Faculty of Computing,Sathyabama University, Chennai, Tamilnadu, India. Received on Accepted on

Similar documents
Procedia Computer Science

Sim Card Alarm for Android Smartphone

Junos Pulse Mobile Security Dashboard

3CX Mobile Device Manager

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Junos Pulse Mobile Security Dashboard

Mobile Applications on Vehicle Tracking

Location Based Task Reminder System Using Android Mobile

Mobile Health Check. Airtel Vodafone Power to you

Sim Card Alarm for Android Smartphone

User Manual. Helios PTT for Android

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Smart Watch: GM8588. User Guide. Please read the manual before use.

To Study the Usage & Awareness of M- Commerce and its services with reference to Nagpur City

International Journal of Computer Science and Electronics Engineering (IJCSEE) Volume 4, Issue 2 (2016) ISSN (Online) Women Safety Device

SPOTTER: A MOBILE TRACKING ANDROID APPLICATION

User Manual Smartwatch SW15

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

User Guide Symbian Phone For MTNL Vault

Smart Security For Car Using OT

Location Based Reminder

PERSONALISATION OF USER PROFILES IN SMART PHONES BASED ON GPS TECHNOLOGY (ANDROID)

Implementation of Android based Code Esterno Application

A Remotely Access and Anti-Theft System (R2AS)

VT310 User s Manual Version 1.4(OE)

Smart Watch Plus User Guide

BEAT 2.0 USER MANUAL

Geo Service Automatic Mobile Alert System

International Journal of Advance Engineering and Research Development REAL TIME VEHICLE TRACKING SYSTEM USING GSM MODEM AND GPS MODULE

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.

Functions. 1. Press the picture on App to enter the live page (as the pictures show) ;

Phone Guardian v3.0 by SymbianGuru User Manual

Integrating User Preference with Theft Identification and Profile Changer in LBSNs Divya. M, V.R.Balasaraswathi, A. Abirami, G.

Android Samsung Galaxy S6 Edge

Smart Band for Women Security Based on Internet of Things (IOT)

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

A1. Technical methodology

SatGuide Symbian User Manual. SatGuide Symbian OS USER MANUAL

SMART RADIO MONITOR (SRM)

Love - Care - Connect

KDG27. GPS Tracker. Vehicle or Personal Position Tracking Vehicle Status and Speed Tracking. Auto Accident Report Global Position System (GPS)

Arm11 Based Accident Alert and Vehicle Tracking Using GSM and GPS

An Arduino Based Indoor & Outdoor Positioning System (IOPS)

Embedded Solution IT Solution Industrial Automation

In the chemical plant, gas station and other explosives near, Don't use watch on the plane. Please check whether the

Gator Watch. User Guide

Welcome to the AYE family. We have developed this watch and the ensuing app to create a carefree environment for parents and guardians.

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

SECRET LOCK ANTI THEFT: INTEGRATION OF APP LOCKER & DETECTION OF THEFT USING USER PATTERN

NEXT Mobile Video Tracking

IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online):

West Bengal. Android Mobile Application

+ Front Door Security + Smart Video Alarms + Indoor Cameras + Personal Trackers SOLUTIONS FOR SMART & SAFE HOMES

ihelp Phone APP User Guide

VEHICLE SECURITY AND TRACKING SYSTEM WITH CLASH DRIVING ALERT

Android User Guide. for version 5.3

1 Technical methodology

Smart Watch Phone User Guide. Please read the manual before use.

GPS TRACKING AND TELEMATICS

CONTROLLER AREA NETWORK AS THE SECURITY OF THE VEHICLES

Volume 6, Issue 4, April 2018 International Journal of Advance Research in Computer Science and Management Studies I. INTRODUCTION

GPS Tracking Watch Manual

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Developing an Operational Automated Real Time Tunnel Monitoring System

An Implementation of a System Remote Tracking and Control Using Global Positioning System and Global System of Mobile Communication

Features. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage

RESOLUTE MOBILE CULPRIT IDENTIFIER AND ACQUIRER

Appbot RILEY. APPBOT Riley User Manual. IN THE BOX. Appbot RILEY. Charging Station Adapter USB Cable Manual

WELCOME : OVERVIEW Mobile Applications Testing. Copyright

Smart Vehicle with Theft Prevention using GSM and GPS

GPS TRACKER PHONE WATCH USER GUIDE

Mobile Tracking System using Web Application and Android Apps

Key Features: Be notified of incoming calls, texts, , calendar and social media events with vibration and LED light

User Manual. Helios PTT for BlackBerry

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Get Started. Insert SIM card The phone is a Dual SIM mobile phone allowing you to use the facility of two networks.

StarryBay. User Guide

IT Services. Embedded Services

AC Care Mobile Application

Functions. 1) Press the middle white circle and move it in the grey area, you can control the camera through this way.

ipads for Productivity 7

InTimeGo-630 GPS Watch Tracker User Manual

Emergency Contact for Real World Social Community

International Journal of Mathematics & Computing. Research Article. Received April 07, 2015; Accepted April 16, 2015; Published June 25, 2015;

Instruction How To Use Wifi In Mobile Samsung Galaxy Y Duos S6102

WHAT IS GEOTAGGING GOOD FOR? HOW IT WORKS

SMS Based Household Appliance Monitoring and Controlling System Ms.Shraddha G.Rajkuwar*1, Ms.Rupali G.Bhople*2, Ms.Pooja V.

Contents. Get Started Install SIM Card

Instruction How To Use Wifi In Mobile Samsung Galaxy Y Duos

Lawrenceburg Community Schools Technology Laptop USE AGREEMENT

AES and DES Using Secure and Dynamic Data Storage in Cloud

Spark Nano Users Manual

ScienceDirect. Exporting files into cloud using gestures in hand held devices-an intelligent attempt.

Mobile Device Growth 1

A GPS Based Novel Bull Tracking System for Jallikattu

Prepaid Wireless. User Guide. bellmts.ca/prepaid

Mobile Devices. Questions. NCJRL ICAC Webinar Mobile Devices October 25, Don Mason Associate Director, NCJRL. Presenter

Geospatial Information collection tool for PDA using Cloud computing GEO-PRO Ver1.0 User Guide. March 29, 2016 PIPE DESIGN, Inc.

CCTR-630 GPS Watch Tracker User Manual ---V1

Quick Setup Guide. Tip: We recommend you use a Vodafone SIM card. SIM cards from other networks might not work!

Transcription:

ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com EFFECTIVE ANDROID MOBILE ANTI-THEFT APPLICATION WITH CONTINUOUS TRACKING AND USER PROFILE RECORDING M. Ancy Rose *, S. Hemalatha **, P.Saravanan # *** Student, # Assistant Professor, Department of Information Technology. Faculty of Computing,Sathyabama University, Chennai, Tamilnadu, India. Email:ancyrose100@gmail.com Received on 28-04-2016 Accepted on 25-05-2016 Abstract Increase in the use of smart phones in today s world has led to a drastic rise in the number of mobile thefts. Though there are a number of applications that have been introduced in order to resolve this problem, we have come up with a system which addresses this issue in a more efficient way. In this paper, we proposed an android application which is deployed with an initial registration of another mobile number. If the phone is stolen and SIM card isn't modified, original user can send SMS through the registered mobile number to trace and verify the location of the stolen mobile along with other details of the thief. GPS, camera and voice recording are initiated only when theft phone receives a particular keyword from registered number. While the SIM card is changed, the units includes GPS, camera, and audio recorder are automatically initiated. Stealer s picture is captured by automatic camera initiation and the URL of both the stored image and voice are sent to registered number through SMS. Stealer s picture is sent to E-mail ID of original user. The proposed work has been tested in various scenarios and has shown to have successful implementation. Keywords: Location tracking; Android; Smartphone; with and without sim. Introduction Location privacy has become an issue because of the increase in GPS devices, location based services, WLAN and cell ID based on positioning technologies. A lot of research has gone into finding a wireless device for security reasons. Localization is often passive or active. In passive localization, the device is not carried however in active localization the device is carried. In active localization, with the help of certain elements like GPS(Global Positioning System), users can find their or others location. A mobile phone without this element can send its position through radio waves. The various types of principles that can be applied in order to get the position of an object are: IJPT June-2016 Vol. 8 Issue No.2 11886-11893 Page 11886

Network-based approach Terminal-based approach Network-assisted approach Terminal-assisted approach M. Ancy Rose* et al. International Journal Of Pharmacy & Technology In Network-based localization approach, the network (base station) identifies all the required values. The values are sent to a typical location center, which belongs to the core network. This center is responsible for the crucial computation of the object s positions. In Terminal-based approach, position is determined by the terminal. This approach involves high battery consumption and desires correct instrumentation; it's solely used in heritage terminals. In Network-assisted the terminal seizes the crucial calculation of the object s position. This could be done during a pull manner or during a push manner. In Terminal-assisted a hybrid implementation is used. The terminal measures the incoming signals from a server and reports are supplied to the network. The central location is responsible for calculating the ultimate location. The easiness and practicality of localization can be attributed to large number of electronics like smart phones, tabs, laptops, net books, radio-carpal joint watches, televisions etc. which use varied detectors like accelerometers, temperature gauges, GPS receivers, gyroscopes, etc. and wireless web. Since good wireless devices include detectors like measuring instrument etc., it's doable to form chase systems which are not solely aware of location but the context as well. Context may include location however it additionally includes other situations like if the user is moving, if he's taking turns etc. which makes it beneficial particularly for police work. As an example, if phone is taken, its precise position can be identified if the context is understood. Furthermore context data are often required to reduce network knowledge transfer. As an example, frequent updation of a device, which is not moving or moving steadily, is not required. But efficiency of context detection depends on varied alternatives like whether the device is in the user s pocket, hand etc. As a result, during this paper, a service for context chase of good hand-held s is projected, which considers the entire context for higher police work. This method is often used for finding lost mobiles, people etc. in a power-saving, user friendly way. Related Works In [1], the authors have created an application in order to find the lost device. The application installed finds the android device by using either GPS or Network Service-Provider and sends the details to the server via internet. But in this application the mobile can be tracked only till the number is not changed. IJPT June-2016 Vol. 8 Issue No.2 11886-11893 Page 11887

If the mobile number is changed then there is no use to the application. Web Server is another hurdle as only the coordinates are stored thus making it difficult to track the position. Moreover it is unknown whether the application needs to keep running even when the mobile is not confiscated and also even if the application need not keep running what should be the trigger in order to start it is not clear. In the paper by M.Umamaheswari, S.Pratheepa Devapriya, A.Sriya, Dr.R.Nedunchelian[2], an application is created to track a mobile device. It is based on in-built GPS feature in smart phones. When the sim card of the theft mobile is changed then the longitude and latitude details are sent to a backup number. Using these values the exact location can be found using Google maps. The drawback of this application is that the mobile position can be found only when the thief changes the sim card. If the SIM card is not changed then there is no use to the application. Moreover it sends only the longitude and latitude details from which it is difficult to continuously track the stolen mobile phone. In the paper Smartphone Tracking Application using Short Message Service [3] a method is proposed to track lost phone. This application uses SIM serial number. Mobile tracker is used such that whenever the SIM is changed the owner will be notified about the new mobile number via SMS sent to the mobile number stored in the mobile tracker. The main disadvantage of this application is that only the SIM card number will be sent and the current location of the phone is not sent. And also this application will fail to track the device if its SIM card is never changed. In [4], SMS is used to access a stolen android device from a remote location using a backup mobile terminal, which need not be android. The stolen phone can be locked from a remote location. There are various other android apps in Google PlayStore such as LocateMyDroid, SeekDroidLite, AntiDroidTheft, GPS Tracking Pro, Where s My Droid, Plan B etc. that helps to find a stolen mobile phone using Google Map interface but most of these require high power consumption due to the requirement of accessing the present location through GPS or monitoring behaviour to check for deviations. Apps like Locate MyDroid have been developed that can be operated aloof over a web interface. Google Device Manager locks phones once they are lost (like the work described in [4]) and also shows the location of the mobile where it was last detected. Proposed Work Android Application is deployed with signing up of substitute Mobile number. If the phone is stolen, original user will send SMS through a normal phone or through an application deployed in another Android phone to track and verify the location of the theft Mobile. IJPT June-2016 Vol. 8 Issue No.2 11886-11893 Page 11888

If the Thief changes the SIM card immediately location details are sent to the alternative Phone number of the original. Both the logic of tracking the Theft Phone with SIM Card & Theft Phone with changed SIM Card is tracked continuously. Thief Photo is captured by automatic Camera Initiation and Voice is recorded and uploaded in the server. Both the Location and Voice are sent as SMS Alert to the Alternative Mobile number of the Original User. Advantages of Proposed System It is found that the proposed system possess many advantages, few of which are listed below. Less power consumption Less time consumption Reliable High security Proposed System Architecture Figure1: Architecture diagram Material and Method The entire process is further decomposed into various modules which are listed below. Mobile client registration Server Mobile communication Tracking IMSI number Capturing Photo, Audio SMS, Email alert Google Earth Initiation and SMS Alert IJPT June-2016 Vol. 8 Issue No.2 11886-11893 Page 11889

Mobile Client Registration M. Ancy Rose* et al. International Journal Of Pharmacy & Technology Mobile Client is an android application, which is created and transferred to the user s android device in order to perform the activities. The application s first page consists of the user registration process which is given in Fig.2. Using this APK user will be registering with the server by providing alternative mobile number & Email ID. User s IMSI number is also captured by the server. Server Mobile communication Figure-2: Registration The server application is employed to speak with the mobile. The Server will communicate with its mobile consumer by GPRS and GPS. Server can track the user with user s IMSI number. Figure-3: Server Tracking IMSI Number In this module if mobile is taken by some anonymous person then we can track the anonymous person by exploiting phone s IMSI no through our application. Our application can listen to the registered IMSI range. When the thief changes the sim card, the application which keeps monitoring the IMSI number will detect the change in the IMSI IJPT June-2016 Vol. 8 Issue No.2 11886-11893 Page 11890

number and then automatically camera is initiated to capture the picture of the anonymous person, voice is recorded and GPS is initiated. Capturing Photo, Audio In this module camera is initiated and photo is taken so that anonymous person is captured by the automaton application. This photo is uploaded to the server. Once when the photo is uploaded to the server, that link is captured & that link is sent as SMS to the alternated number of the initial user. The photo is sent to the user s email id as well.in addition, anonymous person s voice is additionally recorded for higher identification of that person. Once the audio is captured it is stored in the server and the corresponding link is sent to the user s registered number through SMS. Figure-4: Capturing photo and audio SMS and email alert During this method photo and voice is captured and each are sent to the first user s email ID. Photo of the anonymous person is once more saved to the server so that the server link is sent as text message to the user s different mobile number. If the user clicks on the link then automatically image would be opened to the user. Figure 5: SMS Alert IJPT June-2016 Vol. 8 Issue No.2 11886-11893 Page 11891

Google earth initiation and SMS alert Figure 6: Photo capture In the module if the mobile is taken then the location of the anonymous person is derived from the GPS application within the mobile. It updates each movement of criminal location and sends the location to the owner of the mobile. GPS location of the criminal is sent to the owner as SMS so that the location of the anonymous person can be traced by clicking the link of the address that was sent as SMS. Result and Discussion Tracking the stolen phone continuously whether the SIM card is removed or not. Criminal s photo is captured by automatic camera initiation and voice is recorded and uploaded within the server. The captured photo, recorded voice and coordinates of the thief are sent to the user through SMS. The advantages of this system are less power consumption, less time consumption, reliable and high security. Conclusion In this paper, a tracking service is designed and implemented in order to track individuals and hence can be used to find missing mobiles or lost users. GPS is used in order to track the position and updates are sent to the registered number. Camera and voice recording are also triggered as they are a part of the context. This process can be remotely triggered from any device which need not be android References 1. N. A. Dar and A. A. Khan: A System to track android Devices: An Implementation of LBS, Location manager, Services and Web-services in android, ISST Journal of Mathematics & Computing System, 2013, Vol. 4 No. 1, pp. 49-54. 2. M.Umamaheswari, S.Pratheepa Devapriya, A.Sriya, Dr.R.Nedunchelian: Android Mobile Security with Auto bootapplication. International Journal of Engineering and Technology (IJET), 2013, Vol. 5 No 3,pp. 1-5. IJPT June-2016 Vol. 8 Issue No.2 11886-11893 Page 11892

3. A.Mondal, Md. A.Masud, N.K.Biswas, Md.E.Sarder, Smartphone, Tracking Application using Short Message Service, International Journal of Electronics,Electrical and Computational System(IJEECS), pp. 1-7. 4. K.S. Kuppusamy, R. Senthilraja, G.Aghila, A, Model for Remote Access and Protection of smartphones using Short Message Service, International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), 2012, Vol.2, No.1,pp.91-100. 5. Trepn Profiler Qualcomm developer network:https://developer.qualcomm.com/mobile-development/increaseapp-performance/trepn-profiler. Corresponding Author: M. Ancy Rose *, Email: ancyrose100@gmail.com IJPT June-2016 Vol. 8 Issue No.2 11886-11893 Page 11893