Providing upgraded security in android smart phones using location based system



Download 146.51 Kb.
Date25.06.2017
Size146.51 Kb.
#21763
PROVIDING UPGRADED SECURITY IN ANDROID SMART PHONES

USING LOCATION BASED SYSTEM

A.Shanthi, N.Chindha Final year MCA

MS. S. Kalpana MCA., Assistant Professor,

Department of Computer Applications,

V.S.B Engineering College.

Karur, Tamil Nadu, India.

shanthivsb@gmail.com

chindhamca@gmail.com



Abstract:

To keep the confidential information, security plays a vital role in the smart phones. To become a user friendly home launcher was developed. It can be downloaded from the Android Market. The most commonly used ADW launcher, launcher pro and go launcher. The main goal is to achieve the exact information and location. For computational purpose bulky desktop should be replaced by palmtops and I phones. There are lot of application which is based on the usage where a person sitting in a road site café to get relevant data about the information. The location based service can be created as per the needs. These applications include security related jobs, general survey regarding traffic patterns, decision based on vehicular information for validity of registration and license numbers etc. In this application it includes the surveillance where the information is need to monitored and any real thread or an erroneous target. There are number of different application where able to create information. It only used in desktops. We also need to import desktop to the mobile devices. It is easy to carry the information in a mobile device. It does not need travel guides carry with him. And it also available in user customized format.

Keywords:

Android, GPS, Google Maps, LBS, LCS



  1. INTRODUCTION

Location positioning technique can be developed in wireless communication as result Location Based Service (LBS) is used in a mobile data service. By the LBS we can easy to find out the nearest restaurant around five miles at any place and any time. It brings as the great convenience for information access, constraints, spatial property and mobility provides a great challenge for the location based services to the mobile users.

The main concept of LBS was dependent on the location of a mobile device, like mobile phones.Virrantus et al defined about LBS was “information can be accessed by the mobile devices through the networks and has the ability to use the location of mobile devices. LBS is very similar to the open geospatial consortium. IP service that can use geographical information to serve a mobile user that can employ the position of mobile terminal.

LBS can be access through the mobile network. LBS is an information and entertainment service with mobile device. It utilizes the make use of geographical position of a mobile device. LBS service can be used in various services such as health, work, and personal work. It is a service which is used to identify the location of a person or object. It also includes parcel tracking and vehicle tracking services.

LBS have two major actions,

1. Obining the location of user

2. Utilizing this information to provide a service.


It can be divided in to triggered service (push service) and user requested service (pull service). In a triggered push service, the location of mobile device can be retrieved when a condition is set to fulfill. For example, making a call to an emergency center. The user who enters to a specific area can delivers an advertisement messages, warning messages.
In a user requested pull service, the user wants to retrieve the location of his/her mobile device which can be used in a LBS service. It involve personal location or service location, navigation and direction is best example for PULL LBS service.


  1. RELATED WORKS

Al-suwaidi and Zemerl the problems can be solved by proposing an application “Locating Friends and Family Using Mobile Phones with Global Positioning System (GPS)”.The system is based on the client server approach. The phone can register and can login to the server. The update can be stored in a database where the client can be used periodically. If they want to learn the location of another client, they must be register to login the server can be used to the location. The application was developed and locates the family members and friends. The mobile application was developed by Java and J2ME. The usage of MySQL database, PHP which can be guaranteed to the server by an overloaded function. Each client has same control and command privileges which is not continent for using child tracking applications. Internet connectivity is used in both client and server side that can be used to solve the problem.

In this paper of Almomani, Alkhalil, Ahamad and vehicle tracking and management system can be propsed.The architecture can be designed in the favor of user with the maximum accessibility and provided by the two types of end user application and web application. Architecture is based on the client-server system. From the server, it contains the GPRS, Web and an SMS server along with the database to store user details From the server it may also contain GPS tracker and GSM modem. By using GPRS servers, receives a client and forwarded back to the SMS servers, The SMS server can be forwarded to the web server. This project was designed to monitor the behavior of employs or parent monitoring drivers.

Chandra, Jain and Qadeer are used a simple Web server is approached along with SMS to solve the problem this was developed for Java enable service and GPS receptor. Client can send these locations to other clients by SMS are sharing the web server database through the internet. The clients can view the location on Google play service. The motivation of the application is to enable the user to share the location with their friends.

Anderson, Lusting, Brunette, Borriello and Kolko have proposed a solution for transportation information system using GPS and SMS System. From the client the device contains GSM modems and GPS unit. The database server can store the details and location of the mobile phone for the SMS capability. When a user wants a user requested location, it send SMS request to the server GSM phones, then it replies with the latest location which is acquired from the client. The internet connectivity for both the server is the solution for transportation system.

There are many existing solution for locating or missing the lot of children can be established and conducted. There are some solution which requires as the internet connectivity on both sides of the client and server. This solution is inconvenient connectivity for child or parent sides. The child and parent can be controlled by parent side. The child should not able to delete or modify the information without parents’ permission.

There are some approaches to solve the child locating problems which can be supported by location based services including GPS.To get the child location without the child interaction is the main feature with simple and cost effective methods. This can be done through the use of GPS and SMS only.




  1. ARCHITECTURE OF LBS

To make a LBS services possible, some of the elements are including mobile devices, applications, communication network, positioning component and service centers are needed. User can access LBS services for sending and retrieving the results. Then the devices can be portable navigation devices (PND). Application is the interface for users to access the LBS service. These can be downloaded and installed on users’ mobile device. An application is developed for these services due to the restriction of mobile device (small screen size, limited processor and memory, battery capacity). These applications should be light in weight and less time saving. The transfer service request from user to service provider and requested information back to the user is provided by the communication network through the mobile network. Global system for mobile communication (GSM is most commonly used mobile networks). They are usually controlled and maintained by operators. Network provider connectivity for mobile users and charges them for data and voice transmission.

A positioning service usually needed for LBS applications to determine the location of mobile devices. Nowadays, LBS service do not require user to input location manually. Some of the positioning technologies are satellite positioning, cellular positioning, WLAN stations can be used to find out the users location.

LBS provide service servers to users which are responsible for service request and sending back results.

To calculate server position route and specific information on the user position. They do not store and maintain all the information requested by user. It is mainly responsible for correcting and storing the geographical data, location based information and other related data. The data can requested and processed and return to the users by service servers.


comp.png

Fig. 1: connections among LBS components

Fig1. Shows the connections among the components. First, user can send a service request through the mobile device which can be obtained by position component (step1). Then it is proceeded to send service centers through the mobile communication network.(step2).the request can be geographic database to get the require information by the service server(step3&4). At last the information can be sent back to the user mobile phone through network (Step 5&6).

Location based service (LBS) has number of components.


It includes,

  • Maps

  • Geographic Information System (GIS) information

  • Location collection services

  • LBS application-specific subcomponents

The architecture of LBS is depicted below:





(i). LBS Application
It represents a specific application like “Find My Friends” application

It consists of two components



  • Smartphone component

  • Server component

Smartphone component has number of sensors. Server component has application-specific data such as location tagged information
(ii). LBS Middleware
LBS Middleware has the rights to access the LBS features. LBS Middleware acts as an interface to LBS application. LBS features include Location Tracking, GIS Provider and Location Collection Services.
(iii).Location Tracking
Location Tracking is the important component of Location Based Service. This component only stores the dynamic location of the individual users which helps to trace the mobile users. It contains the data that allows a user’s route to be determined and predicted.

This component has the following features:



  • Maintain the information about the user’s current and past location.

  • It notifies that when the specific user has moved or when they move out of their area.

In particular, this component would typically support the following functionalities:



  • Keep records on user’s current and past locations.

  • Notify other components when a specific user has moved, or when they move in or out of an area that means location based notifications sent to the user.

This component determines which users are within the particular range i.e., Geocasting features.

It generates “User movement model” based on the dynamic location of the user.


(iv). GIS Provider
This component offers geospatial functionality like map information, map visualization and directory services. Google Map with its API is treated as GIS provider.
(v). Location Collection Service
This component does the location collection in order to get the north-south distance of the equator and the east-west distance on the earth’s surface for the specific user.

This component is accessed in two ways:



  • LBS Middleware; Mobile network triangulation through service provider

  • Direct access; Through GPS receiver in the Smartphone

Android provides the access to the above components.

LBS services are implemented through the following classes:



    • Location Manager

    • Location Provider

    • Geocoding

    • Google-Map



(vi). Location Manager
Location manager manages all the components that are needed to design the Location based service (LBS) system.
(vii). Location Provider:

Location provider determines the physical location of the individual user is known as GIS. Location provider component determines the available location and also facilitates to select a suitable one.

To find the List of Available Location Provider
boolean enabledOnly = true;

Listproviders=locationManager.getProviders (enabled only);


Call gets providers using a Boolean to list out all providers. Boolean indicates that if we want all providers available on the device or a particular one.

In addition to this GPS provider, network provider can be accessed directly with the help of static variables which is defined in the LocationManagerclass: LocationManager.GPS_PROVIDERLocationManager.NETWORK_PROVIDER

Moreover, the provider can be found on the basis of some criteria we can use the criteria class and then can able to find the best provider for the defined criteria using the Best Provider Method as shown in the following code

Criteriacriteria=newCriteria(); criteria.setAccuracy(Criteria.ACCUR ACY_COARSE);criteria.setPowerRequirement (Criteria.POWER_LOW); // more criteria here

String best Provider = locationManager.getBestProvider (criteria, true);

If more than one provider is found, then it returns the best provider that means which provider fulfills the given criteria. If no provider is found for the defined criteria, then the criteria are loosened in order power use, Accuracy, Ability to return bearing, speed and altitude.


(viii). Geocoding
Reverse geocoding provides a way to convert the geographical coordinates (latitude, longitude) into street address forwards and geocoding gets geographical coordinates from street address. We use get Latitude () and getLongtitude () methods in forward geocoding.

Coding is depicted below:

Double latitude=location.getLatitude ();

Double longitude=location.getlongitude ();

We use getFromLocation () method with geocoder in reverse geocoding is shown below:
//geocod is geocoder variable Address=geocod.getFromLocation (latitude, longitude)
(ix). Google Map in Android

Android provides a numerous of objects to handle maps in Location Based Service like Map View. Map View displays the map. One class is used to handle this Map Activity. Overlays class will be provided in order to annotate map. It offers canvas in which one can able to create multiple layers and use even for display. Moreover, we can able to zoom the map, localize the map with the help of Map Controller.


Following is the example for Map Controller.
Android:id=”@+id/map _view”

//specify different attributes/>//map controller

Map Controller=myMapView.getController ();

mapController.setCenter (point);

mapController.setZoom (1);

//List of parent overlays

Listoverlays=mapView.getOverlay ();

//Adding a new overlays

MyOverlaymyOverlay=newMyOverlay ();

Overlays. Add (my Overlay);

mapView.postInvaliddate ();


4. CHALLENGES OF MOBILE SECURITY

a. Threats

A smart phone user can get the various threats when he uses his phone. These threats can disturb the operation of a smart phone which is used to transmit and modify the user data. From this, it must guaranteed by three reasons are privacy, integrity, availability. They could behave themselves as a malware. From this activity , their activity and functionality should be limited.(for example, accessing location information via GPS, address book, transmitting data on the network, sending SMS that are charged, etc.).

There are three targets which gets threatened for users


Data: The device which is used for data management. They may contain sensitive data like credit card numbers, bank account number, a ATM pin number, private information, activity logs.

Identity: the devices which are highly customizable and contents are associated with specific person. For example, the device which can transmit information by the owner on the mobile phone contract and an attacker steal the identity of information in a mobile phone.

Availability: smart phone can be attacked by limiting the access and deprive the information which is carried by the owner.

Many sources are attacked by hackers which are found in the non mobile computing space.



  • Professionals, they focus on only above three targets, whether it is based on commercial or military purpose. Sensitive data can be sealed from public. Professional will also use the identity of attacked to achieve other attacks.

  • Thieves, they want to gain income through data or information that can be stolen. To increase their potential income many people’s are attacked.

  • Black hat hackers, their motivation is to develop virus can cause to damage to device. It specifically attacks availability. Hackers have an interest on stealing data in the mobile devices.

  • Grey hat hackers, they motivation is to expose the vulnerabilities software device. They do not intend on damage the device or stealing the data from the device.

b. Consequences

Smart phone can be attacked by a attacker, they can attempt several things.

  • The hacker can manipulate the smart phone by a zombie machine (which can communicate and send commands user to send the messages).

  • The attacker can easily make the phone call by Microsoft, which collects the telephone numbers from any source such as yellow pages. They can also use call paid service which results in a charges to owner of the smart phone. It is very danger because the emergency services can be disturbed.

  • Well recognized smart phone can record the conversation between the user and send them to a third party. It can be caused by industrial security problem.


  • The hacker can steal the user identify like copy of the sim,telephone numbers, etc. by doing this he can easily steal the bank account, ATM pin numbers, credit cards.

  • By discharging the battery the attacker can reduce the utility of the smart phone. For example, he can use the various applications that will run continuously on the RAM and requires the lot of energy by draining the battery. Traditional PC performances are limited.

  • The attacker can prevent the operation system which can be unused. Attacker cans delete the boot scripts, operating system where a smart phone can be unusable. If startup application could not be embedded due to empty the battery life.

  • The attacker can remove the personal or professional data of the user.

c. Attack based on SMS & MMS

Some of the attacks are derived from the management are SMS and MMS.

Some mobile phones will phase the problem in managing the binary SMS messages. It can cause the phone to restart. Leading to several attacks. If a message contains Chinese character, it will leads to the denial of services. This can be replaced by a Nokia mail service, which can be replaced by a 32 characters. This leads to complete dice function of email handler. These attacks called as “curse of silence”. The SMS can be send from the internet can be used to perform denial of services, which attack mobile telecommunication network. They can attack employ of the delay which is used to deliver the messages.

The attack is based on MMS with an attachment when it is attached by virus, the smart phone can be destroyed. If the attachment can be opened in the mobile, then it can be attacked. This will destroys the all the contacts in the address book. The best example of this attacks are the virus can uses the address book and send MMS messages including infected file to senders. The virus can immediately send the messages to recipients from the address book.


5. APPLICATION DEVELOPMENT
A. Requirements

It requires designing only for parents and children. The minimum requirement in smart phone wants to support GPS and SMS service. SMS is a basic service which contains in normal smart phone but GPS found new smart phones. This application is used for parents to locate the children. The development of the system by using Android SDK tools and eclipse which supports on Android. The main reason of using the Android OS is to reach the more users. Now a day’s Android are mostly used OS in the market.


B.Application Architecture
The solution for this problem was mainly based on GPS and GSM technology. There are two main advantages are offered in advanced smart mobile platform. The advantages are location service based on GPS and telephone service based on SMS.The implementation that supports Android platforms that can be solved easily. The simple way to propose a system was based on the use of SMS communication between parent and child. So it designed in a simple way that can involve few elements and less interaction. This result was based on easy use and implement with simple way and making it user-friendly.




exis.png
Fig. 2: GPS Location finding





From fig.2 the architecture consists of two sides. First is parent side, second is the child side. The parent sides act as a server for the system but it not actually acts as a server. The child can be located based on Android phone owned by the parent. From the parent side can communicate with the child through SMS and also view the location of the child by the Google maps. For the service it must requires the telephone and internet services that are to be enabled in the parents’ phone.

Second is the child side which act as a client for the system. From the child side requires another Android smart phone where the function can be satisfied. It is easy to get the location of the child. . From the child side can communicate with the parent through SMS and also view the location of the child by the Google maps. For the service it must requires the telephone and internet services that are to be enabled in the child phone.

From the parent side, the application must run in the background of the smart phone mostly for map tracking. From the child side, the application must run in the back ground of the smart phone which is mostly used for map tracking. The parent can send the location request SMS to child. The main function of the parent side which employs two main functions. One of the function is to listens and gets location through GPS satellite or network provider which is more accurate .the other function is listening and waiting for request form the parent side.
From the parent side, it runs only on the background and keeps listening to all incoming SMS. They will only reply to the location request to the other side of the system. When a parent sends a request to a child through SMS, then child side will replace to latest request location from the location services. Then the parent will receive location detail of child through SMS and location services.



Parent side work was to listen carefully for specific strings of character that can be determined between the parent and child side.SMS message can received to the staring with the predetermined string can be identified. For example,”$get Update$” will be used send the SMS to the parent side location request. Then the “$update$Coord” will be used to send the SMS to the child side location request for updating the location.”Coordinate” string refers to the location coordinates with the actual system.







Fig 3: Childs location parents side

There many advantages when compared to the design with existing solution. First, parent location request can operates automatically without the need of child side. So it is a big advantage over the child side because child cannot handle the mobile application and many user interactions. The usage of SMS is to decrease the usage of internet connectivity is main advantage. The design which requires location services and telephone connectivity. This situation is mostly used where the users can not access internet services.

The advantage for the solution which can perfectly function in an indoors as well as. This can be done by using both GPS and network provider to determine the location. The application will collect the coordinates from both, compare them and used most accurate once. In case when there is no GPS satellite network received can only use other resources. Network provider location can be detected based on the cellular phone id. Lastly, master-slave relation can be interface between parent and child side where parents can control all the function of the system and child has little control.

From the figure 4, it shows the parents side interaction. From the figure, yellow area is the geo fencing area where the child is allowed to roam within the yellow area. Her parent gets notified by when a child passes the limits area.



6. CONCLUSION

Initially mobile phone was developed only for making calls, sending SMS and MMS.

But now a day’s these features are only the simple parts of mobile phones. The two most important factors of mobile phones are: web browser and GPS services. These features are implemented in the recent mobile phones but these services are only used by the manufactures not by the mobile phone users. After the releasing of android mobiles, these features are in the hands of mobile phone users also. Users can able to access the mobile hardware’s directly, design and implement our own application and also can program the hardware components like camera, By using android mobile phones.



References

[1]. Virrantaus, K., Markkula, J., Garmash, A., Terziyan, V., Veijalainen, J., Katanosov, A., and Tirri, H. Developing gissupported location-based services. In Web Information Systems Engineering (2001), IEEE, pp. 66_75.

[2]. Consortium, O. G. Open location services 1.1, 2005.
[3].D'Roza, T., and Bilchev, G. An overview of location-based services. BT Technology Journal 21, 1 (2003), 20_27

[4].Schwinger, W., Grin, C., Prll1, B., and Retschitzegger, W. A light-weight framework for location-based services. In Lecture Notes in Computer Science (Berlin, 2005), Springer, pp. 206_210

[5].Zeimpekis, V., Giaglis, G., and Lekakos, G. A taxonomy of indoor and outdoor positioning techniques for mobile location services. SIGecom Exch. 3, 4 (2003), 19_27

[6] “.Survey of location based wireless services Mohapatra, D.; Suma, S.B.; Personal Wireless Communications, 2005.




Download 146.51 Kb.

Share with your friends:




The database is protected by copyright ©ininet.org 2024
send message

    Main page