We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Authentication System for Android Smartphones

by Swapnil Waghmare, Madhumita Chatterjee, Satish L. Varma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 87 - Number 5
Year of Publication: 2014
Authors: Swapnil Waghmare, Madhumita Chatterjee, Satish L. Varma
10.5120/15204-3602

Swapnil Waghmare, Madhumita Chatterjee, Satish L. Varma . Authentication System for Android Smartphones. International Journal of Computer Applications. 87, 5 ( February 2014), 19-24. DOI=10.5120/15204-3602

@article{ 10.5120/15204-3602,
author = { Swapnil Waghmare, Madhumita Chatterjee, Satish L. Varma },
title = { Authentication System for Android Smartphones },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 87 },
number = { 5 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 19-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume87/number5/15204-3602/ },
doi = { 10.5120/15204-3602 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:06:24.398167+05:30
%A Swapnil Waghmare
%A Madhumita Chatterjee
%A Satish L. Varma
%T Authentication System for Android Smartphones
%J International Journal of Computer Applications
%@ 0975-8887
%V 87
%N 5
%P 19-24
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The dawn of the personal computer era gave birth to a new type of criminal, the hacker. Today there is a new even more attractive target for hackers to exploit, the Android smartphones. These devices allow us to use internet, camera, GPS tracking, and more features. Smartphones also contain detailed records of our contacts and SMS. The hacker then uses these records for committing identity theft. Hence to provide security to Android smartphone we have developed a circular screen locking application. This application provides various features like unlock phone using random number, taking system backup via email, receive notification of SIM change via message, track incoming calls and messages when our smartphone is lost or stolen. This helps user to know who is calling and sending messages on their device. Hence this application satisfies the need of today's users & applications.

References
  1. Kwang Il Shin, Ji Soo Park, Jae Yong Lee, Jong Hyuk Park "Design and Implementation of Improved Authentication System for Android Smartphone Users",26th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2012.
  2. Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa "How Secure is your Smartphone: An Analysis of Smartphone Security Mechanisms",IEEE International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012.
  3. Takayuki Matsudo, Eiichiro Kodama, Jiahong Wang, and Toyoo Takata "A Proposal of Security Advisory System at the Time of the Installation of Applications on Android OS",15th IEEE International Conference on Network-Based Information Systems (NBiS), 2012.
  4. Te-en wei, Albert b. Jeng, Hahn-ming lee, Chih-how chen, Chin-wei tien"Android privacy",IEEE International Conference on Machine Learning and Cybernetics (ICMLC), 2012.
  5. Yi Guo, Lei Yang, Xuan Ding, Jinsong Han, Yunhao Liu "OpenSesame: Unlocking Smart Phone through Handshaking Biometrics",IEEE INFOCOM 2013
  6. Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, and Dawn Song" Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication",IEEE Transaction On Information Forensics and Security, Vol. 8, No. 1, January 2013.
  7. Ananda Kanagaraj S, Arjun G, Shahina A "Cheeka : A mobile application for personal safety",9th IEEE International Conference On Collaborative Computing : Networking, Applications and Worksharing 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Smartphone hacker authentication security