Blockchain Powered eSIM

0.0.5

Blockchain and eSIM are disruptive technologies in the mobile industry facing resistance from established players. Despite this, they are slowly being adopted due to innovation and companies that see the value in change. Both technologies have a secure future and it's only a matter of time before eSIMs become the norm, with blockchain helping to drive their adoption.

This is the 5th article/week 5 progress report of my journey at EthIndia Fellowship 3.0, EIF3.0 building Blockchain Powered eSIM.

Here’s the link of the fourth article of this series discussing how the telecom industry can enhance its protocols, algorithms using Zero Knowledge Proofs and explores how this technology can be incorporated into this project.

And this article is a thesis on Blockchain Powered eSIM.

Prerequisite

1. eSIM

An eSIM(embedded-SIM) is a form of programmable SIM card that is embedded directly into a device.

Instead of an integrated circuit located on a removable universal integrated circuit card (UICC), typically made of PVC, an eSIM consists of software installed onto an eUICC chip permanently attached to a device.

Once an eSIM carrier profile has been installed on an eUICC, it operates the same as a physical SIM, complete with a unique ICCID and network authentication key generated by the carrier.

The eSIM standard was first released in 2016; since that point, eSIM has begun to replace physical SIM in domains including cellular telephony.

Since 2010, the GSMA had been discussing the possibility of a software-based SIM.

To avoid any confusion, suggesting the following way of looking at the definition:

"eSIM is the whole service - SIM + eUICC + platform,
eUICC is the software that allows provisioning
"

And the difference

As you can see Removable cards can be divided into two.
As you can see Removable cards can be divided into two.

So,

  • An eSIM, or embedded SIM, is a programmable SIM card that is built into a device and can be remotely activated and provisioned.

  • It's not a software in the traditional sense, but it can be thought of as an integrated circuit that contains firmware and data storage.

  • The structure of an eSIM is similar to a traditional SIM card, but it's an electronic chip embedded in the device's hardware.

  • eSIMs have a unique identifier, which is similar to a traditional SIM card's ICCID, and can store multiple network profiles that can be activated based on the user's preference.

  • eSIMs work by using remote provisioning to download and install network profiles over the air (OTA).

  • The remote provisioning process involves several steps, including registration, download, activation, and management.

  • eSIMs provide enhanced security features, such as encryption and authentication, to protect user credentials and prevent fraud.

  • eSIM technology provides a flexible and secure way to activate and manage network services on a device without the need for physical SIM cards.

  • eSIMs are an important technology for enabling cellular connectivity on a wide range of devices, including smartphones, tablets, wearables, and IoT devices.

2. Blockchain

  • Blockchain is a type of shared database that differs from a typical database in the way that it stores information; blockchains store data in blocks that are then linked together via cryptography.

  • As new data comes in, it is entered into a fresh block. Once the block is filled with data, it is chained onto the previous block, which makes the data chained together in chronological order.

  • Different types of information can be stored on a blockchain, but the most common use so far has been as a ledger for transactions.

  • In Bitcoin’s case, blockchain is used in a decentralized way so that no single person or group has control—rather, all users collectively retain control.

  • Decentralized blockchains are immutable, which means that the data entered is irreversible. For Bitcoin, this means that transactions are permanently recorded and viewable to anyone.

  • Ethereum is a decentralized, open-source blockchain with smart contract functionality.

  • Ethereum enables the smart contracts and applications built on its blockchain to run smoothly without fraud, downtime, control, or any third-party interference.

3. Account Abstraction

  • Account abstraction is the idea of decoupling the relationship between the signer and the account by making every account a smart contract that can contain its own logic.

  • Account abstraction is a new way of managing accounts in Ethereum beyond the current externally owned account (EOA) system.

  • EOAs have limitations in terms of key management, access control, gas payment, efficiency, and privacy.

  • Account abstraction allows for more flexible logic that can be controlled by code, opening up new possibilities.

  • Use cases for account abstraction include social recovery, dead man switch, and more complex access control policies.

4. Zero Knowledge Proofs

A way to prove bound on the amount of knowledge released in an interaction.
A zero-knowledge proof (ZKP) is a method of proving the possession of certain information without revealing that information, or any other information beyond the fact that the information exists and is held by the prover. In other words, a ZKP allows one party (the prover) to prove to another party (the verifier) that a statement is true, without revealing any information beyond the fact that the statement is true.

So combining these two, Blockchain and Telecom tech. I’m presenting you all a thesis on Blockchain Powered eSIM.

5. GSMA

GSMA refers to the Groupe Speciale Mobile Association, a trade body that represents the interests of mobile network operators worldwide. The organization was founded in 1987 and is headquartered in London, UK. The GSMA represents over 750 of the world's mobile operators, as well as more than 300 companies in the broader mobile ecosystem, including handset and device makers, software companies, equipment providers, and internet companies. The organization works to promote the growth of the mobile industry and to ensure that mobile technologies and services are made available to as many people as possible. Some of its key initiatives include the Mobile World Congress, a major industry event held annually, and various programs and initiatives aimed at driving the adoption and development of new mobile technologies and services.

Abstract

The traditional method of associating a mobile number with a physical SIM card has been a bottleneck for the growth of the telecom industry. With the advancement in technology and the rise of cryptocurrencies, This project aims to couple a mobile number with a crypto wallet through an eSIM. This process leads to linking a crypto wallet with an individual in a similar manner as a mobile number is linked to the corresponding person. By implementing the concept of account abstraction, a virtual account can be established, which will serve as a purely cryptographic foundation layer. This approach is particularly beneficial for users who are not familiar with crypto wallets and the tech it revolves around. Enabling secure access to the user's crypto wallets without exposing their private keys. This eSIM will provide cryptographic identity services and be backed by zero-knowledge proofs, ensuring privacy and security of the user's data. This paper explores the feasibility of this concept and discusses how it can provide a carrier app to network carrier providers and a Local Profile Assistant (LPA) to mobile OEM and end-users. The paper also discusses how the activation of the eSIM will be happening through the Ethereum blockchain and how all the details will be sent to the Ethereum blockchain using a smart contract.

Introduction

The telecom industry has grown rapidly over the past few decades, and the demand for mobile phones has increased significantly. However, the traditional method of associating a mobile number with a physical SIM card has been a bottleneck for the growth of the telecom industry. The process of acquiring a SIM card is cumbersome and time-consuming, and it requires the users to provide personal information to the network carrier providers. Moreover, the use of physical SIM cards also poses a security risk as they can be easily lost or stolen. Blockchain technology has the potential to revolutionize the telecom industry by introducing a new concept called Blockchain Powered eSIM.

Blockchain Powered eSIM is a concept that aims to associate a mobile number with a crypto wallet through an eSIM. An eSIM is a digital SIM that can be programmed with multiple mobile network profiles. The eSIM can be embedded in the mobile device during the manufacturing process, eliminating the need for a physical SIM card. The eSIM can be activated remotely, making it more convenient for the users.

Blockchain technology will provide a secure and decentralized platform for the activation and management of the eSIM. The activation of the eSIM will be happening through the Ethereum blockchain, and all the user details will be sent to the Ethereum blockchain using a smart contract. The use of blockchain technology will also eliminate the need for the network carrier providers to store the user's personal information, reducing the risk of data breaches.

Existing eSIM Technologies and Their Limitations

Embedded SIM (eSIM) technology has been around for a few years and has gained popularity in various consumer electronics devices such as smartphones, tablets, and wearables. The eSIM technology eliminates the need for a physical SIM card and provides several benefits such as remote provisioning and improved security.

However, the existing eSIM technologies have some limitations that need to be addressed. One of the major limitations is the lack of interoperability between eSIMs from different vendors, which can lead to vendor lock-in and limit consumer choice. Another limitation is the limited memory capacity of the eSIMs, which can limit the number of profiles that can be stored on the eSIM.

Furthermore, traditional eSIMs rely on centralized entities such as mobile network operators (MNOs) for the provisioning and management of the eSIM profiles. This centralization creates a single point of failure and increases the risk of security breaches, as the centralized entity has access to sensitive user data.

To address these limitations, Proposing Blockchain Powered eSIM as a potential solution. Blockchain-powered eSIMs leverage the decentralized nature of blockchain to provide improved security, privacy, and interoperability. By eliminating the need for a centralized entity for profile management, blockchain-powered eSIMs can also reduce the risk of security breaches and increase user control over their data.

Personas

The following personas are involved in this project:

  • End-Users: Users of the eSIM solution who want a secure and seamless way to access decentralised applications and services.

  • Mobile Operators: Companies responsible for managing the eSIM profiles and provisioning the eSIMs to subscribers(end-users).

  • Device Manufacturers: Companies responsible for integrating the eSIM into their devices.

  • Regulatory Bodies: Government agencies and industry organizations responsible for ensuring the eSIM solution complies with relevant regulations and standards.

  • Developers: Developers responsible for building and maintaining the blockchain infrastructure that powers this eSIM solution.

Deliverables

This project aims to deliver:

  1. Carrier App to mobile network operators
    Mobile network operators creates carrier-branded apps to manage their profiles directly. This includes downloading and deleting subscription profiles owned by the carrier, as well as switching to a profile owned by a carrier.
    The carrier app will be used to manage the network profiles and activate the eSIM remotely. The carrier also provides real-time information on the usage of the network and the billing details. The use of blockchain technology can ensure that the information provided by the carrier app is accurate and transparent.

  2. LPA to mobile OEM(Original equipment manufacturer) and end users
    The LPA will be used by end users to manage their profiles including the management of:

    1. Activation of the eSIM remotely

    2. Blockchain network they are connected to

    3. Crypto wallets they are associated with.

    4. The LPA can also provide real-time information on the usage of the networks and apps that will be used from this service(a system level wallet).

Design and Architecture

Embedded SIM (eSIM, or eUICC) technology allows mobile users to download a carrier profile and activate a carrier's service without having a physical SIM card.

It's a global specification driven by the GSMA that enables remote SIM provisioning (RSP) of any mobile device.

Starting with Android 9, the Android framework provides standard APIs for accessing eSIM and managing subscription profiles on the eSIM.

These eUICC APIs enable third parties to develop their own carrier apps and local profile assistants (LPAs) on eSIM-enabled Android devices.

LPA

The LPA is a standalone, system app that should be included in the Android build image. Management of the profiles on the eSIM is generally done by the LPA, as it serves as a bridge between the SM-DP+ (remote service that prepares, stores, and delivers profile packages to devices) and the eUICC chip.

LPA-APK & LPA-UI or LUI

The LPA APK can optionally include a UI component, called the LPA UI or LUI, to provide a central place for the end user to manage all embedded subscription profiles.

The Android framework automatically discovers and connects to the best available LPA, and routes all the eUICC operations through an LPA instance.

Coupling the crypto wallet and the eSIM unique ID(EID) together in the LPA APK

The LPA app will interact with the eUICC chip on the device, which stores the eSIM profile, and with the crypto wallet.

One way to couple the eSIM unique ID with the crypto wallet is to associate the eSIM unique ID with the user's crypto wallet address.

When a user initiates a transaction, the LPA app can retrieve the eSIM unique ID and the associated wallet address, and use them to securely authenticate and authorize the transaction. The LPA app can also use the eSIM unique ID as an identifier for the user, which can be useful for tracking transactions.

To implement this functionality,

We can add an API to the LPA app that allows the user to associate their eSIM unique ID with their crypto wallet address. We will need to securely store this association on the device and make sure that it cannot be accessed by unauthorized parties.

The LPA app can then use this association to authenticate and authorize transactions.

When a transaction is initiated, the LPA app can prompt the user to authenticate themselves using biometric authentication or another secure method. Once the user is authenticated, the LPA app can retrieve the eSIM unique ID and the associated wallet address, and use them to sign and authorize the transaction.

Note: There are lots of additional security considerations and regulation concerns when coupling telecom and blockchain technologies and all of them are only noted for now, so it's important to thoroughly test the implementation and ensure that it is secure.

High level Architecture of deliverables of Blockchain Powered eSIM: LPA and Carrier App
High level Architecture of deliverables of Blockchain Powered eSIM: LPA and Carrier App

The process of coupling an EID with a crypto wallet in the LPA (Local Profile Assistant) in Android eSIM development typically involves the following high-level steps:

  1. EID Retrieval: Retrieve the EID of the eSIM that will be used for the crypto wallet.

  2. User Authentication: Authenticate the user before proceeding with the coupling process.

  3. Wallet Creation: Create a crypto wallet within the LPA.

  4. Key Management: Generate a private key and a corresponding public key for the crypto wallet.

  5. Key Storage: Store the private key securely in the LPA.

  6. EID and Key Association: Associate the EID of the eSIM with the private key of the crypto wallet in the LPA.

  7. Blockchain Network Selection: Associate this wallet with a blockchain network and allow management of multiple network within the LPA.

  8. Wallet Activation: Activate the crypto wallet within the LPA.

  9. Testing and Verification: Test and verify the coupling of the EID with the crypto wallet to ensure that it works as intended.

The specific implementation details of these steps will depend on the particular eSIM and LPA being used, as well as the specific requirements of the crypto wallet being integrated.

The "Blockchain Network Selection" layer would allow the user to choose between different blockchain networks. Once a network is selected, the wallet functionality layer would be updated to reflect the selected network. This could include changing the address format, updating the available tokens/coins, and adjusting the network fees.

The user interface layer would provide the user with a way to easily switch between different networks. This could be done through a dropdown menu or a button that allows the user to select the desired network.

Conclusion

Blockchain Powered eSIM is a revolutionary concept that aims to revolutionize the telecom industry. The use of blockchain technology can provide a secure and decentralized platform for the activation and management of the eSIM. The activation of the eSIM will be happening through the blockchain, and all the details will be sent to the blockchain using a smart contract. The use of Blockchain Powered eSIM can provide a carrier app to network carrier providers and a Local Profile Assistant (LPA) to mobile OEM and end-users, where end-users can access decentralized applications with default app lock methods. This concept can provide a convenient and secure way of associating a mobile number with a crypto wallet through an eSIM.

Future Perspective

In the future, it is possible that we may no longer need mobile devices with large storage capacities, Decentralized storage solutions can be utilized to store all types of files that are typically saved on mobile devices. This could alleviate the fear of losing important files if a mobile device is lost or stolen.

Furthermore, this solution may have implications for data privacy and security, as it may reduce the reliance on centralized servers that can be vulnerable to hacking or data breaches. It may also allow for greater control and ownership of personal data by individual users.

Additionally, this solution may make phone mining and cryptocurrency staking more accessible and user-friendly.

And more…

That’ all for now.
This is me on twitter and linkedIn, I’m more than happy to discuss any aspect of this solution. And any comments, advice and feedbacks are much appreciated.

And in the upcoming weeks article, I’ll be writing about the implementation part.

Thankyou:)

Subscribe to DungeoN
Receive the latest updates directly to your inbox.
Mint this entry as an NFT to add it to your collection.
Verification
This entry has been permanently stored onchain and signed by its creator.