Professional Documents
Culture Documents
Seminar Report
Seminar Report
CHAPTER 1
INTRODUCTION
Introduction :-
The SIM circuit is part of the function of a universal integrated circuit card (UICC)
physical smart card, which is usually made of PVC with embedded contacts
and semiconductors. SIM cards are transferable between different mobile devices. The first
UICC smart cards were the size of credit and bank cards; sizes were reduced several times
over the years, usually keeping electrical contacts the same, so that a larger card could be cut
down to a smaller size.
A SIM card contains its unique serial number (ICCID), international mobile
subscriber identity (IMSI) number, security authentication and ciphering information,
temporary information related to the local network, a list of the services the user has access
to, and two passwords: a personal identification number (PIN) for ordinary use, and
a personal unblocking code (PUC) for PIN unlocking.
1.1 Background
logical behaviour of the SIM. With the development of UMTS, the specification work was
partially transferred to 3GPP. 3GPP is now responsible for the further development of
applications like SIM (TS 51.011) and USIM (TS 31.102) and ETSI for the further
development of the physical card UICC[2].
The first SIM card was developed in 1991 by Munich smart-card maker Giesecke &
Devrient, who sold the first 300 SIM cards to the Finnish wireless network
operator Radiolinja.
Today, SIM cards are ubiquitous, allowing over 7 billion devices to connect to
cellular networks around the world. According to the International Card Manufacturers
Association (ICMA), there were 5.4 billion SIM cards manufactured globally in 2016
creating over $6.5 billion in revenue for traditional SIM card vendors. The rise of cellular IoT
and 5G networks is predicted to drive the growth of the addressable market for SIM card
manufacturers to over 20 billion cellular devices by 2020. The introduction of Embedded
SIM (eSIM) and remote SIM provisioning (RSP) from the GSMA may disrupt the traditional
SIM card ecosystem with the entrance of new players specializing in "digital" SIM card
provisioning and other value-added services for mobile network operators.
1.2 Design
There are three operating voltages for SIM cards: 5 V, 3 V and 1.8 V (ISO/IEC 7816-3
classes A, B and C, respectively). The operating voltage of the majority of SIM cards
launched before 1998 was 5 V. SIM cards produced subsequently are compatible with 3
V and 5 V. Modern cards support 5 V, 3 V and 1.8 V.
Modern SIM cards allow applications to load when the SIM is in use by the
subscriber. These applications communicate with the handset or a server using SIM
Application Toolkit, which was initially specified by 3GPP in TS 11.14. (There is an
identical ETSI specification with different numbering.) ETSI and 3GPP maintain the SIM
specifications. The main specifications are: ETSI TS 102 223 (the toolkit for smartcards),
ETSI TS 102 241 (API), ETSI TS 102 588 (application invocation), and ETSI TS 131 111
(toolkit for more SIM-likes). SIM toolkit applications were initially written in native code
using proprietary APIs. To provide interoperability of the applications, ETSI choose Java
Card. A multi-company collaboration called Global Platform defines some extensions on the
cards, with additional APIs and features like more cryptographic security
and RFID contactless use added[3].
A SIM card can be switched easily from one phone to another and this portability of data
offers a number of benefits. For example, a user that buys a new phone can install the current
SIM card to associate the new phone with the same number and user preferences as the old
one. In another common situation, if a phone's battery runs out of power, the user can easily
install the card to another subscriber's phone to borrow it without running up that user's
minutes. Some vendors offer prepaid SIM cards that can provide travelers with local
numbers, as long as their cell phones are not locked to a specific carrier.
1.4 Aim
Since extract, modify, or insert content in the SIM module in the removable SIM and tamper
resistant devices are almost impossible for unauthorized user, hence the subscriber identity
and credentials (e.g., secret key for the authentication) are very well protected and the fraud
probability is very low.
With the original removable SIM the user’s IMSI and credentials are very well
protected and with the newer version of the authentication algorithms it is almost impossible
to extract the secret key for authentication.
The emergence of M2M applications has created the need of separating the SIM
application from the UICC and allowing over-the-air downloading of the SIM to the UICC.
Although convenient for M2M applications this modi cation will surely bring new security
threats that can be fatal but still unknown[4].
The main objective of this thesis is to shed light to the security challenges that the
soft-SIM could introduces. More speci cally, the main tasks of this thesis are:
This chapter introduce the background of Subscriber identity module(SIM) and also
what is actual significance, design and aim behind given this system.
Chapter 3: Methodology.
Chapter 4: Implementation.
1.6 Summary
In this chapter, the discussion about Subscriber Identification Module (SIM). Also the
background, aim of project, significance of the report, and design, contribution are discussed
Next chapter introduced the background information of sim there detail information.
CHAPTER 2
LITERATURE SURVEY
In chapter will discussed about the Literature survay and the related information of
requirements.
Section 2.1- Introduce the History of the subscriber identity module (SIM), Section
2.2- Introduce the SIM Format, Section 1.3- Introduce the Current SIM deployments, Section
2.4- Introduce the Device categories, Section 2.5- Introduce the Tablets Traditional SIM card,
Section 2.6- Summary
In 1991, Giesecke and Devrient supplied the first commercial SIM card to a Finnish Network
operator. The SIM card was originally designed to work on the nascent GSM network and
was similar in size to a credit card[5].
The primary role of the SIM card was twofold, both of these benefits remain valid today:
1. Identity: the SIM card contains a unique reference number that identifies the SIM
card and therefore the subscription that accompanies that SIM card. The mobile
network can recognise the reference number and ensure that associated costs incurred
are allocated correctly
2. Authentication: in order to ensure that the identity is valid, the mobile network uses
a security mechanism to allow access to the network. This is achieved by the network
issuing a challenge (similar to a security question) that only that particular SIM card
can answer from the information it has stored in its memory. Once validated, access to
the network is granted
Additionally, if the SIM card becomes damaged or the security compromised, it can easily be
removed and replaced with a new SIM card. Therefore, the secure connectivity can be
restored without replacing the entire handset. Similarly, if a consumer wishes to change
network provider, they can do so through replacing the relatively inexpensive SIM card rather
than the entire handset (assuming the device is not locked to a particular operator). The SIM
card also brings secondary benefits for the end user:
1. Portability: as the identity is stored on the SIM card, it can easily be moved to a new
device when the consumer upgrades or replaces their handset.
2. Memory: the SIM card provides memory for additional services such as storing
contact details/SMS. As these are stored in the SIM card memory, they can be
retained if the SIM card is moved to another device. Over time, some of this
functionality such as SMS storage and the address book has moved from the SIM card
to the device memory.
The physical SIM card itself has significantly reduced in size — driven by a combination of
smaller devices and the requirement to use the available space within a device for an
increasingly complex set of features and functionality. The 4FF SIM is the smallest possible
size whilst retaining the ability for users to confidently insert and remove them. At the same
time, the SIM itself has developed to take on more complex functions (e.g. NFC, see
definitions page for an explanation of NFC)[6].
Shows how the size of the SIM has reduced from the original credit card size 1FF (FF
stands for form factor) SIM to the 4FF SIM (or “Nano SIM”) that is widely used in new
smartphones today.
SIM cards have been made smaller over the years; functionality is independent of
format. Full-size SIM were followed by mini-SIM, micro-SIM, and nano-SIM. SIM cards are
also made to embed in devices.
All versions of the non-embedded SIM cards share the same ISO/IEC 7816 pin arrangement.
The full-size SIM (or 1FF, 1st form factor) was the first form factor to appear. It has the size
of a credit card (85.60 mm × 53.98 mm × 0.76 mm). Later smaller SIMs are often supplied
embedded in a full-size card from which they can be removed.
2.2.2 Mini-SIM
The mini-SIM (or 2FF) card has the same contact arrangement as the full-size SIM card and
is normally supplied within a full-size card carrier, attached by a number of linking pieces.
This arrangement (defined in ISO/IEC 7810 as ID-1/000) lets such a card be used in a device
that requires a full-size card – or in a device that requires a mini-SIM card, after breaking the
linking pieces. As the full-size SIM is no longer used, some suppliers refer to the mini-SIM
as a "standard SIM" or "regular SIM".
2.2.3 Micro-SIM
The micro-SIM (or 3FF) card has the same thickness and contact arrangements, but reduced
length and width as shown in the table above.
The form factor was mentioned in the December 1998 3GPP SMG9 UMTS Working
Party, which is the standards-setting body for GSM SIM cards,[19] and the form factor was
agreed upon in late 2003.
The micro-SIM was designed for backward compatibility. The major issue for
backward compatibility was the contact area of the chip. Retaining the same contact area
makes the micro-SIM compatible with the prior, larger SIM readers through the use of plastic
cutout surrounds. The SIM was also designed to run at the same speed (5 MHz) as the prior
version. The same size and positions of pins resulted in numerous "How-to" tutorials and
YouTube video with detailed instructions how to cut a mini-SIM card to micro-SIM size.
ETSI has responded to a market need from ETSI customers, but additionally there is a
strong desire not to invalidate, overnight, the existing interface, nor reduce the performance
of the cards[7].
Micro-SIM cards were introduced by various mobile service providers for the launch
of the original iPad, and later for smartphones, from April 2010. The iPhone 4 was the first
smartphone to use a micro-SIM card in June 2010, followed by many others.
2.2.4 Nano-SIM
The nano-SIM (or 4FF) card was introduced on 11 October 2012, when mobile service
providers in various countries started to supply it for phones that supported the format. The
nano-SIM measures 12.3 mm × 8.8 mm × 0.67 mm (0.484 in × 0.346 in × 0.026 in) and
reduces the previous format to the contact area while maintaining the existing contact
arrangements. A small rim of isolating material is left around the contact area to avoid short
circuits with the socket. The nano-SIM is 0.67 mm (0.026 in) thick, compared to the 0.76 mm
(0.030 in) of its predecessor. 4FF can be put into adapters for use with devices designed for
2FF or 3FF SIMs, and is made thinner for that purpose, and telephone companies give due
warning about this.
The iPhone 5, released in September 2012, was the first device to use a nano-SIM
card, followed by other handsets.
Figure No. 2.2- eSIM frontend Figure No. 2.3- eSIM backend
ESIM is a global specification by the GSMA which enables remote SIM provisioning
of any mobile device, and GSMA defines eSIM as the SIM for the next generation of
connected consumer device, and networking solution using eSIM technology can be widely
applicable to various IoT scenarios, including connected cars (smart rearview mirror, OBD,
vehicle hotspot), AI translator, Mi-Fi device, smart earphone, smart metering, tracker, DTU,
bike-sharing, advertising player, and video surveillance devices, etc.
The GSMA had been discussing the possibilities of a software-based SIM card since
2010. While Motorola noted that eUICC is geared at industrial devices, Apple "disagreed that
there is any statement forbidding the use of an embedded UICC in a consumer product." In
2012, The European Commission has selected the Embedded UICC format for its in-vehicle
emergency call service known as eCall. All new car models in the EU must have one by 2018
to instantly connect the car to the emergency services in case of an accident. Russia has a
similar plan with the GLONASS (national satellite positioning system) called ERA-
GLONASS. Singapore is seeking public opinions on introducing eSIM as a new standard as
more compatible devices enter the market.
In this section we will first explain what is meant by “Traditional SIM card approach,”
“Embedded SIM” and “Remote Provisioning.” Following these definitions, we will look at
the different device segments and the SIM solutions currently being deployed in each[10].
The traditional SIM card is a piece of hardware that a consumer can remove from the device.
The SIM card stores an operator defined profile which is programmed during manufacture.
The operator profile is the information that enables identification and authentication of the
SIM card with the selected mobile networks.
From a technical perspective, the traditional SIM is built on Smart Card (UICC)
technology, just like bank cards. The UICC is a physically secure computing device that can
be used across multiple vertical sectors including mobile telecommunications.
The UICC conforms to the specifications written and maintained by the ETSI Smart
Card Platform Project.
An embedded SIM is one which is physically integrated into the device — i.e. it cannot be
removed from the device and replaced with another SIM.
Remote Provisioning is the ability to remotely change the SIM profile on a deployed SIM
without having to physically change the SIM itself. This technology can be implemented on
any SIM form factor, including removable and soldered SIMs.
In order to achieve this, the SIM has extra memory and is therefore capable of holding
more than one operator profile (rather than only one on the traditional SIM).
When a consumer purchases a service package from a specific operator, the operator
profile is downloaded and saved onto the SIM memory. If a second operator package is
subsequently purchased, the new operator profile is downloaded and also saved to the SIM –
both operator profiles are now saved on a single SIM card and there is an ability to swap
between the two installed profiles. This swap effectively mimics the actions a user would
undertake when swapping the SIM card in a device[11].
The term eUICC3 is being used to represent a SIM card that can be remotely
provisioned.
We will now look at the different device segments to understand how the current SIM
deployments are being used:
2.4.1 Handsets/smartphones
Handsets and Smartphones currently use a traditional SIM card model i.e. a physical SIM
card that stores a single operator profile. The SIM card itself can be removed from the device
and placed into another device, transferring the identity and authentication functionality.
Alternatively, the SIM can be swapped for a new SIM card in the original device (for
example, if the handset changes ownership or the SIM card becomes damaged).
An operator is able to lock a SIM card so that it can only be used in conjunction with
a specific device (or vice versa). This is commonly used when a device is subsidised at the
time of purchased – and therefore helps to ensure the operator can recoup the subsidy.
Whilst many M2M devices use the traditional SIM card approach, M2M devices present
unique challenges to the role of the traditional SIM card. The devices are often located across
very diverse, unsupervised locations and subject to external influences such as weather (e.g.
remote sensors / vending machines), and temperature and vibration (e.g. automobiles)[12].
In such cases the SIM card needs to be protected and kept in a secure part of the
device where it will not be damaged or open to theft.
Furthermore, the lifespan of M2M devices is often tens of years and, for various
reasons, the owner may wish (or be forced) to change the operator providing the cellular
connectivity.
Replacing the SIM card would be impractical and expensive, for example:
• The SIM card being embedded in a hard to reach, protected part of a vehicle
The GSMA has worked with leading operators and SIM hardware providers from
around the world to develop a practical solution to the unique challenges in the M2M market.
The resulting GSMA Embedded SIM Specification4 enables a SIM card to be fully
embedded in an M2M device but also have Remote Provisioning functionality.
This specification ensures that the SIM card is protected from theft and external
elements by being physically integrated within the device. The Remote Provisioning aspect
allows the mobile network provider to be changed without removing the SIM (i.e. it cannot
be removed from the device, but a user can change to a new network provider if needed, or
hold multiple operator profiles if the user needs to swap between networks).
Initially designed for the automotive sector, the GSMA Embedded SIM Specification
has been widely adopted and become the de-facto approach for embedded SIMs in M2M
devices.
2.4.3 Wearables
As the form factors and functionality of the wearables segment evolve, we believe that a fully
embedded SIM card with remote provisioning will prove to be an attractive option to provide
flexibility and connectivity.
Whilst wearables are still a nascent market, these devices highlight the need for
further evolution of the SIM to accommodate smaller devices addressing new consumers
segments.
Currently, the majority of cellular enabled wearable devices use the traditional SIM
method outlined above. However, moving to an Embedded solution with Remote
Provisioning will eliminate the need for incorporating SIM housing components and help
maximise the space available in the device. Remote Provisioning would allow flexibility in
choice of mobile network operator without the need to remove the SIM.
2.5 Tablets :-
The majority of cellular capable tablets available today use the same SIM approach as is used
in handsets and smartphones – i.e. a physical SIM card that stores a single operator profile. A
user can switch between operators (if the tablet itself is not locked to an operator) but this
does require removing the SIM card and replacing it with a SIM card from the new
operator[14].
With the launch of the most recent iPad Air and iPad Mini models, Apple also introduced the
Apple SIM which uses Remote Provisioning, rather than the traditional SIM card approach.
It is important to note that the Apple SIM is a physical, removable SIM (in the same
way that traditional SIM’s can be removed from handsets or smartphones). This is not a ‘Soft
SIM’ — a ‘Soft SIM’ would have no hardware layer and all functions would be performed at
the software layer (more details of what is meant by the term Soft SIM can be found later in
this report).
Apple SIM reduces the barriers for consumers to purchase and use cellular
connectivity when the device is purchased through non-operator retail. It could encourage
consumers to purchase the, higher priced, cellular enabled tablets (rather than the versions
that only have Wi-Fi connectivity)[15].
The consumer can purchase prepaid data packages from more than one operator for
use at different times or locations and then select which package to use through the device
settings.
2.6 Summary
In this chapter, discussed the Evolution of SIM. Next chapter will study on SIM
Management.
CHAPTER 3
METHODOLOGY
In this chapter will see the SIM cards store network-specific information used to authenticate
and identify subscribers on the network. And also we will see about the background
information of SIM.
Section 3.1- Introduce the SIM Background Data, Section 3.2- Introduce the SIM
Format ICCID, Section 3.3- Introduce the International mobile subscriber identity (IMSI),
Section 3.4- Introduce the Authentication key (Ki), Section 3.5- Introduce the Location area
identity, Section 3.6- Introdus theSMS messages and contacts, Section 3.7- Summary
SIM cards store network-specific information used to authenticate and identify subscribers on
the network. The most important of these are the ICCID, IMSI, Authentication Key (Ki),
Local Area Identity (LAI) and Operator-Specific Emergency Number. The SIM also stores
other carrier-specific data such as the SMSC (Short Message Service Center) number,
Service Provider Name (SPN), Service Dialing Numbers (SDN), Advice-Of-Charge
parameters and Value Added Service (VAS) applications.
SIM cards can come in various data capacities, from 8 KB to at least 256 KB. All can
store a maximum of 250 contacts on the SIM, but while the 32 KB has room for 33 Mobile
Network Codes (MNCs) or network identifiers, the 64 KB version has room for 80 MNCs.
This is used by network operators to store data on preferred networks, mostly used when the
SIM is not in its home network but is roaming. The network operator that issued the SIM card
can use this to have a phone connect to a preferred network that is more economic for the
provider instead of having to pay the network operator that the phone 'saw' first. This does
not mean that a phone containing this SIM card can connect to a maximum of only 33 or 80
networks, but it means that the SIM card issuer can specify only up to that number of
preferred networks[16].
3.2 ICCID :-
Each SIM is internationally identified by its integrated circuit card identifier (ICCID). ICCID
is the identifier of the actual SIM card itself – i.e. an identifier for the SIM chip. Nowadays
ICCID numbers are also used to identify eSIM profiles, and not only physical SIM cards.
ICCIDs are stored in the SIM cards and are also engraved or printed on the SIM card
body during a process called personalisation. The ICCID is defined by the ITU-T
recommendation E.118 as the Primary Account Number. Its layout is based on ISO/IEC
7812. According to E.118, the number can be up to 22 digits long, including a single check
digit calculated using the Luhn algorithm. However, the GSM Phase 1 defined the ICCID
length as an opaque data field, 10 octets (20 digits) in length, whose structure is specific to
a mobile network operator.
Individual account identification number. Its length is variable, but every number
under one IIN has the same length.
o Often identical to the Mobile Subscription Identification Number (MSIN).
Single digit calculated from the other digits using the Luhn algorithm.
With the GSM Phase 1 specification using 10 octets into which ICCID is stored as packed
BCD, the data field has room for 20 digits with hexadecimal digit "F" being used as filler
when necessary. In practice, this means that on GSM SIM cards there are 20-digit (19+1) and
19-digit (18+1) ICCIDs in use, depending upon the issuer. However, a single issuer always
uses the same size for its ICCIDs.
To confuse matters more, SIM factories seem to have varying ways of delivering
electronic copies of SIM personalization datasets. Some datasets are without the ICCID
checksum digit, others are with the digit.
As required by E.118, the ITU-T updates a list of all current internationally assigned
IIN codes in its Operational Bulletins which are published twice a month (the last is No. 1163
from 1 January 2019). ITU-T also publishes complete lists: as of January 2019, the list issued
on 1 December 2018 was current, having all issuer identifier numbers before 1 December
2018.
The Ki is a 128-bit value used in authenticating the SIMs on a GSM mobile network
(for USIM network, you still need Ki but other parameters are also needed). Each SIM holds
a unique Ki assigned to it by the operator during the personalization process. The Ki is also
stored in a database (termed authentication center or AuC) on the carrier's network.
The SIM card is designed to prevent someone from getting the Ki by using the smart-
card interface. Instead, the SIM card provides a function, Run GSM Algorithm, that the
phone uses to pass data to the SIM card to be signed with the K i. This, by design, makes
using the SIM card mandatory unless the Ki can be extracted from the SIM card, or the carrier
is willing to reveal the Ki. In practice, the GSM cryptographic algorithm for computing
SRES_2 (see step 4, below) from the Ki has certain vulnerabilities that can allow the
extraction of the Ki from a SIM card and the making of a duplicate SIM card[18].
Authentication process:
1. When the mobile equipment starts up, it obtains the international mobile subscriber
identity (IMSI) from the SIM card, and passes this to the mobile operator, requesting
access and authentication. The mobile equipment may have to pass a PIN to the SIM
card before the SIM card reveals this information.
2. The operator network searches its database for the incoming IMSI and its associated
Ki.
3. The operator network then generates a random number (RAND, which is a nonce) and
signs it with the Ki associated with the IMSI (and stored on the SIM card), computing
another number, that is split into the Signed Response 1 (SRES_1, 32 bits) and the
encryption key Kc (64 bits).
4. The operator network then sends the RAND to the mobile equipment, which passes it
to the SIM card. The SIM card signs it with its Ki, producing SRES_2 and Kc, which
it gives to the mobile equipment. The mobile equipment passes SRES_2 on to the
operator network.
The SIM stores network state information, which is received from the Location Area
Identity (LAI). Operator networks are divided into Location Areas, each having a unique LAI
number. When the device changes locations, it stores the new LAI to the SIM and sends it
back to the operator network with its new location. If the device is power cycled, it takes data
off the SIM, and searches for the prior LAI.
Most SIM cards store a number of SMS messages and phone book contacts. It stores the
contacts in simple "name and number" pairs. Entries that contain multiple phone numbers and
additional phone numbers are usually not stored on the SIM card. When a user tries to copy
such entries to a SIM, the handset's software breaks them into multiple entries, discarding
information that is not a phone number. The number of contacts and messages stored depends
on the SIM; early models stored as few as five messages and 20 contacts, while modern SIM
cards can usually store over 250 contacts.
3.7 Summary
In this chapter, discussed about the see SIM cards store network-specific information used to
authenticate and identify subscribers on the network. And also we will see about the
background information of SIM.
CHAPTER 4
IMPLEMENTATION
In above Chapter see about the working of SIM and Implementation. Now we will see the
Switch to SIM to ESIM.
Section 4.1- Introduce the SIM Evolution manager, Section 4.2- Introduce the
Subscription Manager (SM), Section 4.3- Summary
However in the context of this thesis the focus is not on the form factor of the SIM but on
the management of the SIM. The SIM evolution in terms of manage-ment is still unclear and
unsure due to a lot of political and economic factors. To give a comprehensive view of the
situation a simpli ed description of the evolution.
As shown in Figure 4.1 from the current removable SIM, which is a UICC with a pre-
installed SIM or USIM application there are three evolution paths:
The embedded UICC will be switched to personal terms and other data will be provisioned
Over-the-Air. The remote provisioning is called Subscription Manage-ment. Therefore, for
the soldered UICC with Subscription Manager there is an ability to change the SIM operator.
Subscription manager is a new role played by SIM venders from the management and
manufacture of reprogrammable SIMs. The Subscription Manger is responsible for the secure
process and technology via which a MNO is able to submit a pro le to be loaded onto the
eUICC.
Currently, the traditional SIM provisioning, MNOs send the vendors a le with their
speci cations, such as the IMSI numbers of the SIM cards and SIM venders send the
personalized cards back to MNOs. MNO and SIM card vendors hold the relationship. Thus,
only two entities are involved in the supply chain before the customer takes possession of the
SIM card[19].
For the secure preparation of delivering package to the eUICC and for working with the SM-
SR, SM-DP has responsibility. SM-DP includes following key functions:
Certi cation level and functional characteristic will manage by SM-DP Managing
theMNO credentials such as IMSI, K
When a third party take on the responsibility of the SM-DP function role instead of MNO,
the security and trust relationship are critical. Each MNO will have direct relationship with
speci c SM-DP.
Secure routing and delivery of the credential package to the correct eUICC is doing by SM-
SR. Performance, reliability and scalability requirements are expected to be signi cant for the
SM-SR. SM-SR key functions include:
The SM-SR and the SM-DP shall be certi ed according to a GSMA agreed cer-ti cation
scheme and implement an access control mechanism on the request for execution of the
SMSR and the SMDP functions only to authorized security realms. Security realm of eUICC,
SM-SR and SM-DP should have counter measure against denial of services attacks.
At least one of the two mechanisms, Web Services Security standard (WS-standard)
or Mutual Authentication Transport Level Security (SSL) is required to secure the message
being sent between the entities. In the mutual authentication, the entities concerned to
authenticate each other are SM-DP to SM-SR and SM-SR to SM-DP.
4.3 Summary
In this chapter, we study on SIM Management. Next chapter will see the problem and
solution of ESIM .
APPLICATIONS
The SIM card is a technology that most of us are familiar with, present in mobile phones
since the early nineties. A SIM card is a piece of hardware which contains data that
authenticates us with our mobile operator, enabling us to connect to a network and receive a
mobile connection. However, in the future, a huge array of connected devices will connect to
mobile networks without the need for a SIM card, thanks to embedded SIM (eSIM)
technology[20].
Mobile operators are now starting to support eSIM technology, including EE in the
UK, Vodafone in Germany, and Bell in Canada. As an increasing number of devices offer
eSIM technology, we are likely to see more mobile operators offering support for the service,
particularly as it gives them an opportunity to up and cross-sell new service plans to their
customers across the consumer and enterprise markets.
eSIM technology will not just be used in smartphones, but also in a range of consumer
devices which require always-on connectivity. This includes wearables, such as smartwatches
and smart glasses, connected home devices, and computing devices such as laptops and
tablets. Technology which has traditionally connected to Wi-Fi will benefit from the wider
availability and security of cellular (4G) networks.
Businesses with a large number of mobiles used by their employees will also benefit
from the convenience of eSIM. eSIM can deliver a streamlined user experience for managing
cellular connectivity, enabling IT teams to provision and deploy new devices in a rapid and
convenient fashion. Adding new phones to a corporate mobile service, or swapping devices
between users as they join and leave a company will become much more efficient, as it can
be achieved remotely. Profiles for each user can also be personalised and data plans can be
adjusted and optimised, via eSIM remote management tools[20].
eSIM will also benefit businesses that use IoT systems, and in particular businesses
that have large scale machine-to-machine deployments such as oil and gas, power plants,
manufacturing facilities and warehouses. If, for example, a company uses thousands of
individual pieces of hardware that require mobile connectivity, it involves installing a SIM
card into each unit, which would be a painstaking task. With eSIM, businesses can remotely
connect all of this technology to a mobile network. Furthermore, if the technology is required
to operate in another country, it can be programmed remotely to connect to a local operator in
that region.
eSIM uses less space and is cheaper than traditional SIM technology. This means that
mobile connectivity can now be introduced into hardware where it was previously not are the
Finally, as with the consumer market, operators can create new data plans for
businesses as their connectivity requirements scale up. This could include new packages for
previously unconnected devices, such as connected cars or iPads, naturally resulting in new
revenue streams.
eSIM adoption by consumers and businesses will partly down to technology manufacturers
and their ability to support the new technology. According to Orange, all new smartphone
devices will support eSIM by 2030, and other types of connected technology will likely
follow suit.
Equally, it is the operators’ responsibility to ensure they can support the technology
on their networks and provide a smooth experience for business and consumer customers
looking adopt it. Operators should aim to create a new experience for onboarding customers
using eSIM, via an online portal or application. These applications can be developed
specifically for a business, whilst offering more mainstream portals for consumers.
For this customer experience to be seamless, operators must ensure that their eSIM
technology is compatible with a variety of different handset manufactures and eSIM vendors,
to ensure they can support multiple download and activation methods. This will also enable
full visibility and control for a customer service representative, who will need to provide care
and support for a digital entity.
5.4 Summary
Advantages:-
1. It is more reliable :-
We will not easily lose the eSIM , it is not necessary to cut them and they will
not wear out. On the other hand, you do not have to go to the store to catch one or even
pay for one such as when companies charged SIM cards. And in the last place, it is not
necessary for a company to send it to you, since it is integrated in your mobile.
2. Remote provisioning :-
For people who have used eSIMs for a while, the experiences have been
good. In the Google Pixel 2 is activated instantly and the networks that are supporting
the eSIM are increasing. Therefore, it is not necessary to change an old SIM, for an
eSIM.
5. Better design:-
surely, the designers will manage to create more sophisticated phones, without
borders, now that it is not necessary to remove the back cover to remove the SIM or
battery, so, they would be more attractive to the eye.
6. Network availability :-
For people who move from country to country: by not having to buy a SIM
card from a specific operator, but with the eSIM you only have to call the telephone
company and request the connection, this cost can be reduced.
Disadvantages:-
3. Piracy : -
It is easier for hackers to steal information, since we will not have a physical chip
that we can replace. However, operators should be concerned about the exchange of data,
and the configuration between the network and the mobile.
6.2 Summary
Hence we can conclude that esim is really a great technology evolved. Are you afraid of
losing your sim, or changing your sim card operator and going to those crowded shops. Then
no need to worry now? In the word of information technology, technology is developing day
by day and solving the most of problems. The technology has been developing at rapid speed
toward artificial intelligence. This article is going to solve your problem. In this article, you
will know about what is an esim, its advantage, its application in your daily life, and its scope
in the future.
It can be esteem that after twenty-five years the sim will disappear from the world.
Because the plastic sim that is being in use these days will be replaced by the new technology
of embedded sim. The capacity of eSim is also great it. This is also the reason for its bright
future. The uses of the internet are increasing day by day, and eSim supports a good internet
connection, along with sharing with others. Thus you can connect a large number of devices
with good speed. Also, it is easy to activate, manage, and handle. These all factors decide the
future of eSim and you can yourselves think which sim is better for you.
REFERENCES
[1]Germann C., (2008) SECURE SOFT SIM CREDENTIAL TRANSFER, WIPO Patent
No. WO/2008/128874.
[3]GSMA, (2011), Embedded SIM Task Force Requirements and Use Cases 1.0 Retrieved
from ftp://ftp.3gpp2.org/.
[4]GSMA, (2011), Embedded SIM Task Force Subscription Manager FAQs, Retrieved from
ftp://ftp.3gpp2.org/TSGS/Working/2011/2011-0505-TSG-S+TSG-Cre eUICC/Embedded
[5]GSMA, (2012), Remote Provisioning Architecture for Embedded UICC, DRAFT 1.34,
GSM Association.
[6] GSMA, (2011), Embedded Mobile Whitepaper Embedded Mobile Guide-lines Version 2
Retrieved http://www.gsma.com/connectedliving/wp-content/uploads/2012/04/
whitepaper embeddedmobileguidelinesv2.pdf
[7]GSMA, (2011), Embedded SIM Task Force Requirements and Use Cases 1.0 Retrieved
from ftp://ftp.3gpp2.org/.
[8]Mouly M., Pautet M.B, Foreword B.T., (1992) The GSM system for mobile
communications. Telecom Publishing, ISBN 0945592154.
[10]IUT-T, (2012) The international identi cation plan for public networks and subscriptions,
Technical Report, IUT-T Publications Retrieved from http://www.itu.int/rec/T-REC-
E.212/en
[11]Meyer U., Wetzel S., (2011) A man-in-the-middle attack on UMTS, Proceeding of the
3rd ACM workshop on Wireless security, Oct1-Oct01 Philadelphia , US.
[12]Audestad J.A., (2008) Technologies and Systems for Access and Transport Networks,
Boston US, Artech House.
[13]Eisl F., (2004) Smart Card Security Service for an Open Application En-vironment used
in Mobile Phones (Master Thesis), Department of Informa-tion Technology, Lund
University, Retrieved from Dissertations and Theses database
(http://www.iicm.tugraz.at/)
[14]Markantonakis K., Mayes K.m (2004) Smart Cards, Tokens, Security and Ap-plications,
New York, Springer, ISBN:9780387721972.
[15]Holcombe B., (Feb. 2004) Government smart card handbook, Retrieved from
http://www.smartcardalliance.org/resources/pdf/smartcardhandbook.pdf
[16]CDMA Subscriber Identity Module,(n.d.) (2012, July 6), from Wikipedia web-site,
http://en.wikipedia.org/wiki/CDMA Subscriber Identity Module
[17]Jorstad I., Thanh D. V., (2007) The Mobile Phone as Authentication Token, Technical
Report, Telenor ASA, Norway.
[18]GCMS Reprogrammable SIMs: Technology, Evolution and Im-plications (2012, Oct 25),
from consultantvalueadded website, http://consultantvalueadded.com/
[20]ETS, (1994) European digital cellular telecommunications system (Phase 2); Speci cation
of the Subscriber Identity Module - Mobile Equipment (SIM-ME) interface (GSM
11.11), European Telecommunications Standards Institute, Sophia Antipolis France,
Retrieved from http://www.etsi.org/