SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 44 
MOBILE SECURITY USING WI-FI SIGNAL STRENGTH Aditya Kumar Dwivedi1, Girjesh Kumar Mishra2, Mohan Babu Bansal3 1School of Computer Science and Information Technology, DAVV University, Indore (M.P) 2School of Computer Science and Information Technology, DAVV University, Indore (M.P) 3School of Computer Science and Information Technology, DAVV University, Indore (M.P) Abstract Android is an open source full stack platform for developing applications for mobile phones. Android based smart phones as they are portable devices the vulnerability of theft exists. As for as security is concerned, cost is major issue where the cost of element is not so high, so a cost effective technique is needed to protect phones using existing resources. Currently available method is using GPS, but GPS does not work well at indoor locations, so WI-FI signal strength can be used. It is easy to develop an application that can be applied for securing phones in a particular area as android is an open source platform. Here WI-FI router signal strength is used as a medium to track as well as to protect the devices. In this work an effective security application is presented for android based smart phones that use WI-FI signal strength as a parameter. The application is suitable for identifying position in indoor locations so that mobile phone can become the theft free. Keywords: - Android, Wi-Fi, Security, Signal Strength, WPS 
-------------------------------------------------------------------***------------------------------------------------------------------- 1. INTRODUCTION Wi-Fi positioning system (WPS) is widely being studied in many fields. WPS usually uses Wi-Fi signals from already installed private and public Wi-Fi APs in order to provide the location based service (LBS). WPS complements the measurement error of global positioning system (GPS) in the center of the city or indoor [2]. A smart phone is also known as a cellular phone and a hand phone. Mobile phone is used to make and receive telephone calls over a wide area. Mobile phones also support a wide variety of other services such as text messaging, mms, e- mail, internet access, infrared, Bluetooth, business application, gaming, photography, line chatting, conferencing etc. Mobile phones are playing important vital role and have become an integral part of our life. Mobile phones are being extensively used by every person in the institutes and colleges [3]. Mobile phones and the use of internet in mobiles led to revolution in the field of communication system and lifestyle of the people. People use mobile devices to find application related to their current location these days. Due to the location-based system in mobiles it is easy to use the mobile phones anywhere or in any situation for gathering location related information. Indoor location- based services are a general class of computer program-level services used to include specific controls for indoor locations. Indoor locations are used in a variety of contexts, such as finding malls, nearby indoor objects, entertainment places and work places. 
In this paper, we propose a personal indoor/outdoor WPS system and security on the smart phone using RSS (Received Signal Strength) of signals from dense Wi-Fi access points dedicated for localization [10]. 
2. PROPOSED ALGORITHM 
RSS from each AP is measured three times and the mean value of three RSSs is calculated. Here root mean square (RMS) is used to find the threshold value (T). We use the difference between the mean value and each training value. If the difference is below a threshold (T), the training value is withdrawn and then the mean of filtered training values is calculated again. Finally, the mean value is compared with the value of database and a proper location on the map is found. Then this location is saved in a database and again location is calculated , then compared to last location if both are same then device is there where it should otherwise it is moved. 2.1 Area Used 
Fig: 1 Wi-Fi access point
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 45 
Proposed Algorithm Ss : Strongest Signal Received i,j : No. of iteration R : Training value of RSS R’j : Mean Difference D : Difference of Threshold T : Threshold Rsi :Square of mean Difference 2.2 Algorithm Features 
Parameter 
Proposed Algorithm 
No. of WI-FI used 
<4 
Threshold Calculation 
Practical 
Signal 
Strong, Weak 
Indoor Location 
Yes 
Security 
Yes 
Algorithm 
Standard Deviation 
Working Methodology for Strong and Weak Signals 
Different 
Dedicated WI-FI 
Yes 
3. EXPERIMENTAL ENVIRONMENT The experiment was performed in a floor, which locates in SCSIT DAVV building, DAVV University. An area of 20m by 25m was used for the experiment. One Wi-Fi AP was installed for the experiment. The Smartphone is Galaxy-S Duos made by Samsung and has Android 4.0 O/S. Figure 1 shows the floor plan and AP mounted in the ceiling for the experiment. The threshold for the filtering calculated using the algorithm. If the last location (See Fig: 3) is different from the current location the message is sent to alternate phone no. specifying the new location 
4. DATABASE CONSTRUCT 
RSS is measured at each point on the floor and saved at the database (see Figure 2). The measured RSSs are stored at the database with the cell ID and SSID. And root mean square value 
Table: 1 
S no 
SSID 
Mean Value 
Location 
1 
CiscoAp 
44 
MCA lab door 
2 
CiscoAp 
39 
Electronic lab door 
… 
…. 
…. 
…. 
…. 
…. 
…. 
…. 
..n 
CiscoAP 
…. 
…. 
Table: 2 
Last Location 
New Location 
MCA lab door 
M Tech lab 
5. CONCLUSIONS We developed an indoor WPS and security for Android smart phones. Positioning using Wi-Fi signals is easy to implement and requires lower cost than other localization systems. We installed AP dedicated for localization at specific locations to improve positioning accuracy. We proposed a new algorithm to filter error signals and find the location of the smart phone and send sms if location is changed without permission. It acquires a proper scan time and threshold thereby yielding a low error rate. We expect the indoor WPS for smart phones to be used at various places and provide security. REFERENCES 
[1] Available at http://www.directionsmag.com/articles 
[2] Satya Komatineni and Dave MacLean, “proandroid 4”, XXX publication, YYY Edition, 20ZZ. 
[3] Wallace Jackson, Android Apps for absolute beginners 
[4] Available at http://www.intechopen.com/download/get/type/pdfs/id/13525 
[5] Available at http://www.directionsmag.com/articles/10-things- you-need-to-know-about-indoor-positioning/324602 [6] Available at http://www.psut.jo/sites/osama/4.pdf [7] http://www.doi.ieeecomputersociety.org/10.1109/MDM.2012.68 
[8] Availale at http://mobilware.org/2009/presentations/Mobilware2009_Papliatseyeu_FM_Positioning.PDF [9] Volume 2 Issue 3, 2013 journale- academiauitmt.uitm.edu.my/index.php? [10] An Analysis of Wi-Fi Based Indoor Positioning Accuracy ortus. https://www.ortus.rtu.lv/science/en/publications/12372/fulltext

More Related Content

PPTX
Indoor localization using wifi fingerprinting
PDF
356 358,tesma411,ijeast
PDF
Ijsartv6 i336124
PDF
IRJET- Personal Assistant for Visually Impaired People in Malls
PPTX
Enhancing indoor localization using IoT techniques
PDF
The proposed System for Indoor Location Tracking
PDF
Indoor Positioning System using Magnetic Positioning and BLE beacons
PDF
IRJET- IOT based Intrusion Detection and Tracking System
Indoor localization using wifi fingerprinting
356 358,tesma411,ijeast
Ijsartv6 i336124
IRJET- Personal Assistant for Visually Impaired People in Malls
Enhancing indoor localization using IoT techniques
The proposed System for Indoor Location Tracking
Indoor Positioning System using Magnetic Positioning and BLE beacons
IRJET- IOT based Intrusion Detection and Tracking System

What's hot (20)

PDF
50120140506007 2
PDF
Dual Authentication For Bluetooth Connection
PDF
Dynamic Communication of Wireless Sensor Network
PDF
IRJET- Malicious User Detection and Localization of Wifinetwork in Wirelessne...
PDF
Implementation of embedded real time monitoring temperature and humidity system
PDF
High precision location tracking technology in ir4.0
PDF
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...
PDF
Project Dissertation - ZigBee Based Wireless Sensor Network
PDF
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
PDF
IRJET- Low Cost Personal Digital Assistant with IoT and WSN Capabilities
PDF
Cloud computing in iot seminar report
DOCX
Formatted Paper_References added
PDF
IMAGE PROCESSING BASED INTRUDER DETECTION USING RASPBERRY PI
PDF
IRJET - Dual Verification ATM for Blind People
PPTX
Lecture 6 geolocation
PDF
IRJET- IoT and ML based Smart TV for Child Eyes Safety
PDF
Hiding voice data in center density of speech spectrum for secure transmission
PDF
40120130405021
PDF
Invalidating vulnerable broadcaster nodes using
PDF
IRJET- Secured Perimeter using Voice Recognition and Location Tracking Sy...
50120140506007 2
Dual Authentication For Bluetooth Connection
Dynamic Communication of Wireless Sensor Network
IRJET- Malicious User Detection and Localization of Wifinetwork in Wirelessne...
Implementation of embedded real time monitoring temperature and humidity system
High precision location tracking technology in ir4.0
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...
Project Dissertation - ZigBee Based Wireless Sensor Network
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
IRJET- Low Cost Personal Digital Assistant with IoT and WSN Capabilities
Cloud computing in iot seminar report
Formatted Paper_References added
IMAGE PROCESSING BASED INTRUDER DETECTION USING RASPBERRY PI
IRJET - Dual Verification ATM for Blind People
Lecture 6 geolocation
IRJET- IoT and ML based Smart TV for Child Eyes Safety
Hiding voice data in center density of speech spectrum for secure transmission
40120130405021
Invalidating vulnerable broadcaster nodes using
IRJET- Secured Perimeter using Voice Recognition and Location Tracking Sy...
Ad

Similar to Mobile security using wi fi signal strength (20)

PDF
IRJET- Indoor Positioning System
PDF
Security based home surveillance system using android application
PDF
EPLQ:Efficient privacy preserving spatial range query for smart phones
PDF
Informative Indoor Tracking
PDF
WIRELESS DEVICE POSITIONING AND FINDING INTRUDER USING RSS
PDF
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
PDF
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
PDF
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
PDF
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.
DOC
Indoor localization Leveraging Human Perception of Textual Signs
PDF
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
PDF
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
PDF
A030101001006
PDF
Smart Frame - A Location Sensing Picture Frame using IOT
PDF
Secure and privacy preserving data centric sensor networks with multi query o...
PDF
Secure Data Sharing with ABE in Wireless Sensor Networks
PDF
IRJET- Home Automation using IoT: Review
PDF
Real time approach of piezo actuated beam for wireless seismic measurement us...
PDF
Real time approach of piezo actuated beam for wireless
PDF
Secure data dissemination protocol in wireless sensor networks using xor netw...
IRJET- Indoor Positioning System
Security based home surveillance system using android application
EPLQ:Efficient privacy preserving spatial range query for smart phones
Informative Indoor Tracking
WIRELESS DEVICE POSITIONING AND FINDING INTRUDER USING RSS
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.
Indoor localization Leveraging Human Perception of Textual Signs
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
A030101001006
Smart Frame - A Location Sensing Picture Frame using IOT
Secure and privacy preserving data centric sensor networks with multi query o...
Secure Data Sharing with ABE in Wireless Sensor Networks
IRJET- Home Automation using IoT: Review
Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless
Secure data dissemination protocol in wireless sensor networks using xor netw...
Ad

More from eSAT Publishing House (20)

PDF
Likely impacts of hudhud on the environment of visakhapatnam
PDF
Impact of flood disaster in a drought prone area – case study of alampur vill...
PDF
Hudhud cyclone – a severe disaster in visakhapatnam
PDF
Groundwater investigation using geophysical methods a case study of pydibhim...
PDF
Flood related disasters concerned to urban flooding in bangalore, india
PDF
Enhancing post disaster recovery by optimal infrastructure capacity building
PDF
Effect of lintel and lintel band on the global performance of reinforced conc...
PDF
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
PDF
Wind damage to buildings, infrastrucuture and landscape elements along the be...
PDF
Shear strength of rc deep beam panels – a review
PDF
Role of voluntary teams of professional engineers in dissater management – ex...
PDF
Risk analysis and environmental hazard management
PDF
Review study on performance of seismically tested repaired shear walls
PDF
Monitoring and assessment of air quality with reference to dust particles (pm...
PDF
Low cost wireless sensor networks and smartphone applications for disaster ma...
PDF
Coastal zones – seismic vulnerability an analysis from east coast of india
PDF
Can fracture mechanics predict damage due disaster of structures
PDF
Assessment of seismic susceptibility of rc buildings
PDF
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
PDF
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Likely impacts of hudhud on the environment of visakhapatnam
Impact of flood disaster in a drought prone area – case study of alampur vill...
Hudhud cyclone – a severe disaster in visakhapatnam
Groundwater investigation using geophysical methods a case study of pydibhim...
Flood related disasters concerned to urban flooding in bangalore, india
Enhancing post disaster recovery by optimal infrastructure capacity building
Effect of lintel and lintel band on the global performance of reinforced conc...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Shear strength of rc deep beam panels – a review
Role of voluntary teams of professional engineers in dissater management – ex...
Risk analysis and environmental hazard management
Review study on performance of seismically tested repaired shear walls
Monitoring and assessment of air quality with reference to dust particles (pm...
Low cost wireless sensor networks and smartphone applications for disaster ma...
Coastal zones – seismic vulnerability an analysis from east coast of india
Can fracture mechanics predict damage due disaster of structures
Assessment of seismic susceptibility of rc buildings
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...

Recently uploaded (20)

PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPT
Project quality management in manufacturing
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
composite construction of structures.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPT
Mechanical Engineering MATERIALS Selection
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Construction Project Organization Group 2.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Internet of Things (IOT) - A guide to understanding
UNIT-1 - COAL BASED THERMAL POWER PLANTS
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Project quality management in manufacturing
CYBER-CRIMES AND SECURITY A guide to understanding
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
composite construction of structures.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
UNIT 4 Total Quality Management .pptx
CH1 Production IntroductoryConcepts.pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
OOP with Java - Java Introduction (Basics)
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Mechanical Engineering MATERIALS Selection
Embodied AI: Ushering in the Next Era of Intelligent Systems
Construction Project Organization Group 2.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd

Mobile security using wi fi signal strength

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 44 MOBILE SECURITY USING WI-FI SIGNAL STRENGTH Aditya Kumar Dwivedi1, Girjesh Kumar Mishra2, Mohan Babu Bansal3 1School of Computer Science and Information Technology, DAVV University, Indore (M.P) 2School of Computer Science and Information Technology, DAVV University, Indore (M.P) 3School of Computer Science and Information Technology, DAVV University, Indore (M.P) Abstract Android is an open source full stack platform for developing applications for mobile phones. Android based smart phones as they are portable devices the vulnerability of theft exists. As for as security is concerned, cost is major issue where the cost of element is not so high, so a cost effective technique is needed to protect phones using existing resources. Currently available method is using GPS, but GPS does not work well at indoor locations, so WI-FI signal strength can be used. It is easy to develop an application that can be applied for securing phones in a particular area as android is an open source platform. Here WI-FI router signal strength is used as a medium to track as well as to protect the devices. In this work an effective security application is presented for android based smart phones that use WI-FI signal strength as a parameter. The application is suitable for identifying position in indoor locations so that mobile phone can become the theft free. Keywords: - Android, Wi-Fi, Security, Signal Strength, WPS -------------------------------------------------------------------***------------------------------------------------------------------- 1. INTRODUCTION Wi-Fi positioning system (WPS) is widely being studied in many fields. WPS usually uses Wi-Fi signals from already installed private and public Wi-Fi APs in order to provide the location based service (LBS). WPS complements the measurement error of global positioning system (GPS) in the center of the city or indoor [2]. A smart phone is also known as a cellular phone and a hand phone. Mobile phone is used to make and receive telephone calls over a wide area. Mobile phones also support a wide variety of other services such as text messaging, mms, e- mail, internet access, infrared, Bluetooth, business application, gaming, photography, line chatting, conferencing etc. Mobile phones are playing important vital role and have become an integral part of our life. Mobile phones are being extensively used by every person in the institutes and colleges [3]. Mobile phones and the use of internet in mobiles led to revolution in the field of communication system and lifestyle of the people. People use mobile devices to find application related to their current location these days. Due to the location-based system in mobiles it is easy to use the mobile phones anywhere or in any situation for gathering location related information. Indoor location- based services are a general class of computer program-level services used to include specific controls for indoor locations. Indoor locations are used in a variety of contexts, such as finding malls, nearby indoor objects, entertainment places and work places. In this paper, we propose a personal indoor/outdoor WPS system and security on the smart phone using RSS (Received Signal Strength) of signals from dense Wi-Fi access points dedicated for localization [10]. 2. PROPOSED ALGORITHM RSS from each AP is measured three times and the mean value of three RSSs is calculated. Here root mean square (RMS) is used to find the threshold value (T). We use the difference between the mean value and each training value. If the difference is below a threshold (T), the training value is withdrawn and then the mean of filtered training values is calculated again. Finally, the mean value is compared with the value of database and a proper location on the map is found. Then this location is saved in a database and again location is calculated , then compared to last location if both are same then device is there where it should otherwise it is moved. 2.1 Area Used Fig: 1 Wi-Fi access point
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 45 Proposed Algorithm Ss : Strongest Signal Received i,j : No. of iteration R : Training value of RSS R’j : Mean Difference D : Difference of Threshold T : Threshold Rsi :Square of mean Difference 2.2 Algorithm Features Parameter Proposed Algorithm No. of WI-FI used <4 Threshold Calculation Practical Signal Strong, Weak Indoor Location Yes Security Yes Algorithm Standard Deviation Working Methodology for Strong and Weak Signals Different Dedicated WI-FI Yes 3. EXPERIMENTAL ENVIRONMENT The experiment was performed in a floor, which locates in SCSIT DAVV building, DAVV University. An area of 20m by 25m was used for the experiment. One Wi-Fi AP was installed for the experiment. The Smartphone is Galaxy-S Duos made by Samsung and has Android 4.0 O/S. Figure 1 shows the floor plan and AP mounted in the ceiling for the experiment. The threshold for the filtering calculated using the algorithm. If the last location (See Fig: 3) is different from the current location the message is sent to alternate phone no. specifying the new location 4. DATABASE CONSTRUCT RSS is measured at each point on the floor and saved at the database (see Figure 2). The measured RSSs are stored at the database with the cell ID and SSID. And root mean square value Table: 1 S no SSID Mean Value Location 1 CiscoAp 44 MCA lab door 2 CiscoAp 39 Electronic lab door … …. …. …. …. …. …. …. ..n CiscoAP …. …. Table: 2 Last Location New Location MCA lab door M Tech lab 5. CONCLUSIONS We developed an indoor WPS and security for Android smart phones. Positioning using Wi-Fi signals is easy to implement and requires lower cost than other localization systems. We installed AP dedicated for localization at specific locations to improve positioning accuracy. We proposed a new algorithm to filter error signals and find the location of the smart phone and send sms if location is changed without permission. It acquires a proper scan time and threshold thereby yielding a low error rate. We expect the indoor WPS for smart phones to be used at various places and provide security. REFERENCES [1] Available at http://www.directionsmag.com/articles [2] Satya Komatineni and Dave MacLean, “proandroid 4”, XXX publication, YYY Edition, 20ZZ. [3] Wallace Jackson, Android Apps for absolute beginners [4] Available at http://www.intechopen.com/download/get/type/pdfs/id/13525 [5] Available at http://www.directionsmag.com/articles/10-things- you-need-to-know-about-indoor-positioning/324602 [6] Available at http://www.psut.jo/sites/osama/4.pdf [7] http://www.doi.ieeecomputersociety.org/10.1109/MDM.2012.68 [8] Availale at http://mobilware.org/2009/presentations/Mobilware2009_Papliatseyeu_FM_Positioning.PDF [9] Volume 2 Issue 3, 2013 journale- academiauitmt.uitm.edu.my/index.php? [10] An Analysis of Wi-Fi Based Indoor Positioning Accuracy ortus. https://www.ortus.rtu.lv/science/en/publications/12372/fulltext