Interception Methods and GSM

Total Page:16

File Type:pdf, Size:1020Kb

Interception Methods and GSM SECURWARE 2016 : The Tenth International Conference on Emerging Security Information, Systems and Technologies Interception Methods and GSM Michal Sustek, Miroslav Marcanik, Milan Oplustil, Pavel Tomasek, Zdenek Urednicek Faculty of Applied Informatics Tomas Bata University in Zlin Zlin, Czech Republic Email: {sustek, marcanik, moplustil, tomasek, urednicek}@fai.utb.cz Abstract— Nowadays, eavesdropping is a real problem, inspection can be made visible, so that the employees of the whether it is about the interception of personal or corporate company knew, but it can also be done discreetly, outside information. Current technologies enable us to use a wide office hours, in which case the employees are unaware. This variety of listening devices and methods. It may not be just a systematic inspection is supported by technical facilities [4], recording on a dictaphone, but also the use of vibration. The both for the detection of interception and subsequent issue of eavesdropping is very popular today and many people and organizations work on solutions to prevent it. The work of security premises and equipment. these companies is mostly successful, but a problem still In some areas, it is mandatory to have devices for remains related to GSM (Groupe Special Mobile) interception. protecting against interception. Nowadays, with compelling This contribution provides an insight into the principles of interception devices, it is possible to see several defense against the complex problem of eavesdropping. In any technologies used in wiretaps. These technologies include a case, people have to be careful and consider what kind of contact or non-contact scanning of information from information is communicated using cell phones and other windows, or the use of GSM phones, radio interception, technologies and what are the possibilities of their interception. direct recording on a recording unit, as well as passive and active GSM interception. Keywords-eavesdropping; interception; GSM; 5G; wire- tracking. We should pay attention to protect relevant information, whether by technical means and/or by using common sense. This contribution presents the basic outline of I. INTRODUCTION eavesdropping. It presents some methods of interception and Today, the boom of information and communication countermeasure. That contains technical, regime measures technologies contributes to an increasingly connected and identification method including the defense-technical society. Modern technology surrounds us and it is, inspection. therefore, not surprising that almost every one of us owns a Section 1 presents the GSM technology in general cellular phone. We all use it to communicate information. including mobile stations, the next generation 5G networks, GSM phones are often used to communicate corporate and their architecture. Section 2 focuses on interception information of critical importance. With the development of methods and protection methods against interception. The technology on transmission, we can see the development primary part of defense against eavesdropping is a defense- options of technologies on sound capturing and interpreting technical inspection. This inspection contains physical this information back [1]. It leads to a risk of using control, radio analysis, detection of nonlinearity and other interception devices. Therefore, it is necessary to know measurements. It is used in protection of meeting places. what principles and technologies are used in the The main goal is an identification of interception devices implementation of the interception, but also how to prevent and defense against them. Devices against which one must it [2]. Eavesdropping can affect everybody in the world. protect are contact and contactless devices, unauthorized use Countermeasures exist for most eavesdropping methods. of GSM phones, radio interception and record unit. GSM However, GSM interception presents a specific issue It is interception is divided into active and passive form. The difficult to identify an offender performing the passive form active form is reliable, but it is easier to identify. On the of eavesdropping. It forms part of the problem which must other hand, the passive version of GSM interception is be dealt in the future. almost invisible, but it is not as reliable and it is useless in Defense-technical inspection is the primary method [4] case of a moving device. The resources, which are used for used to detect interception devices in a room or on other defense, are GSM jammers, security wallpaper, radio devices. This method is nondestructive for the device itself. analyzers and more. Inspection is performed on suspicion of eavesdropping II. GSM TECHNOLOGY occurrence. An authorized person performs an initial analysis of space aimed at identifying possible risks and the GSM technology is based on ETSI (European type of interception device. In an organization, the Telecommunications Standards Institute) standards [8]. The Copyright (c) IARIA, 2016. ISBN: 978-1-61208-493-0 211 SECURWARE 2016 : The Tenth International Conference on Emerging Security Information, Systems and Technologies primary document is standard "GSM - Phase first". In the The signal is magnified with redundant bits which are development of this technology, these were several GSM added to information binary string. It leads to increasing phases until today's generation was created (Long Term error detection and correction capabilities. A block, the size Evolution, hereinafter, the LTE [8]) and for future of which is 456 bits, is divided into 8 groups of size 57 bits generations 5G. The GSM network consists of mobile each. These groups are interleaved with the last four groups stations, the base station subsystem, a network and of the previous block and with the first four groups of the switching subsystem and operational subsystems. following block. Subsequently, we will define several types of GSM services, B. 5G Architecture such as telematics services, advanced services, additional services, the Subscriber Identity Module (SIM) card and One of the main ideas of designing 5G networks [6] is a phone. separation of internal and external users into two segments. GSM coverage area is divided into bundles. Each bundle This approach aims to avoid losses resulting from signal consists of 7 cells. Inside each cell, there is a base station passing through the walls, or at least minimize it. It will be assigned to a particular group of channels and provides realized with a complex antenna system and massive communication with mobile subscribers. In the event when Multiple Input/Multiple Output (MIMO) technology, which the area of all the cells is equal to at least the interference will be deploying large antenna arrays with tens or hundreds area, it is possible to use the same channel group in all cells of antenna segments. While the most common MIMO [6]. technologies serve 2 to 4 antennas, the goal of massive To obtain better properties of the system it is possible to MIMO systems is to increase user options by using antenna use sectorization. The entire GSM area is divided into a arrays. Outdoor base stations will be equipped with an smaller number of cells. This leads to the need to increase extensive antenna array of antenna elements around the the number of base stations because the cells are smaller, cells. These cells will be connected by optical fibers with but the covered area has the same size. base stations. Outdoor users are equipped with a limited The number of required channels is not changing but the number of antenna elements, but they can work with others number of base stations growths from 7 to 21. Their number in an extensive virtual network. An antenna array will be can be reduced again to 7 by placing three separate installed outside buildings and will communicate with directional antennas at the intersection of three neighboring external base stations. cells. One can use a mobile architecture where internal users need to communicate only with the internal access points A. Mobile station with antenna arrays; then, one can use technologies for The GSM user communicates using mobile stations, short-range communication (Wi-Fi [6], the ultra-wide band which means not only the receiver/transmitter (cell phone), [6], mm-wave communications [6]). but also a SIM module. The SIM card is used as unique 5G network architecture should also contain identifier for user within the network. heterogeneous macrocells, microcells, small cells, and Source coding performs of the encoder source, which transmitters. To ensure adequate coverage for users who digitizes the analog signal and the digital side eliminates move too quickly, it will also work with mobile femtocells, redundant data contained in the audio. The main goal of this which combine the concept of mobile relays and femtocells step is to reduce the data flow to a minimum since each [6]. In Figure 1, one can see the planned architecture for 5G channel has its limitations. For removing these frequencies, networks. a parametric method is used. The signal is divided into 20 msec segments. Then it is used to each segment LPC (Linear Predictive Coding) filter and LRP (Long-Range fading Prediction) to encryption.The resulting signal is composed of 188 bits, which carry information about calling and 72 bits, which carry information about filters. These two parts make up the frame of length 260 bits. There are 50 of these frames in one second, therefore, the bit rate is 13kbps. To minimize unwanted signals, such as noise,
Recommended publications
  • Prospects for Improving Competition in Mobile Roaming
    WIK Wissenschaftliches Institut für Kommunikationsdienste GmbH Prospects for improving competition in mobile roaming Ulrich Stumpf Paper prepared for the 29th TPRC 2001, 27 - 29 October 2001, Alexandria, Va. Prospects for improving competition in mobile roaming I Contents Abstract II 1 Introduction 1 2 Basics of international roaming 2 3 Supply-side of wholesale roaming markets 7 3.1 Small number of suppliers and high market concentration 8 3.2 Spectrum scarcity and second-mover disadvantages 9 3.3 Imperfect substitutes to wholesale roaming 12 3.4 Transparency of competitors’ IOTs 13 4 Demand-side of wholesale roaming markets 13 4.1 Lack of competitive pressure in downstream retail roaming markets 14 4.2 Customer ignorance, insufficient control over network selection, and demand externalities 17 5 Conclusions and implications for application of non-discrimination rules 21 References 23 Prospects for improving competition in mobile roaming II Abstract The ability to make international roaming calls is of increasing importance to customers. However, there are various complaints that prices of retail roaming are intransparent, rigid and at levels that are unrelated to the cost of carriage. The focus if the paper is on wholesale roaming, which is the prime determinant of retail roaming prices. The paper analyses the structural conditions of wholesale roaming markets that have impaired incentives to competition, namely (1) high combined market share of the two leading operators combined with second mover disadvantages, and (2) demand externalities associated with customer ignorance and lack of control over network selection. The paper argues that a number of developments are under way that are likely to modify this situation in the future.
    [Show full text]
  • Cellular Technology.Pdf
    Cellular Technologies Mobile Device Investigations Program Technical Operations Division - DFB DHS - FLETC Basic Network Design Frequency Reuse and Planning 1. Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. 2. It uses radio frequencies (radio channels) over and over again throughout a market with minimal interference, to serve a large number of simultaneous conversations. 3. This concept is the central tenet to cellular design and is called frequency reuse. Basic Network Design Frequency Reuse and Planning 1. Repeatedly reusing radio frequencies over a geographical area. 2. Most frequency reuse plans are produced in groups of seven cells. Basic Network Design Note: Common frequencies are never contiguous 7 7 The U.S. Border Patrol uses a similar scheme with Mobile Radio Frequencies along the Southern border. By alternating frequencies between sectors, all USBP offices can communicate on just two frequencies Basic Network Design Frequency Reuse and Planning 1. There are numerous seven cell frequency reuse groups in each cellular carriers Metropolitan Statistical Area (MSA) or Rural Service Areas (RSA). 2. Higher traffic cells will receive more radio channels according to customer usage or subscriber density. Basic Network Design Frequency Reuse and Planning A frequency reuse plan is defined as how radio frequency (RF) engineers subdivide and assign the FCC allocated radio spectrum throughout the carriers market. Basic Network Design How Frequency Reuse Systems Work In concept frequency reuse maximizes coverage area and simultaneous conversation handling Cellular communication is made possible by the transmission of RF. This is achieved by the use of a powerful antenna broadcasting the signals.
    [Show full text]
  • Gsm Architecture Protocols and Services Pdf
    Gsm Architecture Protocols And Services Pdf Colin begrimes her taffrails lyrically, transplantable and submarginal. Untended and inferable Rodolphe instancing her weathercocks navel rewarms and wreak mindfully. Governmental Joshua usually stumbles some Charon or accrete numbly. Send email with URL link in a PDF or PostScript file and your Zotero. Full cellular and gsm architecture protocols services pdf robot using spreadspectrum systems were local pn code of users can be realized like motorola who wants it handles radio link with other variables beyond those in. GSM Tutorialspoint. Every mobile application. Keep productivity up of access technologies gsm operates in trust does cdma? Protocol architecture and providers in. In 2000 the adjacent commercial GPRS services were launched and run first. Sdp does not reachable, it sends an accident, our intention to. Wap services at bourns power control channels. Bursts that has a protected environment concept of frequency hopping and robustness, a par with great commercial opportunity exists for different elements. It sends a WSP request tap the Gateway. The media gateway may use mobile station controller maintains an ruip becomes available today when transmitting and always integrated with essential components. Supplementary isdn services like telnet exchanges and sensorsequipped with. Originally designed by gsm pdf becomes inaudible. Unexpected call control parameters. Mvno architecture and gsm protocols services pdf wider bandwidth over nbma subnetworks. Wireless lans is a tmsi at frequencies to send sequence system for future development in this name server. CLP25 IoT Big data Framework Architecture v20 GSMA. Appreciate the OSI protocol model and the GSM air interface protocols Describe the methods of speech and error.
    [Show full text]
  • Implementing-Roaming.Pdf
    Oracle® Communications Billing and Revenue Management Implementing Roaming Release 12.0 E51027-03 May 2021 Oracle Communications Billing and Revenue Management Implementing Roaming, Release 12.0 E51027-03 Copyright © 2017, 2021, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant
    [Show full text]
  • Gsm/Gsm Quick Guide.Htm Copyright © Tutorialspoint.Com
    GGSSMM -- QQUUIICCKK GGUUIIDDEE http://www.tutorialspoint.com/gsm/gsm_quick_guide.htm Copyright © tutorialspoint.com GGSSMM -- OOVVEERRVVIIEEWW What is GSM? If you are in Europe or Asia and using a mobile phone, then most probably you are using GSM technology in your mobile phone. GSM stands for Global System for Mobile Communication. It is a digital cellular technology used for transmitting mobile voice and data services. The concept of GSM emerged from a cell-based mobile radio system at Bell Laboratories in the early 1970s. GSM is the name of a standardization group established in 1982 to create a common European mobile telephone standard. GSM is the most widely accepted standard in telecommunications and it is implemented globally. GSM is a circuit-switched system that divides each 200 kHz channel into eight 25 kHz time- slots. GSM operates on the mobile communication bands 900 MHz and 1800 MHz in most parts of the world. In the US, GSM operates in the bands 850 MHz and 1900 MHz. GSM owns a market share of more than 70 percent of the world's digital cellular subscribers. GSM makes use of narrowband Time Division Multiple Access TDMA technique for transmitting signals. GSM was developed using digital technology. It has an ability to carry 64 kbps to 120 Mbps of data rates. Presently GSM supports more than one billion mobile subscribers in more than 210 countries throughout the world. GSM provides basic to advanced voice and data services including roaming service. Roaming is the ability to use your GSM phone number in another GSM network. GSM digitizes and compresses data, then sends it down through a channel with two other streams of user data, each in its own timeslot.
    [Show full text]
  • GSM 08.08 TECHNICAL June 2000 SPECIFICATION Version 5.12.0
    GSM GSM 08.08 TECHNICAL June 2000 SPECIFICATION Version 5.12.0 Source: SMG Reference: RGTS/SMG-020808QR9 ICS: 33.020 Key words: Digital cellular telecommunications system, Global System for Mobile communications (GSM) R GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS Digital cellular telecommunications system (Phase 2+); Mobile-services Switching Centre - Base Station System (MSC - BSS) interface; Layer 3 specification (GSM 08.08 version 5.12.0 Release 1996) ETSI European Telecommunications Standards Institute ETSI Secretariat Postal address: F-06921 Sophia Antipolis CEDEX - FRANCE Office address: 650 Route des Lucioles - Sophia Antipolis - Valbonne - FRANCE Internet: [email protected] - http://www.etsi.org Tel.:+33492944200-Fax:+33493654716 Copyright Notification: No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. © European Telecommunications Standards Institute 2000. All rights reserved. Page 2 GSM 08.08 version 5.12.0 Release 1996: June 2000 Whilst every care has been taken in the preparation and publication of this document, errors in content, typographical or otherwise, may occur. If you have comments concerning its accuracy, please write to "ETSI Standards Making Support Dept." at the address shown on the title page. Page 3 GSM 08.08 version 5.12.0 Release 1996: June 2000 Contents Intellectual Property Rights............................................................................................................................9 Foreword........................................................................................................................................................9
    [Show full text]
  • • 6~~ Syniverse~ • Technologies
    •~ r= ~• . • 6~~ Syniverse~ • Technologies Presentation to the FCC Roaming Information 1 Simplifying complexity GSM Process for New Services Delivering possibilities Development of new service Analyze impact on network and billing Implement required modifications to all process and procedures What is the GSM Industry view on LTE? It is just another new service 2 Simplifying complexity Delivering possibilities GSM Association 3 Simplifying complexity About the GSMA Delivering possibilities The GSMA is the global trade association representing more than 740 GSM mobile operator Members across 219 countries and territories around the world. • In addition, over 219 Associate Members support the Association’s Initiatives as key partners. • Structure of the GSMA is as follows: − GSMA Board – member are selected from the various organizations and serve two year term. − Strategy Committee – identifies strategic initiatives for the benefit of the entire mobile industry, consists of board members and is supported by GSMA Officers. − Executive Management Committee – drives the GSMA’s operational activities in the areas of products, services and technology. − Working Groups – operator and supplier members oversee the practical aspects of running mobile services. 4 Simplifying complexity GSMA Organization Delivering possibilities GSMA Board GSM Association (Full Members Only) Executive Management General Membership GSMA Regional Committee Meeting Interest Groups (Full Members Only) Jerry Easom Associate Membership Reference Group Jerry Easom GSMA Working
    [Show full text]
  • Technical Architecture Alternatives for OC Roaming Hubbing
    GSM Association UNRESTRICTED Official Document IR.80 Technical Architecture Alternatives for Open Connectivity Roaming Hubbing Model 1.2 25 February 2009 This is a non-binding permanent reference document of the GSM Association. Security Classification Category (see next page) Unrestricted X UNRESTRICTED VERSION 1.2 Page 1 of 89 GSM Association UNRESTRICTED Official Document IR.80 Security Classification - UNRESTRICTED This document is subject to copyright protection. The GSM Association (“Association”) makes no representation, warranty or undertaking (express or implied) with respect to and does not accept any responsibility for, and hereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document. The information contained in this document may be subject to change without prior notice. Access to and distribution of this document by the Association is made pursuant to the Regulations of the Association. Copyright Notice Copyright © 2009 GSM Association GSM™ and the GSM Logo™ are registered and the property of the GSM Association. Antitrust Notice The information contain herein is in full compliance with the GSM Association’s Antitrust Compliance policy. Document History Version Date Brief Description 0.0 4 May 2007 Outline version 0.1 10 May 2007 First combined form of alternatives 0.2 19 May 2007 Inclusion of SUA/SCTP architecture alternative Temporary removal of Dummy GT call flow diagrams according to request from submitter 0.3 21 May 2007 Corrections based on 21 May 2007 conference call 0.4 25 May 2007 Corrections and additions from submitters, Typographical corrections 0.5 28 June 2007 Corrections/additions to MTP Direct routing Additions to SUA/SCTP Merge of Dummy GT and Alias GT to Alias GT Addition of section on Inter-operability 0.6 20 August 2007 Modifications as a result of action items from IRHG#2 and 3 0.7 20 Sept.
    [Show full text]
  • Mobile Coverage and Its Impact on Digital Financial Services Leon Perlman1 and Michael Wechsler2
    Mobile Coverage and its Impact on Digital Financial Services Leon Perlman1 and Michael Wechsler2 ABSTRACT3 Digital Financial Services (DFS) is a relatively recent mobile-centric financial inclusion innovation in developing countries. Using ubiquitous mobile phones as the means of service access, DFS provides the unbanked and underserved - many of whom live in rural areas - with access to basic financial services provided by banks and non- banks such as mobile network operators and third party DFS providers (DFSPs). With mobile phones as the primary access mechanism for services, access to DFS is highly dependent upon the degree and quality of mobile coverage offered by mobile network operators (MNOs). User interfaces (UIs) for access to DFS are mostly dependent on the type of mobile coverage available which in many cases in the developing world is via slower (narrowband) second generation (2G) GSM technology. Faster broadband third (3G) and fourth generation (4G) mobile coverage is available in most developing world countries, but is mostly limited to urban and peri-urban areas and along national road corridors. Our study finds that the type of mobile coverage provided has a significant effect on the DFS UI and type of mobile phone that can be used for DFS access. Feature phones and Unstructured Supplementary Service Data (USSD) transactions continue to be the choice for the vast majority of (mobile money) users. Faster mobile broadband technologies are optimal for smartphone use – or hybrid smartphones in feature phone format - which
    [Show full text]
  • IMPLEMENTATION of GSM SERVICES for MOBILE VIRTUAL NETWORK OPERATORS Master`S Thesis
    TALLINN UNIVERSITY OF TECHNOLOGY Faculty of Information Technology Department of Computer Engineering IAG70LT Jana Koltsova 132457 IMPLEMENTATION OF GSM SERVICES FOR MOBILE VIRTUAL NETWORK OPERATORS Master`s thesis Supervisor: Vladimir Viies Associate professor Tallinn 2014 Autorideklaratsioon Olen koostanud antud töö iseseisvalt. Kõik töö koostamisel kasutatud teiste autorite tööd, olulised seisukohad, kirjandusallikatest ja mujalt pärinevad andmed on viidatud. Käesolevat tööd ei ole varem esitatud kaitsmisele kusagil mujal. Autor: Jana Koltsova _____________ _____________ (kuupäev) (allkiri) 2 Annotatsioon Lõputöö eesmärgiks on kirjeldada viis GSM teenuse juurutamiseks virtuaalsetele mobiilsidevõrgu operaatoritele ja võimalus kasutada saadud teadmisi reaalses ettevõttes (Top Connect). Uuring näitab kuidas peab olema arhitektuur ehitatud, vastavalt GSM standardidele ja kuidas GSM teenused võivad olla pakutud mobiilsidevõrgu operaatori poolt. Selle eesmäri saavutamiseks on vaja mõista GSM geograafilise võrgustiku, GSM arhitektuuri ja selle komponente. Lisaks on vaja uurida, milliseid teenuseid saab rakendada, vastavalt GSM standarditele ja mis tüüpi mobiilsidevõrgu operaatorid pakuvad neid. Parim viis neid teenused pakkuda miljonite kasutajate jaoks, on luua Mobile Virtual Network Operator arhitektuur. Paari aasta jooksul MVNO populaarsus on kiiresti kasvanud. Need võivad pakkuda sama GSM teenuseid abonentidele, mis varem ainult klassikalise mobiilsideoperaatorit võiksid. Töös pakkutakse üks võimalik viis, kuidas virtuaalsed mobiilisidevõrgu
    [Show full text]
  • Mobile and PSTN Communication Services: Competition Or Complementarity?”, OECD Digital Economy Papers, No
    Please cite this paper as: OECD (1995-01-01), “Mobile and PSTN Communication Services: Competition or Complementarity?”, OECD Digital Economy Papers, No. 13, OECD Publishing, Paris. http://dx.doi.org/10.1787/237485605680 OECD Digital Economy Papers No. 13 Mobile and PSTN Communication Services COMPETITION OR COMPLEMENTARITY? OECD GENERAL DISTRIBUTION OCDE/GD(95)96 MOBILE AND PSTN COMMUNICATION SERVICES: COMPETITION OR COMPLEMENTARITY? ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT Paris 1995 COMPLETE DOCUMENT AVAILABLE ON OLIS IN ITS ORIGINAL FORMAT FOREWORD These papers were prepared in the context of the work programme of the Committee for Information, Computer and Communications Policy. They were considered by the Working Party on Telecommunications and Information Services Policies in 1992 and recommended for derestriction by the Committee in 1993. Part A of the report was prepared by Dr. Tim Kelly of the Secretariat, and Part B was prepared by Messrs. Derek Laval and Kristen Hansen of the consultancy firm Schema (United Kingdom). The information contained in this paper is valid as of the end of 1992. However, significant changes have occurred in the mobile sector since then. Nevertheless, much of the discussion and arguments in the report remain valid and, for this reason, it has been viewed as useful to make the document available to the general public. Copyright OECD, 1995 Applications for permission to reproduce or translate all or part of this material should be made to: Head of Publications Service, OECD, 2 rue André-Pascal, 75775 Paris Cedex 16, France. 2 TABLE OF CONTENTS Part A MOBILE AND PSTN COMMUNICATION SERVICES: COMPETITION OR COMPLEMENTARITY? Page I.
    [Show full text]
  • 5G, the Internet of Things (Iot) and Wearable Devices What Do the New Uses of Wireless Technologies Mean for Radio Frequency Exposure? September 2017
    5G, the Internet of Things (IoT) and Wearable Devices What do the new uses of wireless technologies mean for radio frequency exposure? September 2017 COPYRIGHT © 2017 GSMA 5G, THE INTERNET OF THINGS AND WEARABLE DEVICES: RADIO FREQUENCY EXPOSURE About the GSMA The GSMA represents the interests of mobile operators worldwide, uniting nearly 800 operators with more than 300 companies in the broader mobile ecosystem, including handset and device makers, software companies, equipment providers and internet companies, as well as organisations in adjacent industry sectors. The GSMA also produces industry-leading events such as Mobile World Congress, Mobile World Congress Shanghai, Mobile World Congress Americas and the Mobile 360 Series of conferences. For more information, please visit the GSMA corporate website at www.gsma.com Follow the GSMA on Twitter: @GSMA and @GSMAPolicy 5G, THE INTERNET OF THINGS AND WEARABLE DEVICES: RADIO FREQUENCY EXPOSURE Contents 1. CONTEXT 2 2. GENERAL QUESTIONS 4 3. QUESTIONS AND ANSWERS RELATED TO 5G 12 4. QUESTIONS AND ANSWERS RELATED TO INTERNET OF THINGS (IOT) 20 5. QUESTIONS AND ANSWERS RELATED TO WEARABLE DEVICES 24 RESOURCES FOR ADDITIONAL INFORMATION/ABBREVIATIONS 28 Context | 1 5G, THE INTERNET OF THINGS AND WEARABLE DEVICES: RADIO FREQUENCY EXPOSURE 1 Context 2 | Context 5G, THE INTERNET OF THINGS AND WEARABLE DEVICES: RADIO FREQUENCY EXPOSURE There is significant interest in new applications of New applications, such as 5G, wireless IoT and wireless technology with particular focus on Fifth wearable devices, will be designed to comply with Generation (5G) mobile technology; the Internet of existing exposure limits. The international exposure Things (IoT), also known as machine-to-machine guidelines have been developed as a result of the work (M2M) communications; and wearable devices.
    [Show full text]