1,224 research outputs found

    A Home Security System Based on Smartphone Sensors

    Get PDF
    Several new smartphones are released every year. Many people upgrade to new phones, and their old phones are not put to any further use. In this paper, we explore the feasibility of using such retired smartphones and their on-board sensors to build a home security system. We observe that door-related events such as opening and closing have unique vibration signatures when compared to many types of environmental vibrational noise. These events can be captured by the accelerometer of a smartphone when the phone is mounted on a wall near a door. The rotation of a door can also be captured by the magnetometer of a smartphone when the phone is mounted on a door. We design machine learning and threshold-based methods to detect door opening events based on accelerometer and magnetometer data and build a prototype home security system that can detect door openings and notify the homeowner via email, SMS and phone calls upon break-in detection. To further augment our security system, we explore using the smartphone’s built-in microphone to detect door and window openings across multiple doors and windows simultaneously. Experiments in a residential home show that the accelerometer- based detection can detect door open events with an accuracy higher than 98%, and magnetometer-based detection has 100% accuracy. By using the magnetometer method to automate the training phase of a neural network, we find that sound-based detection of door openings has an accuracy of 90% across multiple doors

    Locational wireless and social media-based surveillance

    Get PDF
    The number of smartphones and tablets as well as the volume of traffic generated by these devices has been growing constantly over the past decade and this growth is predicted to continue at an increasing rate over the next five years. Numerous native features built into contemporary smart devices enable highly accurate digital fingerprinting techniques. Furthermore, software developers have been taking advantage of locational capabilities of these devices by building applications and social media services that enable convenient sharing of information tied to geographical locations. Mass online sharing resulted in a large volume of locational and personal data being publicly available for extraction. A number of researchers have used this opportunity to design and build tools for a variety of uses – both respectable and nefarious. Furthermore, due to the peculiarities of the IEEE 802.11 specification, wireless-enabled smart devices disclose a number of attributes, which can be observed via passive monitoring. These attributes coupled with the information that can be extracted using social media APIs present an opportunity for research into locational surveillance, device fingerprinting and device user identification techniques. This paper presents an in-progress research study and details the findings to date

    DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification

    Full text link
    Copresence verification based on context can improve usability and strengthen security of many authentication and access control systems. By sensing and comparing their surroundings, two or more devices can tell whether they are copresent and use this information to make access control decisions. To the best of our knowledge, all context-based copresence verification mechanisms to date are susceptible to context-manipulation attacks. In such attacks, a distributed adversary replicates the same context at the (different) locations of the victim devices, and induces them to believe that they are copresent. In this paper we propose DoubleEcho, a context-based copresence verification technique that leverages acoustic Room Impulse Response (RIR) to mitigate context-manipulation attacks. In DoubleEcho, one device emits a wide-band audible chirp and all participating devices record reflections of the chirp from the surrounding environment. Since RIR is, by its very nature, dependent on the physical surroundings, it constitutes a unique location signature that is hard for an adversary to replicate. We evaluate DoubleEcho by collecting RIR data with various mobile devices and in a range of different locations. We show that DoubleEcho mitigates context-manipulation attacks whereas all other approaches to date are entirely vulnerable to such attacks. DoubleEcho detects copresence (or lack thereof) in roughly 2 seconds and works on commodity devices

    Asynchronous Ultrasonic Trilateration for Indoor Positioning of Mobile Phones

    Get PDF
    Spatial awareness is fast becoming the key feature on today‟s mobile devices. While accurate outdoor navigation has been widely available for some time through Global Positioning Systems (GPS), accurate indoor positioning is still largely an unsolved problem. One major reason for this is that GPS and other Global Navigation Satellite Systems (GNSS) systems offer accuracy of a scale far different to that required for effective indoor navigation. Indoor positioning is also hindered by poor GPS signal quality, a major issue when developing dedicated indoor locationing systems. In addition, many indoor systems use specialized hardware to calculate accurate device position, as readily available wireless protocols have so far not delivered sufficient levels of accuracy. This research aims to investigate how the mobile phone‟s innate ability to produce sound (notably ultrasound) can be utilised to deliver more accurate indoor positioning than current methods. Experimental work covers limitations of mobile phone speakers in regard to generation of high frequencies, propagation patternsof ultrasound and their impact on maximum range, and asynchronous trilateration. This is followed by accuracy and reliability tests of an ultrasound positioning system prototype.This thesis proposes a new method of positioning a mobile phone indoors with accuracy substantially better than other contemporary positioning systems available on off-theshelf mobile devices. Given that smartphones can be programmed to correctly estimate direction, this research outlines a potentially significant advance towards a practical platform for indoor Location Based Services. Also a novel asynchronous trilateration algorithm is proposed that eliminates the need for synchronisation between the mobile device and the positioning infrastructure

    Positioning Techniques with Smartphone Technology: Performances and Methodologies in Outdoor and Indoor Scenarios

    Get PDF
    Smartphone technology is widespread both in the academy and in the commercial world. Almost every people have today a smartphone in their pocket, that are not only used to call other people but also to share their location on social networks or to plan activities. Today with a smartphone we can compute our position using the sensors settled inside the device that may also include accelerometers, gyroscopes and magnetometers, teslameter, proximity sensors, barometer, and GPS/GNSS chipset. In this chapter we want to analyze the state-of-the-art of the positioning with smartphone technology, considering both outdoor and indoor scenarios. Particular attention will be paid to this last situation, where the accuracy can be improved fusing information coming from more than one sensor. In particular, we will investigate an innovative method of image recognition based (IRB) technology, particularly useful in GNSS denied environment, taking into account the two main problems that arise when the IRB positioning methods are considered: the first one is the optimization of the battery, that implies the minimization of the frame rate, and secondly the latencies due to image processing for visual search solutions, required by the size of the database with the 3D environment images

    LPcomS: Towards a Low Power Wireless Smart-Shoe System for Gait Analysis in People with Disabilities

    Get PDF
    Gait analysis using smart sensor technology is an important medical diagnostic process and has many applications in rehabilitation, therapy and exercise training. In this thesis, we present a low power wireless smart-shoe system (LPcomS) to analyze different functional postures and characteristics of gait while walking. We have designed and implemented a smart-shoe with a Bluetooth communication module to unobtrusively collect data using smartphone in any environment. With the design of a shoe insole equipped with four pressure sensors, the foot pressure is been collected, and those data are used to obtain accurate gait pattern of a patient. With our proposed portable sensing system and effective low power communication algorithm, the smart-shoe system enables detailed gait analysis. Experimentation and verification is conducted on multiple subjects with different gait including free gait. The sensor outputs, with gait analysis acquired from the experiment, are presented in this thesis

    Context-awareness for mobile sensing: a survey and future directions

    Get PDF
    The evolution of smartphones together with increasing computational power have empowered developers to create innovative context-aware applications for recognizing user related social and cognitive activities in any situation and at any location. The existence and awareness of the context provides the capability of being conscious of physical environments or situations around mobile device users. This allows network services to respond proactively and intelligently based on such awareness. The key idea behind context-aware applications is to encourage users to collect, analyze and share local sensory knowledge in the purpose for a large scale community use by creating a smart network. The desired network is capable of making autonomous logical decisions to actuate environmental objects, and also assist individuals. However, many open challenges remain, which are mostly arisen due to the middleware services provided in mobile devices have limited resources in terms of power, memory and bandwidth. Thus, it becomes critically important to study how the drawbacks can be elaborated and resolved, and at the same time better understand the opportunities for the research community to contribute to the context-awareness. To this end, this paper surveys the literature over the period of 1991-2014 from the emerging concepts to applications of context-awareness in mobile platforms by providing up-to-date research and future research directions. Moreover, it points out the challenges faced in this regard and enlighten them by proposing possible solutions

    Developments of a centimeter-level precise muometric wireless navigation system (MuWNS-V) and its first demonstration using directional information from tracking detectors

    Full text link
    Various positioning techniques such as Wi-Fi positioning system have been proposed to use in situations where satellite navigation is unavailable. One such system, the muometric positioning system (muPS), was invented for navigation which operates in locations where even radio waves cannot reach such as underwater or underground. muPS takes advantage of a key feature of its probe, cosmic-ray muons, which travel straightforwardly at almost a speed of light in vacuum regardless of the matter they traverse. Similar to other positioning techniques, muPS is a technique to determine the position of a client's muPS receiver within the coordinate defined by reference detectors. This can be achieved either by using time-of-flight (ToF) or angle of arrival (AoA) measurements. The latter configuration (AoA), called the Vector-muPS has recently been invented and the present paper describes the developments of the first prototype of a vector muometric wireless navigation system (MuWNS-V) with this new vector-muPS concept and its demonstration. With MuWNS-V, the reference tracker and the receiver ran wirelessly with fully independent readout systems, and a positioning accuracy of 3.9 cm (RMS) has been achieved. We also evaluated the outcome of measuring continuous indoor localization of a moving receiver with this prototype. Our results indicated that further improvements in positioning accuracy will be attainable by acquiring higher angular resolution of the reference trackers. It is anticipated that "sub-cm level" navigation will be possible for muPS which could be applied to many situations such as future autonomous mobile robot operations.Comment: 11 pages, 9 figure

    Native Apps versus Web Apps: which is best for healthcare applications?

    Get PDF
    Smartphone applications (Apps) provide a new way to deliver healthcare, illustrated by the fact that healthcare Apps are estimated to make up over 30% of new Apps currently being developed; with this number seemingly set to increase as the benefits become more apparent. In this paper, using the development of an In Vitro Fertilisation (IVF) treatment stress study App as the exemplar, the alternatives of Native App and Web App design and implementa-tion are considered across several factors that include: user interface, ease of development, capabilities, performance, cost, and potential problems. Development for iOS and Android platforms and a Web App using JavaScript and HTML5 are discussed

    Survey and Systematization of Secure Device Pairing

    Full text link
    Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices. Comparison and assessment of SDP schemes is troublesome, because each scheme makes different assumptions about out-of-band channels and adversary models, and are driven by their particular use-cases. A conceptual model that facilitates meaningful comparison among SDP schemes is missing. We provide such a model. In this article, we survey and analyze a wide range of SDP schemes that are described in the literature, including a number that have been adopted as standards. A system model and consistent terminology for SDP schemes are built on the foundation of this survey, which are then used to classify existing SDP schemes into a taxonomy that, for the first time, enables their meaningful comparison and analysis.The existing SDP schemes are analyzed using this model, revealing common systemic security weaknesses among the surveyed SDP schemes that should become priority areas for future SDP research, such as improving the integration of privacy requirements into the design of SDP schemes. Our results allow SDP scheme designers to create schemes that are more easily comparable with one another, and to assist the prevention of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications Surveys & Tutorials 2017 (Volume: PP, Issue: 99
    corecore