A Secure Screen Lock System For Android Smart Phones Using Accelerometer Sensor.
A Secure Screen Lock System For Android Smart Phones Using Accelerometer Sensor.
Mr. D. Jayakumar
Assistant Professor
Department of Computer Application
IFET College of Engineering
Abstract
Now-a-day smart phones play vital roles in peoples day to day work. Smart phones are an important asset for people living in
the 21st century. With functionality similar to computers, smart phones have become all-in-one portable devices providing
interconnectivity and device-to-device communication. Such continuous improvement in capabilities will cause the popularity of
smart phones to constantly rise. Since todays android mobiles contain many securities on locking system like pattern, Personal
Identification Number (PIN), Passwords, touch lock, voice and face recognition etc. These aspects are could be easily tracked by
the hackers and techniques like face and voice recognition would require more memory and process to adopt. This paper will
provide a simple and effective mode of security lock for the android smart phones. Such as, this paper will creates security lock
and unlock of an android mobile is by shaking mobile devices by using Accelerometer sensor which is present in the mobile
devices.
Keywords: Accelerometer, DB Manager, Encryption, Face and Voice recognition, Smartphones, Screen lock, etc
________________________________________________________________________________________________________
I. INTRODUCTION
The smart multimedia devices that have been developed through active and continuous research on IT have penetrated deeply
into their users daily living. In particular, multimedia smart phones provide users with basic functions such as an alarm, memos,
contacts, and camera, as well as having various other features. In this way, they increase leisure time utilization and convenience.
In addition, it is also utilized for various purposes such as networking services (e.g., chatting, social networking service, blog,
email, etc.) for real-time communication with other users, work processing, and multimedia services (e.g., video chatting,
multimedia device control, or multimedia data sharing). For these reasons, the penetration rate of the multimedia smart-phone
has continuously increased. According to the statistics provided by Strategy Analytics (SA), an IT market research institution,
the number of the multimedia smart phone users currently exceeds 1 billion.
However, since the multimedia smart phones are taken everywhere by users always because of its convenient features, they
are likely to be lost or stolen. As a result, most multimedia smart phones are now equipped with various built-in locking features.
These include a personal identification number (PIN), which uses a simple number combination; a password, which uses
numbers and characters; pattern lock via dragging in the preferred direction; face recognition of the user; face and voice
recognition of the user; and drag to hide the screen. Among these, pattern lock, PINs, and passwords are the most widely used
locking features, but they are highly vulnerable to shoulder surfing and smudge attacks, and therefore a new type of locking
system is required. Therefore, the enhanced lock function is required to be processed multimedia content effectively due to
increase in the popularity of smart devices.
In this paper, we propose a secure locking screen using mobile device shaking will increase convenience of users for
supporting human-centric mobile access completely. The smart multimedia devices that have been developed through active and
continuous research on IT have penetrated deeply into their users daily living. For these reasons, the penetration rate of the
multimedia smart-phone has continuously increased.
96
A Secure Screen Lock System for Android Smart Phones using Accelerometer Sensor
(IJSTE/ Volume 1 / Issue 10 / 019)
97
A Secure Screen Lock System for Android Smart Phones using Accelerometer Sensor
(IJSTE/ Volume 1 / Issue 10 / 019)
98
A Secure Screen Lock System for Android Smart Phones using Accelerometer Sensor
(IJSTE/ Volume 1 / Issue 10 / 019)
IX. CONCLUSION
Although multimedia smartphones have become very popular among the general public thanks to their simple portability and
various convenient features, the risk of important data loss due to phone loss or theft by a malicious third party has also
increased. For these reasons, users of multimedia smartphones employ the built-in locking features in the multimedia
smartphone. However, typical locking features have low security strength and are vulnerable to the shoulder surfing and smudge
attacks, where passwords can be determined easily.
We proposed the SLSTP to provide convenience and improved security to users for supporting human-centric multimedia
device completely. The SLSTP showed the strongest security against a smudge attack compared with the pattern lock, password,
and PIN, which are the most frequently used security approaches in multimedia smartphones. Since the LSTP uses logical data,
the locking feature in the smart multimedia device can be strengthened, making itmore difficult to conjecture the password
pattern. Furthermore, the SLSTP provides enhanced usability because it is structured with a simple interface that involves simple
pressing and releasing.
99
A Secure Screen Lock System for Android Smart Phones using Accelerometer Sensor
(IJSTE/ Volume 1 / Issue 10 / 019)
X. FUTURE ENHANCEMENTS
A Secure Screen Lock System for Android Smart Phones Using Accelerometer Sensor is proposed study on smart screen lock
for smart phones. This system could even more effective when these procedures are used along with time constraints. The system
security could be increase by using the above reported process of mobile shaking with respect to direction along with timing
constraints while on user input and could be verifed on locking and unlocking the screen of mobile within the reported time.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith, Smudge attacks on smartphone touch screens, in Proceedings of the 4th USENIX
Conference on Offensive Technologies, pp. 17, USENIX Association, August 2010.
D. van Bruggen, S. Liu, M. Kajzer, A. Striegel, C. R. Crowell, and J. DArcy, Modifying smartphone user locking behavior, in Proceedings of the 9th
Symposium on Usable Privacy and Security (SOUPS 13), pp. 114, ACM, July 2013.
T. Kwon and S. Na, TinyLock: af fordable defense against smudge attacks on smartphone pattern lock systems, Comput-ers & Security, vol. 42, pp. 137
150, 2014.
O. Lindemann and M. H. Fischer, Learning effects of arithmetic problem solving while unlocking a mobile phone, Tech. Rep., 2013.
J. Ahn and R. Han, An indoor augmented-reality evacuation system for the smartphone using personalized pedometry, Human-Centric Computing and
Information Sciences, vol. 2, no. 18, 2012.
H. J. Lee, A study on the business strategy of smart devices for multimedia contents, Journal of Information Processing System, vol. 7, no. 3, pp. 543
548, 2011.
L.-P. Cheng, F.-I. Hsiao, Y.-T. Liu, and M. Y. Chen, Automatic screen rotation based on face orientation, in Proceedings of the SIGCHI Conference on
Human Factors in Computing Systems, pp. 22032210, 2012.
D. Balfanz, G. Durfee, D. K. Smetters, and R. E. Grinter, In search of usable security: five lessons from the field, IEEE Security and Privacy, vol. 2, no.
5, pp. 1924, 2004.
B. Bulgurcu, H. Cavusoglu, and I. Benbasat, Information security policy compliance: an empirical study of rationality-based beliefs and information
security awareness, MIS Quarterly, vol. 34, no. 3, pp. 523548, 2010.
Y. Qin, W. Tong, J. Liu, and Z. Zhu,, SmSD: a smart secure deletion scheme of SSDs, Journal of Convergence, vol. 4, no. 4, pp. 3035, 2013.
S. D. Levitt, Understanding why crime fell in the 1990s: four factors that explain the decline and six that do not, Journal of Economic Perspectives, vol.
18, no. 1, pp. 163190, 2004.
C. Vroom and R. von Solms, Towards information security behavioural compliance, Computers and Security, vol. 23, no. 3, pp. 191198, 2004.
M. Workman, W. H. Bommer, and D. Straub, Security lapses and the omission of information security measures: a threat control model and empirical
test, Computers in Human Behavior, vol. 24, no. 6, pp. 27992816, 2008.
100