identity Module,(n.d.) (2012, July 6), from Wikipedia web-site,
http://en.wikipedia.org/wiki/CDMA Subscriber Identity Module

[17]Jorstad I., Thanh D. V., (2007) The Mobile Phone as Authentication Token, Technical
Report, Telenor ASA, Norway.

[18]GCMS Reprogrammable SIMs: Technology, Evolution and Im-plications (2012, Oct 25),
from consultantvalueadded website, http://consultantvalueadded.com/

[19]Base Station Subsystem,(n.d.) (2012, November 26), from Wikipedia website,


http://en.wikipedia.org/wiki/Base Station Subsystem.

[20]ETS, (1994) European digital cellular telecommunications system (Phase 2); Speci cation
of the Subscriber Identity Module - Mobile Equipment (SIM-ME) interface (GSM
11.11), European Telecommunications Standards Institute, Sophia Antipolis France,
Retrieved from http://www.etsi.org/

KCES’s COEIT, Jalgaon Page 30

You might also like