Вы находитесь на странице: 1из 6

A Security Application for Smart Phone and Mobile

Device
Nirjhor Anjum Mansura Habiba Md. Rafiqul Islam
Computer Science Department Computer Science Department Computer Science Department
American International University- American International University- American International University-
Bangladesh Bangladesh Bangladesh
Dhaka, Bangladesh Dhaka, Bangladesh Dhaka, Bangladesh
nirjhor_anjum@gmail.com mansura.habiba@gmail.com dmri1978@yahoo.com

Abstract—with the development of technology now mobile devices. This application is a very useful and a profitable one
devices can perform different official activities beside the for both the user and the developer party because of its unique
personal ones. People can store password, valuable documents, features and limitation-free nature. Moreover, this proposed
pictures, videos and many other private and confidential contents
inside their mobile devices. Moreover, high performing mobile
application is developed with JAVA programming language
devices are very costly. But mobile devices being stolen or missed which runs on the Linux Platform, Android OS. All types of
is a worldwide daily affair, which incurs great loss upon people. mobile devices or tablets that use Linux OS will be able to run
In this paper, the idea as well as system architecture of an this application. In addition, this application can be modified
application has been proposed which helps to strengthen the further to make a stronger security tool for any kind of mobile
security of mobile devices. It retrieves the International Mobile device.
Station Equipment Identity (IMIE) number, recent contact list,
geological location, and the new SIM's number from the lost
The rest of the paper has been organized as following,
device, and finally sends this information to the actual owner of section 2 discuss about the existing application or concept used
the device. These information help to find the exact location and for similar purpose. Section 3 describes the application’s
other details of that lost mobile device. Thus this proposed feature, implementation process, working principle and
application acts as a security tool for the smart phones and other algorithm. Finally section 4 focuses on future direction and
mobile devices. The contribution of this proposed application is concludes the proposed application with some remarks.
that it would be very convenient for people of developing country
for its cost effectiveness and less energy consumption and will be
independent from telecom operator. II. LITERATURE REVIEW
There are few applications on the Android market and in
Keywords-SmartPhone; Security; Trace Lost Phone other Android shops which claim that these can trace a mobile
after it gets lost. But there are many limitations of these
I. INTRODUCTION applications, which make these applications ineffective for
Developing an efficient and effective mobile application is providing complete mobile security. Below is a list of such
always a challenging matter that needs a proper idea and a applications, their features and limitations. Point to be noted
standard implementation. The problem of good mobile that, most popular applications of the market are described
application development is compounded by several factors. here.
Firstly, different users have distinct goals. Secondly, the same
A. Wheres My Droid
visitor may seek different features at different times. Thirdly,
an application may be developed for a particular type of This application has the following features:
device, which may not run in other devices. Fourthly, an 1. Ringtone and vibration is used to detect the lost phone.
application may be developed for particular geographical 2. GPS location is traced
location or specific group of people. This project is taken in 3. Notification for SIM Change
concern keeping all these factors in mind. Therefore, the However this application is a defected with following limitations
project will fulfill the need of all the users who use Linux
Operating System based smart phones or other mobile devices 1. This application will not be effective if the application
across the world. It is expected that this application will be a is simply removed from the “Installed Application”
common like for all the users, and will be able to cover option of the mobile.
maximum users' expectation and attraction, because it will 2. GPS does not work properly. It cannot trace the exact
protect the safety of their valuable devices from unwanted GPS location if the GPS is disabled.
situations. 3. If sufficient balance is unavailable, no SMS is sent for
This proposed mobile application can help to retrieve any SIM change.
lost mobile device, and can strengthen the security of the 4. ANR crash is another limitation
devices. Therefore, it will act as a security tool for the mobile
B. Mobile AntiVirus Security PRO application development process. This research was done by
The claimed features of 'Mobile AntiVirus Security PRO' some students of Singapore [8]. They explained the conceptual
are [3]: theories of how a lost mobile phone can be traced in their
research report. In their prototype their proposed application
1. Application locks screen of lost device and send alert gathers IMIE number, MNC (Mobile Network Code), MCC
message (Mobile Country Code), captured image of the thief, recorded
2. A message is displayed on the locked screen to voice of the thief while calling somewhere etc. Finally this
request user if anybody find that information will be sent to the owner of the mobile device via
3. Make loud noisy sound MMS. IMIE retrieving is a good concept which is also similar
4. Use Google Map to trace the location of lost device with this proposed research. But there are some other
Mobile Antivirus Security PRO has some Limitations, like limitations with this research. These are:
[3]: • MNC (Mobile Network Code) code is not familiar to
1. If the device is lost in a distant place then 'ringing' normal users; they need help form Mobile Network
feature of this application becomes valueless to trace Provider to use MNC. Therefore, the proposed
the device, and becomes helpful for the thief to grab application does not use MNC.
the device. This option can only be implemented • MCC (Mobile Country Code) is not required to trace the
when the owner of the device is fully sure that the lost mobile. As, it is highly probable that no thief goes
lost device is somewhere near, and not stolen. abroad after stealing mobiles. As a result, we also have
2. If somehow the Google Map does not work, the not considered MCC and make the proposed application
application will not work properly. more user-friendly.
C. AVAST Mobile Security • Captured image collection is not a good concept,
because front-side camera is not available with all the
Though AVAST is an Antivirus actually, but it also have
mobile phones, and it is hardly possible that the mobile
some Anti-Theft features. The claimed features of 'AVAST has captured the thief's photo. This option is completely
Mobile Security' are [4]: not feasible, so in this work, image collection is ignored.
1. Remotely trace the GPS location of lost device • Recorded voice collection is not a good idea again for all
2. Activate loud sound these cases. Recorded audio files take large space in the
3. Remotely erase memory memory, therefore while sending those to the owner it
AVAST Mobile Security has some limitations, like [6]: will take a large bandwidth. In the case of low
1. GPS tracking is of no use if the original SIM is bandwidth GPRS networks concept will not work
changed properly.
2. Loud sound can help only if the lost device is • The researchers of prototype using MMS (Multimedia
somewhere surround the owner, otherwise this Messaging Service) to send the collected information to
feature is also useless the actual owner of lots mobile. This is again not a good
3. Deleting memory cannot protect the data but can concept. For example, in many developing countries the
destroy it; therefore this application cannot protect MMS service is not activated by default. The user needs
the data of the lost device. to activate the MMS service manually or by requesting
the Mobile Network Provider. So in such case the MMS
From above mentioned discussion it can be seen that, some will never be able to send information to the actual
common features of existing application can be identified such owner. There is no confusion that use of MMS is not
as locking the phone, erasing the phone memory, making loud user friendly and flexible to use. On the other hand, this
noise, and tracing the device via GPS. None of these is costly. In this work, all costly means are not
application returns IMIE information or the SIM's activity to considered. Therefore, this work is cheap and potential
its owner which is most important for tracing the lost mobile to be more popular than existing applications,
device. Therefore the limitations of existing applications are • Their proposed concept does not have any alternative
destroying complete memory rather than preserving that option for sending information. There is option for
information, inappropriate use of GPS tracking, without keeping the tracing activity in pending status so that later
consideration of ensuring owner about the activity of lost when the application finds scope it can send the grabbed
device. However, all these limitations are making all existing information to the actual owner of the mobile. Use of
applications ineffective to retrieve a lost or stolen mobile alternative data sending from lost device makes our
device especially lost data. proposed application more authentic and efficient.
• Their research was only on Symbian Operating System
D. Comparative Analysis of Proposed Application and (7.0), specifically on Nokia 6600. Point to be noted that
Existing Research on Lost Mobile phone Detection only Nokia uses Symbian Operating System. So this
There is a research that was found on finding lost mobile research will be helpful only for the old versions of the
devices, thought that was not detailed about the entire Nokia mobiles. Android is used by Samsung, Sony, LG,
Motorola and other smart phone users, this application is • Maximum applications lock the screen at first and make
also developed using android SDK. Therefore, it can be loud siren, which is not a clever step to retrieve a lost
implemented by most of the smart phone manufacturer. device at all. Because when the application will lock the
• The thief can easily stop the application, as it is noted by mobile and make loud siren, the thief will be alert and
them in their research by stopping the software which is will try to format the mobile to destroy the application.
another limitation of their research. The major limitation This application is developed to work staying
of existing application is the device trace can be disabled background. This special feature will not let the thief
by vulnerable user who finds it after lose. However in understand about the activities of the application.
this proposed application, the second user cannot control
the device trace feature. B. Working process of Proposed Application
Therefore, the proposed application outperformed the This application is able to take different actions to retrieve
existing applications due to their unavoidable limitations those the lost devices while running on an Android OS based smart
have been discussed in this section. phone or any other mobile device. These actions are described
below:
III. PROPOSED APPLICATION
In this section the proposed application has been described as 1. This application will force the user to install it on the
following Phone Memory.
• Generally the applications are installed on flash
A. Special Feature of Proposed Application
memory. In such case, if the device is stolen and the
There are several new features of this application which thief removes the flash memory, all the applications of
makes this application very useful. These are as following: that mobile get lost. Therefore, forcing the users to
• The police or any mobile company can trace any lost install the application on the phone memory will
mobile, but they can do it only when the owner of the strengthen the security of the application.
mobile device knows his/her lost mobile's IMIE number. 2. When the application will run for the first time, it will ask
Maximum of the available mobile security applications do the owner of the mobile device to save his alternative
not send IMIE number to its owner. Besides, in 99% cases mobile number and email address.
the mobile owners do not know their mobile's IMIE • When the mobile device will be lost, the application
number. For this reason, this application will grab the will automatically send SMS or Email to the owner
IMIE number at first and will send it to the mobile owner. about its current location and other details of its lost
• GPS Location can be traced by the mobile companies, but state.
that service is costly and time consuming. If the owner 3. When the application finds that the mobile device is lost,
can find the location of the mobile device with the help of it will try to send the device's current location and other
a small application then he or even the police does not details of its lost state to the owner of the device both via
need to go to mobile company for GPS location anymore. SMS and Email.
• If the SIM has no balance or no internet connection, in
• If the mobile device is lost, and if the new user (or maybe
this case the application will try to resend the SMS or
thief) changes the SIM (of the lost mobile) frequently, in
Email when the SIM's account is recharged next time,
that case it will be hard for one mobile company to trace
or the internet connection is activated.
the GPS location or the even the IMIE number. This
situation will not impact the application anyhow, because
The information that this application will send to the owner
in any situation proposed application will be able to send
are:
the IMIE number or the GPS location by either SMS or
IMIE Number: IMIE refers to 'International Mobile
via Email.
Station Equipment Identity' which is a unique number to
• Android mobiles are now being available even within identify any mobile devices [9].
6500 BDT. The mobile owners must not go to file a case GPS Location: GPS refers to the Global Positioning
to the Mobile Service Provider or to the Police and System, which is a space-based satellite navigation system that
expend huge money to retrieve their cheap mobile if this provides location and time information in all weather,
recovery work can be done using a small application. This anywhere on or near the Earth, where there is an unobstructed
application is making the recovery cost of the lost mobile line of sight to four or more GPS satellites [10].
devices cheaper and the process easier. SIM Number: SIM refers to "Subscriber Identity Module"
• This application uses both SMS and Email based which has a unique number to identify a user of any mobile
communication media with the owner after it gets stolen service providing company [11].
or lost. Keeping two options makes this application more
effective to retrieve it. Maximum available applications Last 10 Dialed Numbers: This will help to trace the people
do not provide this facility. with whom the intruder or the new receiver of the mobile
device is contacting.
4. If any person tries to uninstall the application, it will
prevent that by asking the master key password To track the "SIM card change" the application will
compares current SIM number with the last time used SIM
• This strengthens the security of the application.
number. For this the AndroidManifest.xml should contain the
C. Technology Used for Proposed Application android.permission.READ_PHONE_STATE uses
This application has been developed using Java permission. On Application layer, “TelephonyManager” class
Programming Language (J2SE) to run on the Android OS, one and the “getLine1Number()” function. Here, the
of the Linux Operating Systems. As tool we have used are “getLine1Number ()” function will retrieve the current
Eclipse and Android SDK. For designing the interface we SIM's number, which will be compared with the previously
have used Photoshop and Eclipse's built-in designing features. used SIM's number [18]. When this comparison will return
1) Java Programming Language that, both the numbers are not same, the application will
The Java Standard Edition (J2SE) will be used which is a understand that the SIM card is changed; therefore, the mobile
widely used platform for programming in the Java language. It is lost or stolen. Moreover, in developing country usually SIM
is the Java Platform used for deploying portable applications. card may not contain SIM number. Therefore, sometimes
2) Linux Operating System getLine1Number() returns NULL. In such case
Android is a Linux based operating system which is getSimSerialNumber method returns the SIM
designed primarily for Touch Screen mobile devices such as identification Number. Another way to detect SIM number is
Smart-Phone and Tablet-Computers [14]. The Android OS to retrieve that number from operator by dialing specific
will be used for developing this application because now a string. For example, in Bangladesh SIM Number can be
days maximum mobile are being developed on the Android grabbed by dialing following key strings [22]:
OS platform. a. From GrameenPhone : *2#
3) Eclipse b. From Banglalink : *511#
It is a tool that helps to develop desktop and mobile c. From Robi : *140*2*4#
applications. It has a plugin ADT (Android Development d. From Airtel : *121*6*3#
Tools) that will also be used for developing this application
[15]. When this code is dialed, it returns the number from the
4) Android SDK operator, and that can be saved using proposed application.
It is a Software Development Kit developed by Android, 2) Obtain IMIE Number
which is necessary to develop this application [16]. Point to be Obtaining IMIE number is the main action to be done for
noted that, now a days, Google has released a software bundle tracing a mobile device. As maximum people do not know
named 'Android ADT' (i.e. Android Development Tool) which their device’s IMIE number, tracing it can help best to retrieve
contains both 'Eclipse' and 'Android SDK' together [17]. This the lost devices. When the application finds that it is lost, it
has made the setup and configuration of Eclipse and Android will trace the IMIE number and will send it to the actual
SDK easy to the mobile application developers. owner of the device either via SMS or Email [19]. In
D. Implementation Process of Proposed Application AndroidManifest.xml file READ_PHONE_STATE permission
should be added. In addition the following code snippet
The implementation process of the proposed application can
returns the IMIE Number. getDeviceId() method of
be as following
1) Confirmation of Mobile Loss TelephonyManagerclass returns the IMIE number.
First step of this proposed application is to confirm that the 3) Get Current Geographical Location
device is lost. Unlike some other existing applications [23], Getting the lost mobile’s current location is another major
the proposed application also detect whether the mobile is lost action to be taken. For this the Android “Geocoder” class is
if the SIM card is changed. This process may cause confusion used. This class helps to retrieve the accurate latitude and
as SIM card can be changed by owner of the mobile device longitude of the lost device, by which one can trace his
which is not a lost state for the mobile. But, as for an device’s exact location wherever it is [23, 24]. At first, an
application there is no alternative way to understand whether object of the “Geocoder” class is created. Then, the
the mobile is lost or not, it is considered that generally the “getFromLocation” function is called to which retrieves the
owners do not change their SIM card very frequently. latitude and longitude of the device. Next, the application will
check whether the latitude and longitude is correctly retrieved
or not, and finally it will be sent to the owner via SMS or
Mobile is Mobile is
not Lost SIM Card Email [25, 26]. From the latitude and longitude the country
Lost
N Changed Y name, city name, road name etc can be found [27]. But Google
Map or other maps are not 100% accurate in the case of
undeveloped and newly developing countries. For this reason,
Figure 1: Mobile Lost State Detection
the application will retrieve only latitude and longitude, as it PRE_CONFIGURD_NUMBER The SIM number to which
SMS would be sent
can be said as 100% perfect. This entire process is done
through three steps, which can be clear from the below figure
2. E. Algorithm of Proposed Application
Figure 3 depicts the whole scenario of the proposed
Run GeoCoder application.

Get Latitude and Longitude

Find the Street, Road, City and Country by


comparing the Latitude and Longitude from
the database of Google Map

Figure 2: Workflow of GeoCodeRetrival


4) Get Last Dialed Numbers List
This application also grabs last dialed numbers of the thief. Figure 3: Scenario of Proposed Application
Sometime this helps to trace about whom the thief is Finally algorithm 1 describes the functionality of proposed.
contacting. For retrieving the last dialed numbers the Algorithm 1: Algorithm of Proposed application
“getContentResolver ()” function is called at first [28]. If the
number is saved in the mobile, then this application will also Pre-condition:
be able to trace the numbers including the number’s owner. i. The application (A) is installed and running
For this action the “getColumnIndex ()” function is used [29]. background
ii. SIM card is changed from previous SIM card
5) Sending Automatic SMS to the Mobile Owner Number
Post-Condition:
Sending the grabbed information to the Mobile Owner is the i. Owner can know the current location and phone
main action that will help the owner to retrieve the lost mobile activity of lost mobile
device. At first, for sending SMS the application will request
permission from the OS by calling “android.permission” for
1 Service of A is invoked
“SEND_SMS” and “RECEIVE_SMS” options both. Next the
2 Retrieve IMIE Number, SIM number, Last
“Intent” class will be called to call the Intent function so that
MAX_DAILED dialed number, last
the SMS can be delivered to the owner. After that, the
MAX_GEO_LOCATION Geographical locations and
“smsIntent.putExtra()” function will prepare the SMS for the
stored as a SMS as well as offline email
owner. And finally, with the help of “start Activity () function
3 Check Balance to send SMS to
the SMS will be sent to the owner [30].
PRE_CONFIGURD_NUMBER
3.1 If Balance is sufficient for SMS, Send Saved
6) Keep the Action as Pending in case of Unsuccessful
SMS with information retrieved at step 2
Notification
3.2 Else Check for internet connection
There may be a case like the mobile is out of balance or has 3.2.1 If Internet Connection is available Send saved
no internet connection. In such case the application will offline email
keep its action pending, and wait for future favorable Else wait for Internet Connection and periodically
condition. When the application will find balance or internet check step 3 and 3.2
connection it will instantly send notification about the detailed
statement of the lost mobile. The below figure can make this
action clear.
Table 1: Notation used in Algorithm 1
IV. CONCLUSIONS
Notation Meaning
MAX_DAILED Maximum number of recent
This application is a very useful one for users to make their
called numbers mobile devices secure. Up to now lost mobile devices are
MAX_GEO_LOCATION Maximum number of recent tracked with the support of national security services with the
location help of telecommunication service providers, which needs a
lot of steps and formalities. But this application makes this [16] Android Developer Site -
http://developer.android.com/tools/help/index.html
process easy and convenient for even the normal user level.
[17] http://stackoverflow.com/questions/4896715/how-to-fetch-own-mobile-
This application reduces expense, at the same time increase number-in-android
the potentiality to find out the lost device. Another significant [18] http://www.strazzere.com/blog/2008/11/uniquely-identifying-android-
contribution of this paper is decrease in energy consumption. devices-without-special-permissions/
As the service is not running continuously, therefore an [19] http://stackoverflow.com/questions/1972381/how-to-programmatically-
imminent level of energy consumption can be reduced. Further get-the-devices-imei-esn-in-android
[20] http://stackoverflow.com/questions/10173030/fetch-own-mobile-
development can help this application to be a strong tool for number-in-android
mobile security. This project can be a very profitable and as [21] http://tech4u.mwb.im/how-to-know-your-own-mobile-number-
well as effective one for the user and the service provider. grame.xhtml
This project covers all the needs of the anti-theft and anti-lost [22] Geocoder for Android-
protection. Additionally the Virus and other Mobile Infection http://developer.android.com/reference/android/location/Geocoder.html
Protection features can be added with this application. [23] Location for Android
http://developer.android.com/guide/topics/location/obtaining-user-loca
Therefore, this application can be turned into a Total Security
tion.html
Software for any mobile device. This application can be [24] http://stackoverflow.com/questions/5028830/get-current-location-
implemented in Linux based small electronic devices to detect address-for-android-app
lost vehicles and other aspect. Though, now-a-days, this [25] http://android-er.blogspot.com/2011/02/get-address-from-location-
service is available by some security providing companies, but using.html
this project can make the costing of this type of device [26] http://stackoverflow.com/questions/12047507/easy-way-to-get-city-
from-locationmanager-on-android
detection cheaper.
[27] http://stackoverflow.com/questions/9095824/how-to-get-latest-dialed-
no-android
REFERENCES [28] http://developer.android.com/reference/android/provider/CallLog.Calls.h
[1] Wheres My Droid Application Manual - Android Application Store - tml
https://play.google.com/store/apps/details?id=com.alienmanfc6.wheresm [29] http://stackoverflow.com/questions/10607361/android-send-sms-
yandroid automatically-on-button-click
[2] Wheres My Droid Application Manual - Android Application Store - [30] Howard Edward Kagay, Jr. -Method and apparatus for operating a lost
https://play.google.com/store/apps/details?id=com.alienmanfc6.wheresm mobile communication device - Patient No: US6782251 B2 - August 24,
yandroid&review 2004.
[3] Mobile AntiVirus Security PRO - Android Application Store- [31] SeppoHelle, Paimio -Method and Apparatus for controlling and security
https://play.google.com/store/apps/details?id=org.antivirus mobile phone that are Lost, Stolen or Missed - Patient No: US6662623
[4] avast! Mobile Security - Android Application Store- B1 - December 9, 2003.
https://play.google.com/store/apps/details?id=com.avast.android.mobiles [32] D. Chincholle, Michael Goldstein, M. Nyberg, M. Eriksson - Lost or
ecurity Found? A usability evaluation of Mobile navigation and location-based
[5] Bitdefender Anti-Theft - Android Application Store - Service - Human Computer Interaction with Mobile Devices, Lecture
https://play.google.com/store/apps/details?id=com.bitdefender.antitheft Notes in Computer Science - Vol: 2411 - Year 2002 - PP. 211-224.
[6] https://play.google.com/store/apps/details?id=com.comodo.mobile.como [33] James Keogh - The Complete Reference, J2ME - TATA McGraw-Hill
doantitheft Publishing Company Limited - New Delhi.
[7] Anti Theft Free - Android Application Store - [34] Jeff Friesen - Learn Java for Android Development - Apress - Canada.
https://play.google.com/store/apps/details?id=br.com.maceda.android.an [35] Peter Hsieh, Troy Steinbauer - Mobile Device Theft Recovery
tifurto Application - University of California, Santa Barbara.
[8] Proactive Detection and Recovery of Lost Mobile Phones - Ong, Chen http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.175.9985&rep
Hui; Kasim, Nelly; Jayasena, SajindraKolithaBandara; Rudolph, Larry; =rep1&type=pdf
Cham, Tat Jen - January 2005 - Massachusetts Institute of Technology, [36] George Stefan Bogdan - Mobile Remote Control Architecture - Journal
Singapore. of Mobile, Embedded and Distributed Systems (2012) - Vol 4, No 1.
[9] http://en.wikipedia.org/wiki/International_Mobile_Station_Equipment_I [37] Y Fledel, AShabtai, D Potashnik, Y Elovici - Google Android: An
dentity Updated Security Review - International Arab Journal of Information
[10] Global Positioning System Technology (2010) - Volume 76, 2012, PP. 401-414.
http://en.wikipedia.org/wiki/Global_Positioning_System [38] Ben Fagin, Frank Sposaro, and Gary Tyson - Indoor tracking of geriatric
[11] Subscriber identity module patients using bluetooth - First AMA IEEE Medical Technology
http://en.wikipedia.org/wiki/Subscriber_identity_module Conference on Individualized Healthcare - March 2010.
[12] http://download.oracle.com/javase/1.5.0/docs/ [39] R. Agarwal -Android authentication and device administration API -
Journal of Computing Sciences in Colleges archive - Volume 27 Issue 5
[13] http://en.wikipedia.org/wiki/Android_(operating_system)
- May 2012 - PP. 187-195.
[14] Eclipse IDE for Andorid -http://www.eclipse.org/downloads
[15] Android SDK - http://developer.android.com/sdk/index.html

Вам также может понравиться