Smartphone security and contact synchronization(paper id1569866867)
Post on 23-Aug-2014
121 Views
Preview:
DESCRIPTION
Transcript
SMARTPHONE SECURITY AND CONTACT SYNCHRONIZATION
AUTHORSKunal Gupta, Ravi Kumar, Sachin Loothra
Presented by : Ravi Kumar Amity University,
Noida
Current Scenario – About Smartphone Theft
•Every year, smartphones costing $30 billion are lost/stolen.
•Worst part – most of these smartphone theft cases remain unsolved, and yet no interest in solving this problem from manufacturers of these smart gadgets.
•Smartphone Theft – fastest growing undetectable crime.
Have you ever wondered ?
What would happen if you lost/changed yoursmartphone?
•Contacts Lost•Transferring Contacts.
SSCS : A complete solution to above problemsThe “Smartphone Security & Contact Synchronization (SSCS)” is an innovative idea that will serve to solve the following challenging problems regarding smartphones:-
Help the smartphone owner to track his/her lost android smart phone.
Solve the problem of smartphone owner’s credentials being exposed/ leaked.
Solve the problem of losing/transferring contacts when you lose/change your smart phones.
Informing your friends about your new contact after you change your SIM Card.
Remotely control your device.
Find phone by making it ring/vibrate even in silent mode.
Proposed SystemThe idea is to develop an online service and an android smartphone application that works together. The application aims to solve the problem of losing mobile contacts by maintaining its contact details automatically in an online contact base ie Google Spreadsheet. Google Docs API will be used for this.
With this application, each contact on a user’s smartphone is synchronized with it, and each time the user changes his/her mobile number, every synchronized contact will receive a message or an e-mail about user’s updated contact information.
Proposed SystemFrom a security point of view, the main motive of the application is to keep a track of our mobile handset and catch the thief. With this application, the original mobile user can track his/her lost mobile phone. And if a malicious user changes the SIM Card, his mobile number will be sent to the alternate numbers entered by the original user at the time of application installation. A special code messaged from any mobile number will initiate the GPS tracking.
The Siren Feature will help to trace the smartphone despite it being in the silent mode.
Contact Synchronization
Use Case Diagram
FLOW CHARTS – Mobile Safety/Security1) SIM Change Detection
2) GPS Tracking Activation/Deactivation
3) Siren Functionality
3) Inform to Friends
Uniqueness About Our ApplicationThe situation right now is that most smartphone developers are working on better hardware of devices. Due to this, a few basic facilities that every smartphone should have, i.e. anti theft security, contracts synching problem etc., is being overlooked.
Even though, there are many 3rd party applications on the play store which try to provide facilities for contact synchronization, smartphone security. However, they have their limitations too:-
• Not a complete package.• Lack multi-purpose capability. • Storage Issues.
A complete solution all packed in a single application with no hassles is still not available on the Google PlayStore.
SCREENSHOTS
1 2
3 4 5
Future ScopeGreat present & marvelous future ahead :•We can have a complete backup of messages, call
history etc. into the Google spreadsheet. •The feature to automatically capture thief’s photo
when he/she logins to the smartphone for the first time.
•The ADB Lock feature. •Wipe Data/Factory Reset Protection can be added
to enhance application’s capability.
References1. Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A Study of Android Application
Security. In: Proceedings of the 20th USENIX Security Symposium (August 2011).
2. Wang, H.J., Zhu, W.: Smart-Phone Attacks and Defenses. In: Proceedings of the 3rd
Workshop on Hot Topics in Networks (HotNets) (2004).
3. Enck, W., Ongtang, M., McDaniel, P.: Understanding Android Security. IEEE Security & Privacy Magazine 7(1), 50–57 (January/February 2009).
4. Shabtai, A., Fledel, Y., Elovici, Y.: Securing Android-Powered Mobile Devices Using SELinux. IEEE Security and Privacy Magazine (May/June 2010).
5. Android Developers - The official site for Android developers. Provides the Android SDK and documentation for app developers and designers (http://developer.android.com). Referred throughout the implementation of the suggested project.
6. A question & answer site. (2008, August). Retrieved June 10, 2013, from stackoverflow :http://stackoverflow.com/questions/tagged/android
top related