Abstract: With the increasing
market share of Android devices, malicious applications are developing and
spreading rapidly. So it is imperative to improve the detection accuracy of
Android malware. In this paper, we propose a hybrid detection method that
performs dynamic detection on the results of static detection. The proposed
method extracts the static features and dynamic features of the application,
which can better detect the maliciousness of the Android application.
Furthermore, we present experimental results of three ensemble methods in the
dynamic detection, and choose the XGBoost algorithm with the optimum
performance. Finally, we show that our method achieves a detection accuracy of
94.6%, which is higher than 85.3% of the static detection and 94.1% of the
dynamic detection.
Click for more details
Click for more details
IEEE 2018: TripImputor: Real-Time Imputing Taxi Trip Purpose Leveraging Multi-Sourced Urban Data
Abstract: Travel
behavior understanding is a long-standing and critically important topic in the
area of smart cities.Big volumes of various GPS-based travel data can be easily
collected, among which the taxi GPS trajectory data is a typical example.
However, in GPS trajectory data, there is usually little information on
travelers’ activities, thereby they can only support limited applications.
Quite a few studies have been focused on enriching the semantic meaning for raw
data, such as travel mode/purpose inferring. Unfortunately, trip purpose imputation
receives relatively less attention and requires no realtime response. To narrow
the gap, we propose a probabilistic two-phase framework named TripImputor, for
making the realtime taxi trip purpose imputation and recommending services to passengers
at their dropoff points. Specifically, in the first phase, we propose a
two-stage clustering algorithm to identify candidate activity areas (CAAs) in
the urban space. Then, we extract fine granularity spatial and temporal
patterns of human behaviors inside the CAAs from foursquare check-in data to
approximate the priori probability for each activity, and compute the posterior
probabilities (i.e., infer the trip purposes) using Bayes’ theorem. In the
second phase, we take a sophisticated procedure that clusters historical drop off
points and matches the drop off clusters and CAAs to immerse the real-time
response.
IEEE 2020: DroidNet - An
Android Permission Control Recommendation System Based on Crowdsourcing
Abstract: Mobile and web
application security, particularly the areas of data privacy, has raised much
concerns from the public in recent years. Most applications, or apps for short,
are installed without disclosing full information to users and clearly stating
what the application has access to, which often raises concern when users
become aware of unnecessary information being collected. Unfortunately, most
users have little to no technical expertise in regards to what permissions
should be turned on and can only rely on their intuition and past experiences
to make relatively uninformed decisions. To solve this problem, we developed
DroidNet, which is a crowd-sourced Android recommendation tool and framework.
DroidNet alleviates privacy concerns and presents users with high confidence
permission control recommendations based on the decision from expert users who
are using the same apps. This paper explains the general framework, principles,
and model behind DroidNet while also providing an experimental setup design
which shows the effectiveness and necessity for such a tool.
IEEE 2020: Bluetooth Low
Energy-based Smart Home Android Solution
Abstract: The concepts of smart
home and Internet of Things (IoT) are
becoming reality. Although the basic principles of this new communication
paradigm are well defined, yet the practice lacks knowledge of the difficulties
related to its practical realization and usage. This paper aims at highlighting
some hands-on problems and solutions when implementing a simple and yet very
comprehensive and easy to use smart-home solution. Our design is based on
Bluetooth Low Energy (BLE) communication with the peripheral devices and an
Android central hub for coordination. The proposed solution gains the
advantages provided by the Google Firebase Cloud Messaging (FCM), in order to
provide geographical flexibility for the client’s application and networking.
The paper provides testing results related to the development and verification
of the smart home solution.
IEEE 2020: Development of
Smart Home System Controlled by Android Application
Abstract: This paper presents a
low-cost smart home system with an efficient system. The hardware consists of
NodeMCU Arduino, PIR sensor, temperature sensor, light dependent resistor and a
motion sensor in IP Camera. The software includes ArduinoIDE and MIT app
inventor II for Android mobile phones. The system developed based on Android
user Interface for controlling a smart home. The NETPIE platform, which is a
network of IoT, is used for interfacing between a user and a smart home. This
system consists of lighting system, fan and security system. The notification
is through LINE Notify app. The system includes two control systems; manual and
automatic. From the results, it is shown that the control system is well
performance while it is developed just low-cost devices. IEEE 2018: TripImputor: Real-Time Imputing Taxi Trip Purpose Leveraging Multi-Sourced Urban Data
Click for more details
IEEE 2018:
Android Based Advanced Attendance Vigilance System Using Wireless Network with
Fusion of Bio-metric Fingerprint Authentication
Abstract:
In this digital era, different organizations have started taking
attendance using biometric fingerprint authentication. This will keep the track
of employee’s attendance but the question arises if the employee is fully
present at his/her workplace after giving attendance. In this modern era of
digitalization, it is seen that after giving attendance a huge number of
employees escape away from their workplace and do their personal job in the
office time. This paper focuses on a smart attendance system where an android
device will be used as a smart ID card. A mobile application is developed in
Java to ensure the attendance of an individual employee using bio-metric
fingerprint authentication. In addition, the entire working place will be a
Wi-Fi zone. So, the connection or disconnection of the android device (Smart ID
card) to the router will determine whether an employee is present in the working
place or not. A counter will be there into the system to count the total amount
of time an employee spends in the working place.
Click for more details
Click for more details
Abstract: Mobile devices used
for communication between people only for speaking people in the past but today
one of the most personal kind devices in the cloud environment [1]. The environment
is expanding day by day via accessibility connecting internet with devices. The
device can be any kind of device if it has the ability working with web. The
transaction should be with sending and receiving messages [2]. Mobile devices
can connect the cloud also [3]. This article aims answering the question “Is cloud
environment server its system equally for any kind of mobile devices which has
different operation system?”, throttling mechanism for mobile world which has
the devices with multiple cores and push services for mobile devices. In this
paper, will be discussed two mobile operations, which are Windows Phone and Android
because of comparison of open source and secret sauce. Push services, the use
of different protocols in the same environment with the resulting differences
and message level security issues are another issue discussed in the paper.
IEEE 2018:
Privacy-Preserving Context-Aware Friend Discovery Based on Mobile Sensing
Abstract: With the advancement
of smart phones, wearable devices and communication technologies, it becomes
very convenient to obtain various types of data through mobile sensing, where
data can be sensed via embedded sensors, stored, processed, and transmitted to
anywhere. Mobile sensing has been studied extensively in both academy and
industry, and has been applied in many novel applications in the past few
years, such as environment and traffic monitoring and mobile health. In this work, we propose a new application
scenario called contextaware friend discovery based on mobile sensing, where
contextual attributes such as location, weather and temperature are utilized to
enhance the existing friend discovery schemes. However, data privacy becomes a
major concern for consumers to accept this application. To address this issue,
we further propose a privacypreserving context-aware friend discovery scheme,
where a user’s sensitive data is well protected. Security analysis shows the correctness
and privacy guarantee of the proposed scheme.
IEEE 2018: NFC-based mobile application design restaurant ordering
system APP
Abstract: As smartphones grow
rapidly and wireless communication technology develops maturely, mobile applications
of all sorts keep emerging. At present, the wireless communication technology
that smart phones incorporate most often is Near Field Communication, NFC, which
is applied to hand phones with built-in NFC with which users make payment, read
messages, and close-range device matching, for example. Restaurants have given
away coupons to customers after consumption or accumulate points for exchange
of other discounts or gifts using member cards, so as to attract customers to
come back again; however, it is not unusual that consumers forget to come to
restaurants without their cards or even have lost them. In this regard, this
study will design a Restaurant system App, with which the consumers will browse
on the mobile devices the discounts, information on meals and other services,
and will integrate member bonus and coupons as well as number call service into
the App by means of data transmission with NFC technique.
IEEE 2018: Providing Security for NFC-Based Payment Systems Using a
Management Authentication Server
Abstract: Recent models of
mobile phones have been designed to offer many services such as mobile
e-commerce, e-ticketing, e-payment, among many other services. Of a particular importance
nowadays is the NFC-enabled mobiles in which the NFC technology allowed the
integration of services from various applications into one single mobile.
However, the EMV protocol, which is currently used to provide the required security
for NFC-based payment systems, has two serious vulnerabilities between user
payment devices and the merchants’ point of sales which could lead to obvious
risks for users. These two security vulnerabilities must be treated to secure
NFC-based mobile payment transactions. In this paper a protocol is proposed to
improve the security of EMV by adding a new security layer. The security
provided by the protocol to EMV has been verified against major security
attacks.
IEEE 2018: Defining the Functional Requirements for the NFC Based Medication
Administration and Clinical Communication System
Abstract: Failure to confirm
the ‘five rights’ of medication administration, verify contraindications, and
effectively communicate with healthcare professionals are three major causes of
bedside medication administration (BMA). These causes can be addressed by
developing an efficient system integrated with wireless technology such as Near
Field Communication (NFC). The long-term purpose of this research is to design
a sufficient NFC-based system to overcome the major causes of BMA errors.
Before we can design the system, we must first determine its functional
requirements. Therefore, in this paper, we used theoretical and practical sources
to form a clear picture of the BMA procedure. We identified the essential
methods used in nursing practice to ensure safe BMA, and their limitation. Accordingly,
we drew an initial technical concept of the system functions that will help us
design the system.
Click for more details
IEEE 2018:
Cloud-based Web Application with NFC for Employee Attendance Management System
Abstract: Efficient employee
attendance management leads any organizations to increase overall corporate
performance and accomplish specific goals. Accurate employee attendance records
are importantly used to control working discipline and increase worker’s
productivity. Manual attendance-time checking makes increasingly the expense of
time-consuming and paper work of the companies. Human actions i.e. mistake at
work, and fraudulent time keeping are additional hidden expenses which affect
the productivity of the organization. Variation of the attendance policies set
up in different companies make more complicated in evaluation of employee
working hours. Hence, automated timeattendance management system is the key
operational variables for enhancing the performance, and profitability. The
attendance management system captures time-attendance data and serves the
management of the employee working hour records. However, some existing time
attendance systems have limitations in terms of identification speed, cost of
system devices, real-time attendance monitoring, and flexibility of database
storage size. In this paper, we introduce a cloud-based employee attendance
management system using NFC technology. The proposed application provides several
important operations such as captured attendance records using NFC, automatic
time calculation, leave and overtime checking, working hours evaluation,
real-time updated information access, and generating reports. The proposed
system also offers online portal which allows multiple company user accounts, requires
no special software to install, and provides more flexible data storage. The
evaluation of user satisfaction shows that our proposed system is practically
used and satisfied.
IEEE 2017: A Classroom Scheduling Service for Smart Classes
Abstract: During past decades, the classroom scheduling
problem has posed significant challenges to educational programmers and
teaching secretaries. In order to alleviate the burden of the programmers, this
paper presents Smart Class, which allows the programmers to solve this problem
using web services. By introducing service-oriented architecture (SOA), Smart
Class is able to provide classroom scheduling services with back-stage design
space exploration and greedy algorithms. Furthermore, the Smart Class
architecture can be dynamically coupled to different scheduling algorithms to
fit in specific demands. A typical case study demonstrates that Smart Class
provides a new efficient paradigm to the traditional classroom scheduling
problem, which could achieve high flexibility by software services reuse and
ease the burden of educational programmers. Evaluation results on efficiency,
overheads and scheduling performance demonstrate the Smart Class has lower
scheduling overheads with higher efficiency.Read More
Click for more details
Click for more details
IEEE 2017: GeoMoB – A Geo Location based browser for secured Mobile
Banking
Abstract: With banks reaching its users via mobile
banking, it is becoming one of the essential features that are demanded by
almost every Smartphone user. Mobile banking via a mobile browser is similar to
internet banking. Browsing-based threats for smart phones are just the same as
those for personal computers, elevating the need to focus on mobile security.
Among the several authentication schemes, geo location authentication is
gaining importance as it is found most suitable for mobile devices. In this
paper, GeoMoB, a dedicated secure mobile browser for mobile banking that makes
use of multifactor authentication is designed and developed. GeoMoB features a
geo location based authentication scheme which ensures security of mobile
transactions based on the user location. In addition to the existing two factor
authentication scheme using user ID, password and OTP, the mobile number and
geo location is used to authenticate the user. The geo location intimates the
banks location from where the transaction is going to be performed thus helping
banks to ensure secure transactions. The geo location of the user is acquired
through the network provider and hence the need for using GSM is eliminated.
The multifactor authentication used in GeoMoB ensures security while performing
mobile transaction and prevents users from various attacks.Read More
Abstract: This paper discusses the concept of a smart
wearable device for little children. The major advantage of this wearable over
other wearable is that it can be used in any cell phone and doesn't necessarily
require an expensive smart phone and not a very tech savvy individual to
operate. The purpose of this device is to help parents locate their children
with ease. At the moment there are many wearable’s in the market which help
track the daily activity of children and also help find the child using Wi-Fi
and Bluetooth services present on the device. But Wi-Fi and Bluetooth appear to
be an unreliable medium of communication between the parent and child.
Therefore, the focus of this paper is to have an SMS text enabled communication
medium between the child's wearable and the parent as the environment for GSM
mobile communication is almost present everywhere. The parent can send a text
with specific keywords such as "LOCATION" "TEMPERA TURE"
"UV" "SOS" "BUZZ", etc., the wearable device will
reply back with a text containing the real time accurate location of the child
which upon tapping will provide directions to the child's location on Google
maps app and will also provide the surrounding temperature, UV radiation index
so that the parents can keep track if the temperature or UV radiation is not
suitable for the child. The Prime motivation behind this project is that we
know how important technology is in our lives but it can sometimes can't be
trusted, and we always need to have a secondary measure at hand. The secondary
measure used in this project is the people present in the surrounding of the
child who could instantly react for the Child’s safety till the parents arrives
or they could contact the parents and help locate them. The secondary measure
implemented was using a bright SOS Light and distress alarm buzzer present on
the wearable device which when activated by the parents via SMS text should
display the SOS signal brightly and sound an alarm which a bystander can easily
spot as a sign of distress.
Read More
Read More
IEEE 2017: Privacy and Secure Medical Data Transmission and
Analysis for Wireless Sensing Healthcare System
Abstract: The convergence of Internet of Things (IoT),
cloud computing and wireless body-area networks (WBANs) has greatly promoted
the industrialization of e-/m-healthcare (electronic-/mobile-healthcare).
However, the further flourishing of e-/m-Healthcare still faces many challenges
including information security and privacy preservation. To address these
problems, a healthcare system (HES) framework is designed that collects medical
data from WBANs, transmits them through an extensive wireless sensor network
infrastructure and finally publishes them into wireless personal area networks
(WPANs) via a gateway. Furthermore, HES involves the GSRM (Groups of
Send-Receive Model) scheme to realize key distribution and secure data
transmission, the HEBM (Homomorphic Encryption Based on Matrix) scheme to
ensure privacy and an expert system able to analyze the scrambled medical data
and feed back the results automatically.
Read More
Read More
IEEE 2017: A Lightweight Secure Data Sharing Scheme for Mobile
Cloud Computing
Abstract: With the popularity of cloud computing,
mobile devices can store/retrieve personal data from anywhere at any time.
Consequently, the data security problem in mobile cloud becomes more and more
severe and prevents further development of mobile cloud. There are substantial
studies that have been conducted to improve the cloud security. However, most
of them are not applicable for mobile cloud since mobile devices only have
limited computing resources and power. Solutions with low computational
overhead are in great need for mobile cloud applications. In this paper, we
propose a lightweight data sharing scheme (LDSS) for mobile cloud computing. It
adopts CP-ABE, an access control technology used in normal cloud environment,
but changes the structure of access control tree to make it suitable for mobile
cloud environments. LDSS moves a large portion of the computational intensive
access control tree transformation in CP-ABE from mobile devices to external
proxy servers. Furthermore, to reduce the user revocation cost, it introduces
attribute description fields to implement lazy-revocation, which is a thorny
issue in program based CP-ABE systems. The experimental results show that LDSS
can effectively reduce the overhead on the mobile device side when users are
sharing data in mobile cloud environments.
Read More
Read More
IEEE 2017:Privacy-Preserving Location-Proximity for Mobile Apps
Abstract: Location Based Services (LBS) have seen alarming
privacy breaches in recent years. While there has been much recent progress by
the research community on developing privacy-enhancing mechanisms for LBS,
their evaluation has been often focused on the privacy guarantees, while the
question of whether these mechanisms can be adopted by practical LBS
applications has received limited attention. This paper studies the
applicability of Privacy-Preserving Location Proximity (PPLP) protocols in the
setting of mobile apps. We categorize popular location social apps and analyze
the tradeoffs of privacy and functionality with respect to PPLP enhancements.
To investigate the practical performance trade-offs, we present an in-depth
case study of an Android application that implements Inner Circle, a state-of-the-art
protocol for privacy preserving location proximity. This study indicates that
the performance of the privacy-preserving application for coarsegrained
precision is comparable to real applications with the same feature set.
Read More
Read More
IEEE 2017:Efficient Multi-Factor Authenticated Key Exchange Scheme
for Mobile Communications
Abstract: Authenticated key exchange (AKE) is one of
the most important applications in applied cryptography, where a user interacts
with a server to set up a session key where pre-registered information (aka.
authentication factor), such as a password or biometrics, of the user is
stored. While single-factor AKE is widely used in practice, higher security
concerns call for multi-factor AKE (MFAKE) schemes, e.g. combining both
passwords and biometrics simultaneously. However, in some casually designed
schemes, security is even weakened in the sense that leakage of one
authentication factor will defeat the whole MFAKE protocol. Furthermore, an
inevitable by-product arise that the usability of the protocol often drop
greatly. To summarize, the existing multi-factor protocols did not provide
enough security and efficiency simultaneously. In this paper, we make one step
ahead by proposing a very efficient MFAKE protocol. We define the security
model and give the according security analysis. We also implement our protocol
on a smart phone and a cloud server. The theoretic comparisons and the
experimental results show that our scheme achieves both security and usability.
Read More
Read More
IEEE 2017:My Privacy My Decision: Control of Photo Sharing on
Online Social Networks
Abstract: Photo sharing is an attractive feature which
popularizes Online Social Networks (OSNs). Unfortunately, it may leak users’
privacy if they are allowed to post, comment, and tag a photo freely. In this
paper, we attempt to address this issue and study the scenario when a user
shares a photo containing individuals other than himself/herself (termed
co-photo for short). To prevent possible privacy leakage of a photo, we design
a mechanism to enable each individual in a photo be aware of the posting
activity and participate in the decision making on the photo posting. For this
purpose, we need an efficient facial recognition (FR) system that can recognize
everyone in the photo. However, more demanding privacy setting may limit the
number of the photos publicly available to train the FR system. To deal with
this dilemma, our mechanism attempts to utilize users’ private photos to design
a personalized FR system specifically trained to differentiate possible photo
co-owners without leaking their privacy. We also develop a distributed
consensus based method to reduce the computational complexity and protect the
private training set. We show that our system is superior to other possible
approaches in terms of recognition ratio and efficiency. Our mechanism is
implemented as a proof of concept Android application on Facebook’s platform.
Read More
Read More
IEEE 2017: IoT based Home Security through Digital Image Processing Algorithms
Abstract- This paper gives an outline for automatic
system to control and secure the home, based on digital image processing with
the help of Internet of Things (IoT). The system consists of a sensor, digital
camera, database in the fog and the mobile phone. Sensors are placed in the
frame of the door which alerts camera, to capture an image who intends to enter
the house, then sends the image to the database or dataset that is stored in
the fog. Image analysis is performed to detect and recognize and match the
image with the stored dataset of the authenticated people or pets. If the image
captured does not match with the dataset then an alert message is send to the
owner of the house. The image processing algorithms are considered for the processing
spatial and time complexity of the image captured to cross check with the
dataset stored in the fog.
Read More
Read More
IEEE 2017: ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
Abstract- Smartphones
have been widely used with a vast array of sensitive and private information
stored on these devices. To secure such information from being leaked, user
authentication schemes are necessary. Current password/pattern-based user authentication
schemes are vulnerable to shoulder surfing attacks and smudge attacks. In
contrast, stroke/gait-based schemes are secure but inconvenient for users to
input. In this paper, we propose ShakeIn, a handy user authentication scheme
for secure unlocking of a smartphone by simply shaking the phone. With embedded
motion sensors, ShakeIn can effectively capture the unique and reliable biometrical
features of users about how they shake. In this way, even if an attacker sees a
user shaking his/her phone, the attacker can hardly reproduce the same
behaviour. Furthermore, by allowing users to customize the way how they shake
the phone, ShakeIn endows users with the maximum operation flexibility. We
implement ShakeIn and conduct both intensive trace-driven simulations and real
experiments on 20 volunteers with about 530; 555 shaking samples collected over
multiple months. The results show that ShakeIn achieves an average equal error
rate of 1:2% with a small number of shakes using only 35 training samples even
in the presence of shoulder-surfing attack.
Read More
Read More
IEEE 2016: Dummy-Based
User Location Anonymization Under Real-World Constraints
IEEE 2016 Android Application
Abstract— According to the growth of
mobile devices equipped with a GPS receiver, a variety of location-based
services (LBSs) have been launched. Since location information may reveal
private information, preserving location privacy has become a significant
issue. Previous studies proposed methods to preserve a users' privacy; however,
most of them do not take physical constraints into consideration. In this
paper, we focus on such constraints and propose a location privacy preservation
method that can be applicable to a real environment. In particular, our method
anonymizes the user's location by generating dummies which we simulate to behave
like real human. It also considers traceability of the user's locations to
quickly recover from an accidental reveal of the user's location. We conduct an
experiment using five users' real GPS trajectories and compared our method with
previous studies. The results show that our method ensures to anonymize the
user's location within a pre-determined range. It also avoids fixing the
relative positions of the user and dummies, which may give a hint for an LBS
provider to identify the real user. In addition, we conducted a user experiment
with 22 participants to evaluate the robustness of our method against humans.
We asked participants to observe movements of a user and dummies and try to and
the real user. As a result, we conformed that our method can anonymize the
users' locations even against human's observation.
IEEE 2016: STAMP:
Enabling Privacy-Preserving Location Proofs for Mobile Users
IEEE 2016 Android Application
Abstract— Location-based services are
quickly becoming immensely popular. In addition to services based on users'
current location, many potential services rely
on users' location history, or their spatial-temporal
provenance. Malicious users may lie about their spatial-temporal provenance
without a carefully designed security system for users to prove their
past locations. In this paper, we present the Spatial-Temporal provenance
Assurance with Mutual Proofs (STAMP) scheme. STAMP is
designed for ad-hoc mobile users generating location proofs for
each other in a distributed setting. However, it can easily accommodate
trusted mobile users and wireless access
points. STAMP ensures the integrity and non-transferability of
the location proofs and protects users' privacy. A
semi-trusted Certification Authority is used to distribute cryptographic keys
as well as guard users against collusion by a light-weight
entropy-based trust evaluation approach. Our prototype implementation on the
Android platform shows thatSTAMP is low-cost in terms of computational and
storage resources. Extensive simulation experiments show that our entropy-based
trust model is able to achieve high collusion detection accuracy.
IEEE 2016: PRISM: Privacy-aware Interest Sharing and Matching in
Mobile Social Networks
IEEE 2016 Android Application
Abstract—In a profile matchmaking
application of mobile social networks, users need to reveal their interests to
each other in order to find the common interests. A malicious user may harm a
user by knowing his personal information. Therefore, mutual interests need to
be found in a privacy preserving manner. In this paper, we propose an efficient
privacy protection and interests sharing protocol referred to as PRivacy-aware
Interest Sharing and Matching (PRISM). PRISM enables users to discover mutual
interests without revealing their interests. Unlike existing approaches, PRISM
does not require revealing the interests to a trusted server. Moreover, the
protocol considers attacking scenarios that have not been addressed previously
and provides an efficient solution. The inherent mechanism reveals any cheating
attempt by a malicious user. PRISM also proposes the procedure to eliminate
Sybil attacks. We analyze the security of PRISM against both passive and active
attacks. Through implementation, we also present a detailed analysis of the
performance of PRISM and compare it with existing approaches. The results show
the effectiveness of PRISM without any significant performance
degradation.
IEEE
2016: SBVLC: Secure Barcode-Based Visible Light Communication for
Smartphone
IEEE 2016 Android Application
Abstract— 2D barcodes have enjoyed
a significant penetration rate in mobile applications. This is largely due to
the extremely low barrier to adoption—almost every camera-enabled smartphone
can scan 2D barcodes. As an alternative to NFC technology, 2D barcodes have been
increasingly used for security-sensitive mobile applications including mobile
payments and personal identification. However, the security of barcode-based
communication in mobile applications has not been systematically studied. Due
to the visual nature, 2D barcodes are subject to eavesdropping when they are
displayed on the smartphone screens. On the other hand, the fundamental design
principles of 2D barcodes make it difficult to add security features. In this
paper, we propose SBVLC—a secure system for barcode-based visible light
communication (VLC) between smartphones. We formally analyze the security of
SBVLC based on geometric models and propose physical security enhancement
mechanisms for barcode communication by manipulating screen view angles and
leveraging user-induced motions. We then develop three secure data exchange
schemes that encode information in barcode streams. These schemes are useful in
many security-sensitive mobile applications including private information
sharing, secure device pairing, and contact less payment. SBVLC is evaluated
through extensive experiments on both Android and iOS smartphones.
IEEE
2015: Context-Aware Mobile Cloud
Computing and Its Challenges
IEEE 2015 Android Application
IEEE 2015 Android Application
Abstract:
Cloud computing is
gaining popularity due to virtually unlimited resources, low capital cost, ease
of adoption, flexible resource provisioning, and high scalability. Considering
these benefits, researchers envision the usage of cloud computing for mobile devices
to overcome the ever-increasing computational and energy demands of smartphone
applications. However, this requires specialized context-ware application
development models that can facilitate the development of cloud-enabled
applications capable of making context-aware computation offloading
decisions. This article provides an overview
of mobile cloud computing technology, focusing
on its context-awareness aspects and challenges.
IEEE 2015: Mobile attendance using Near Field Communication and One-Time Password
IEEE 2015 Android Application
Abstract: This paper introduces a Near Field Communication (NFC) supported College M-Attendance system for University Students. Near Field Communication (NFC) is one of the latest technologies in radiocommunications and being a subset of RFID technology, it is growing at an enormous pace. NFC technology provides the fastest way to communicate between two devices and it happens within a fraction of a second. It has several applications in Mobile Communications and transactions. An NFC-supported College M-Attendance system for University Students is discussed as one potential use of this technology. The proposed framework replaces manual roll calls and hence, making it resilient to forgery. It gives parents and professors information about the students' attendance. The marking ofattendance is quick, unsupervised, and makes use of a One Time Password (OTP) to enhance the security of the system and takes away the possibility of proxy attendance. This paper discusses NFC as a technology that is more secure and convenient than the prevalent technology of Bluetooth, and also elaborates on the proposed framework of the M-Attendance system that makes use of this advantage that NFC has over other technologies.
IEEE 2015 Android Application
Abstract: This paper introduces a Near Field Communication (NFC) supported College M-Attendance system for University Students. Near Field Communication (NFC) is one of the latest technologies in radiocommunications and being a subset of RFID technology, it is growing at an enormous pace. NFC technology provides the fastest way to communicate between two devices and it happens within a fraction of a second. It has several applications in Mobile Communications and transactions. An NFC-supported College M-Attendance system for University Students is discussed as one potential use of this technology. The proposed framework replaces manual roll calls and hence, making it resilient to forgery. It gives parents and professors information about the students' attendance. The marking ofattendance is quick, unsupervised, and makes use of a One Time Password (OTP) to enhance the security of the system and takes away the possibility of proxy attendance. This paper discusses NFC as a technology that is more secure and convenient than the prevalent technology of Bluetooth, and also elaborates on the proposed framework of the M-Attendance system that makes use of this advantage that NFC has over other technologies.
IEEE
2014: NFC based applications for visually
impaired people - A review
IEEE 2014
Android Application
Abstract:
Recent
technological developments provide technical assistance that enables
supporting people with visual disabilities in their everyday tasks
and improve their quality of life. Considering that about 90% of the
world visually impaired people live in developing
countries, particularly in the local context, in Saudi Arabia, there is a lack
of assistive tools and adapted environment supporting people with
visual disabilities. To overcome this problem, a wide variety of relatively
inexpensive applications adapt Near Field Communications (NFC)
tagging technology in the development of assistive tools
for people with visual disabilities. In this article, we will
systematically review the current adaptation of NFC technology
for visually disabled people and
introduce NFC practical applications to help them overcome
challenging tasks that they may encounter every day.
No comments:
Post a Comment