A NOVEL APPORACH FOR ANDROID SECURITY SYSTEM Ritu B. Malhotra 1, Ashmita A. Fulzele 1, Rajeev N.Verma 2 1 UG Student,



Similar documents
Android support for Microsoft Exchange in pure Google devices

Android Support on Galaxy Nexus, Nexus S, and Motorola Xoom for Microsoft Exchange Policies

How MFLC Counselors Encrypt their Verizon Motorola Razr or Sprint/AT&T Samsung Galaxy S II. Smartphone

Android Application Analyzer

Mobile Operating Systems & Security

Avira Free Android Security (version 1.2) HowTo

Mobile Biometric Security Systems for Today and Future

Securing your credit *

Android Phone Controlled Robot Using Bluetooth

SECUDROID - A Secured Authentication in Android Phones Using 3D Password

Issues in Android on Mobile Platform and Their Resolution

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

Brainloop Secure Dataroom Version QR Code Scanner Apps for ios Version 1.1 and for Android

An ECG Monitoring and Alarming System Based On Android Smart Phone

Micro-Environment Sensor based Android Application More Ketan Dadasaheb 1 Computer Department SCSCOE Pune, India Jagtap Pravin Vitthal 3

NetIQ Advanced Authentication Framework - Smartphone Applications

Design and Implementation of Automatic Attendance Check System Using BLE Beacon

Mobile Iron User Guide

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Challenges in Android Application Development: A Case Study

International Journal of Software and Web Sciences (IJSWS)

A Review of Different Comparative Studies on Mobile Operating System

Framework for Biometric Enabled Unified Core Banking

Deltek Touch Time & Expense for GovCon. User Guide for Triumph

BlackShield Authentication Service

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

One-Time Password Contingency Access Process

AirWatch for Android Devices

AT&T Global Network Client for Android. Version History

Dynamic Query Updation for User Authentication in cloud Environment

LIBRARY ACCESS SYSTEM SMARTPHONE APPLICATION USING ANDROID

User Guide. SafeNet MobilePASS for Windows Phone

Demonstration of Barcodes to QR Codes through Text Using Document Software

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

Using Devices. Chapter 3

Implementation of Knock Based Security System

Remote Android Assistant with Global Positioning System Tracking

Quick Start Guide. U.S. Cellular Customer Service:

Tips for Banking Online Safely

Android Driver s App Update Version 1.89 Samsung Galaxy Tab 4

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

Effective Interface Design Using Face Detection for Augmented Reality Interaction of Smart Phone

To Install EdiView IP camera utility on Android device, follow the following instructions:

Setup Guide-Mobility ActiveSync Hosted Exchange Configuration

EZ RMC Remote HMI App Application Guide for Android Devices

This guide describes features that are common to most models. Some features may not be available on your tablet.

Nagpur, Maharashtra, India

Context-aware Library Management System using Augmented Reality

Effective Use of Android Sensors Based on Visualization of Sensor Information

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

g!mobile 6 Android App Android 4.0 or above -- See Android Devices table for compatibility information Document Revision Date: 2/14/2013

Improving Online Security with Strong, Personalized User Authentication

Development. SriSeshaa Technologies. Table of Contents

Cloud Video Service Cisco DX650 User Guide. (Version 1.0)

TCMS V2 WITH OFIS SCANNER

Prachi T. Deokar, Dr. Manoj S. Nagmode Department of Electronics & Telecommunications, MITCOE, Pune, India Prachi.deokar19@gmail.

A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application

Business Mobile App User Guide

Setting up On line Account

Leica ScanStation P20 Remote Control via Android Device

Welcome Guide for MP-1 Token for Microsoft Windows

Mobile Driver s License Solution

Shuaifu Dai 1,3, Alok Tongaonkar 2, Xiaoyin Wang 3, Antonio Nucci 2, Dawn Song 3. Presenter: Mario Baldi 2. Peking University, China 2

AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI

A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION

Microsoft Exchange Information Services and Security Policies Supported by Android 2.2

Accessing the bank account without card and password in ATM using biometric technology

How Do I Log Into Mobile Banking?

Research Article. Research of network payment system based on multi-factor authentication

Fingerprint Identity User Manual for the Griaule Biometric Framework Rev 1.00

Design of Chatting Application Based on Android Bluetooth

Reviewer Guide Core Functionality

Smart Ideas for Smartphone Security

NAILSMA CyberTracker on Android Mobile Devices

MotionAuth: Motion-based Authentication for Wrist Worn Smart Devices

8x8 Virtual Office Mobile User Guide for Android

USAccess System- Registrar. Help Guide. Prepared for

Installation Instructions

BYOD - Provisioning an Android Phone

MOBILE BANKING. Why should I use Mobile Banking?

Mobile Banking FAQ Page 1 of 9

Android Architecture. Alexandra Harrison & Jake Saxton

Electronic Commerce and E-wallet

Workshop on Android and Applications Development

UFED 4PC/Touch 4.1 & UFED Physical/Logical Analyzer Release Notes

AUTOMATE CRAWLER TOWARDS VULNERABILITY SCAN REPORT GENERATOR

MRED Guide to: Managing Your PREMIUM Goomzee Account

Business Mobile Banking

AT&T Voic Viewer User Guide

Multi-factor authentication

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

Online Banking User Guide

Internet Banking Two-Factor Authentication using Smartphones

Transcription:

International Journal of Computer Engineering and Applications, Volume X, Issue I, Jan. 16 www.ijcea.com ISSN 2321-3469 A NOVEL APPORACH FOR ANDROID SECURITY SYSTEM Ritu B. Malhotra 1, Ashmita A. Fulzele 1, Rajeev N.Verma 2 1 UG Student, 2 Professor, Nagpur Institute of Technology,Nagpur-441501, India ABSTRACT: The dawn of the personal computer period gave birth to a new type of criminal, the hacker. Today there is a new even more attractive target for hackers to capitalize on, the Android smartphones. These devices allow us to use internet, camera, GPS tracking, and more attributes. Smartphones also contain detailed records of our contacts and SMS. The hacker then uses these information for committing identity theft. Hence to provide security to Android smartphone we have developed a circular display locking application. This application provides various features like unlock phone using random number. Hence this application satisfies the need of today s users & applications. Keywords: Android, hacker, authentication, safety. [1] INTRODUCTION Google s Android Operating System in Mobile phones are still relatively new, however, Android Operating System has been progressing quite fast. An Android phone is a smartphone running on Google's open-source Android operating system. Many different process make Android phones, including HTC, Motorola, and Samsung. Bunch of different Android phones are now available in market and all of the major cellular carriers in the U.S. offer Android phones [2]. Today s day to day life almost every user has an Android Smartphone because of the features such as multitasking, ease of notifications, app market, various phone options and android widgets [3]. The numbers of users having smartphones equipped with GPS have increased quikly. Hence, it can be used efficiently for personal security or various other security purposes [7]. Most of the users keep their smartphones with them at all times, the likelihood of it getting left behind at a buildings, gym, or other location that they previously visited is probably pretty high and the chances of that left-behind-phone getting stolen and play deeply without their approval is probably even higher. The first line of protection against evil performer is lock screen. However, even with these solutions, major problems could still result after a mobile device is lost. The intended system contains an upgraded Lock Screen system, unlock phone using random number. authentication for the user s convenience and provide a good security system for smartphones [2] TECHNIQUE 61

A NOVEL APPORACH FOR ANDROID SECURITY SYSTEM In usually Android, every user has six different options to choose from lock screen, all of which offer their levels of security. If a user has a inventory Android device like the Galaxy S3, then there are some differences in functionality but for the most part they all act in a similar way [1]. First, to access the lock screen options, the universal location lean to be in Settings-Security. From there, one should see an option towards the top called Screen lock, which then takes us to the lock screen options once touch[1]. Figure 1 Existing Screen Locks [2.1] Slide to Unlock Slide is the most commonly used lock screen of all it s basically the default. This lock screen is not secure by any means, and only asks that the user of the phone catch the circle with a lock inside and slides it outside of a larger circle to unlock the device. There are no passwords or patterns, it s simply a way to keep the phone from turning itself on and then accessing all kind of info in the pocket or purse without your knowing [1]. The nice thing about using Slide is that one can still entry the notifications pull down without having to fully unlock the phone. No other lock screen options allowed for this, as they are technically secure [2.2] Face unlock Face Unlock was explained back in Ice Cream Sandwich as a good way to unlock the phone using a face of the user. In order to set this option up, one has to place his face inside of a mask of dots using front facing camera until the device decides that the face is enough to be disable to lock with it. Once approved, a user will be asked to provide a backup option in case the phone cannot identify his face. The two backup options are PIN or pattern [1]. [2.3] PIN Pattern and Password Pattern, PIN and Password decipher are exactly as they sound. One should either create a pattern, a numeric PIN, or an alpha-numeric password entered in order to unlock the phone. These are likely the most protect of them all. If a user is not able to recognize the pattern, PIN, or password, then he is not allowed to access the phone [1]. [2.4] Fingerprint Checking Fingerprint check technology is becoming increasingly important with everyday security measures and can provide an easy path, effective and reliable means of identification [1]. Atrix smartphone, made by Motorola supplies a finger checking system. Motorola Atrix 4G has a function called Fingerprint Scanner. Overlapping processes on the screen and not so fast speed are the main problems in this system [1].

International Journal of Computer Engineering and Applications, Volume X, Issue I, Jan. 16 www.ijcea.com ISSN 2321-3469 [2.5] Shaking Sensing A handshaking biometric-based upper reach, called OpenSesame is used to unlock the device. For precisely characterizing user s shaking actions, selecting correct sensors is necessary. In this technique the 3-axis accelerometer is used for detecting the hand moving motion. The accelerometer allows smart phones to detect the motion performed on them. The accelerometer in smart phones measures the stimulation of the phone relative to freefall. The accelerometer measures the acceleration of the device in three different axes: X, Y, and Z [5]. [2.6] Continuous Touch-Based Authentication The main hypothesis of this study is that continuously recorded touch info from a touchscreen is distinctive enough to serve as a behavioural biometric. The smart phone records times, finger stress, and the screen areas covered by each finger. A continuous security application could run in the background and extract various functions from all available raw input. This hard input is readily available through the phone s API. Based on various features, the system can then learn a profile of the real user and compare all screen interaction with this profile [6]. [3] PROPOSED MODEL [3.1] System Outline The figure below shows that the owner of the device will first generate.apk file using eclipse. Then governor of the smartphone will install this.apk file in his smartphone. After installing this.apk file governor will proceed to set up the screen lock on his smartphone. The display consists of six circles. Each circle changes its colour maximal of seven times by retouching the circle. There is no regular order for touching the circles. Once retouching is done a password string is created. This password string is then confirmed by ok button. If the string is matched then the phone is not locked [1]. Generate.apk Owner of the Smart phone, Install.apk in Smartphone Figure 2 Screen lock application 63

A NOVEL APPORACH FOR ANDROID SECURITY SYSTEM International Journal of Computer Engineering and Applications, Volume VII, Issue III, Part I, September 14 [3.2] System Architecture Figure 3 Pre-processing in smartphone Fig 4 Architecture for setting and unlocking the screen lock The above figure shows the procedure for setting and unlocking the screen lock. All the info like password, contact numbers, e-mail id etc. are stored in SQLite database which is created in screen lock display application. While unlocking the smartphone these details are verified from SQLite database and if the password is right then our device will unlock. If password is incorrect then further procedure is explained in workflow given. After setting the password the user will be asked to enter that same password for unlocking the device

International Journal of Computer Engineering and Applications, Volume X, Issue I, Jan. 16 www.ijcea.com ISSN 2321-3469 [3.3] Test cases 3.3.1 Unlock the phone The Lock Display consists of six circles. Each circle changes its colour maximal of seven times by retouching the circle, so that the executer can identify the correct input. There is no regular order for touching the circles. Once retouching is done a password string is generated which can be confirmed by ok button. If the string is matched then the phone is not locked. [4] RESULTS AND ANALYSIS This screen locking system provides various features like unlock phone using odd or even number, It is very difficult for the attacker to unlock the phone. In this screen locking system each circle can retouched maximum of seven times. There are total six circles in this lock and therefore it is very difficult to remember the color pattern of each circle. Attacker cannot use a personal data such as contacts and messages. The analysis shows that this screen locking system ensures protection of personal information. User can catch a thief by tracking their own device. The analysis of existing system and implemented system is shown in table 1. There are total three attempts for unlocking the phone. If owner of the smartphone fails to unlock the phone within three attempts then one random number is generated. Using that random number owner can unlock his smartphone. The snapshot of unlocking the phone using random number is shown [5] CONCLUSION It is very difficult for the attacker to remember the color pattern of each circle for unlocking the phone if this screen lock system is used. This is a new approach in which all these features are included in a single application along with circular screen lock system. Hence this application satisfies the need of today s users & applications. Some useful features like data backup, cell phone location, sin change notification call recording, automatic image capturing of the thief can be added in this application. REFERENCES [1] Kwang Il Shin, Ji Soo Park, Jae Yong Lee, Jong Hyuk Park Design and Implementation of Improved Authentication System for Android Smartphone Users,26th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2012. [2] Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa How Secure is your Smartphone: An Analysis of Smartphone Security Mechanisms,IEEE International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012. [3] Takayuki Matsudo, Eiichiro Kodama, Jiahong Wang, and Toyoo Takata A Proposal of Security Advisory System at the Time of the Installation of Applications on Android OS,15th IEEE International Conference on Network-Based Information Systems (NBiS), 2012. [4] Te-en wei, Albert b. Jeng, Hahn-ming lee, Chih-how chen, Chin-wei tien Android privacy,ieee International Conference on Machine Learning and Cybernetics (ICMLC), 2012. [5] Yi Guo, Lei Yang, Xuan Ding, Jinsong Han, Yunhao Liu OpenSesame: Unlocking Smart Phone through Handshaking Biometrics,IEEE INFOCOM 2013 [6] Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, and Dawn Song Touchalytics: On the 65

A NOVEL APPORACH FOR ANDROID SECURITY SYSTEM Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication,IEEE Transaction On Information Forensics and Security, Vol. 8, No. 1, January 2 [7] Jeter, L. Mani, M, Reinschmid, T., University of Colorado, "Smart Phone Malware: The danger and protective strategies", 2011 August. [8] B. Chess, "Improving computer security using extended static checking", IEEE Symposium on Security and Privacy. IEEE Computer Society, 2002 \ [9] "Android - Security" :Google Inc. [online] Available: http://developer.android.com/guide/topics/security/security.html [10]NPD In-Stat (2012). Low-Cost Android Smartphones Will Seize 80% of Market in Africa, India, and China. http://www.instat.com/newmk.asp?id=3343 (Access Date: 24 May, 2012).