A Pervasive Mobile Device Protection System
#1

I. INTRODUCTION
Mobile devices, such as laptops, smart phones and PDAs, have become an essential part of our daily life. They are small and easy to carry but also powerful in computational and storage capabilities. Unfortunately, these merits also put them at risk. For example, because mobile devices are small, they usually are highly susceptible to theft, especially at public places like airport terminal, library and cafe. Recently, as mobile devices get slimmer and more powerful, the number of mobile device thefts surges. According to the FBI’s National Crime Information Center, the number of reported laptop thefts in 2008 rose with a 48 percent increase over the previous two years, from 73,700 to almost 109,000. On the other hand, keeping data secure in a mobile device is not just a daunting challenge, but a critical requirement. Unfortunately, a majority of the mobile device users do not take necessary actions to protect the data stored in their mobile devices. Therefore, the loss of a mobile device could mean the loss and exposure of sensitive information stored in the lost device, which may be much more valuable than the device itself. According to CNN, a laptop theft case in 2006 related to Veterans Affairs Department resulted in the exposure of millions of veterans’ personally identifiable information and costed the department 20 million dollars to settle the lawsuit against it. This demo implements a pervasive mobile device protection system with the help from sensing and wireless networking technologies. In the system, we deploy low-cost wireless devices at public places of our interest to form a wireless network infrastructure. Users and mobile devices carry special-purpose wireless sensing devices which work with the wireless network infrastructure to provide protection to the mobile device and the data stored in it. Specifically, the system has the following features: ² Context Awareness: sensors carried by users and mobile devices collect context information (e.g., proximity between users and mobile devices) and the system adapts its behavior properly and promptly to the context change. – Anti-theft Protection for Mobile Device: the system will alert the user (directly or multi-hop via the wireless network infrastructure) when it detects a potential theft (e.g., via proximity sensor and motion sensor). – Privacy Protection for User Data on Mobile Device: the system adapts the privacy protection level for user data on mobile device. For example, when a user is away from his/her mobile device, user data on mobile device shall be encrypted. ² Transparency: System adapts its behavior autonomously without requiring explicit user intervention or causing extra distractions to the user. II. SYSTEM OVERVIEW In our prototype (see Fig. 1), each laptop and each user carries a wireless sensor which runs on battery power supply. Each building such as library, shopping center, hospital, and airport has several infrastructure sensors installed at different spots to form an infrastructure sensor network. For each building, one separate infrastructure sensor network is formed and one central server is installed. Fig. 1. System Architecture Within an infrastructure sensor network, each laptop is monitored by its neighboring infrastructure sensors in the absence of its owner to detect suspicious activities. For example, suppose Alice enters a library. Alice’s sensor and laptop’s sensor join the infrastructure sensor network via an authenticated join message to neighboring infrastructure sensors. After joining the network, Alice’s and her laptop’s sensors periodically broadcast authenticated alive messages which can be heard by neighboring infrastructure sensors. Suppose Alice wants to leave her laptop in a reading room for a while to get some coffee in the cafe. Commanded by safety modes based on Alice’s proximity to her laptop, the laptop is locked automatically and sensitive information is protected by encryption. Further, the infrastructure sensors start to monitor her laptop. If moved by a thief, the laptop’s sensor can detect the motion and trigger an alarm with alert messages sent to Alice (directly or via infrastructure). If the thief destroys the sensor in the laptop, the infrastructure sensors will not receive authenticated alive messages from the laptop sensors, thus detect the abnormal phenomenon. They will report the problem to the central server, which in turn automatically sends an alert message to Alice and the security authorities.

DOWNLOAD FULL REPORT
http://googleurl?sa=t&source=web&cd=1&ve...system.pdf&ei=DsABTqDKOefjiAKyopyrCA&usg=AFQjCNEKJRwAi4dkk-4saeDQpYojTOEnwA&sig2=Zsrlw_Y1qHDQacpV4xGz3g
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: mobile device security, mobile information device, mobile computing device, mobile data protection system, polymeric positive temperature coefficient device for protection of batteries pdf**for data leakage detection, uc berkeley veterans, mobile bssed device monetring snd control system,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  WIRE LESS SPEED CONTROL OF AC MOTOR (USING MOBILE) smart paper boy 6 11,221 24-02-2016, 02:05 PM
Last Post: seminar report asees
  Mobile incoming call indicator smart paper boy 5 5,753 09-01-2016, 11:02 AM
Last Post: seminar report asees
  STUDY OF SUBSTATION EQUIPMENT AND PROTECTION smart paper boy 2 4,051 26-07-2015, 07:10 AM
Last Post: AlbertDodo
  Home appliance control by mobile phone (DTMF) seminar class 17 18,902 10-01-2015, 10:05 PM
Last Post: seminar report asees
  COIN BASED MOBILE CHARGER full report seminar class 25 22,997 08-12-2014, 11:40 PM
Last Post: seminar report asees
  wireless charging of mobile phones using microwaves ramki86 33 21,424 05-08-2014, 09:29 PM
Last Post: seminar report asees
  SMS Based Wireless Electronic Notice Board using GSM/CDMA/3G Mobile Phone seminar class 20 18,261 30-04-2014, 10:43 PM
Last Post: ShawnHasson
  mobile phone detector seminar presentation 22 13,101 20-02-2014, 08:47 PM
Last Post: abid qureshi
  MOBILE DETECTION AND JAMMING computer science crazy 14 12,398 13-11-2013, 05:35 AM
Last Post: Guest
  SMS BASED DEVICE CONTROL full report project topics 29 25,520 30-09-2013, 10:33 AM
Last Post: computer topic

Forum Jump: