A Location Oriented Insight on Multilateral Security and Leveraging the Signal Strength in Mobile Applications

DOI : 10.17577/IJERTCONV4IS11019

Download Full-Text PDF Cite this Publication

Text Only Version

A Location Oriented Insight on Multilateral Security and Leveraging the Signal Strength in Mobile Applications

S. Rajesh

Assistant Professor/ Department of Information Technology,

Karpaga Vinayaga College of Enginering and Technology Chinnakolambakkam, Madurantakam,, Kancheepuram Dist. Tamilnadu, India

Saimounica. V

B-Tech/It,Final Year,

Karpaga Vinayaga College of Engineering and Technology Chinnakolambakkam, Madurantakam,

Kancheepuram District Tamilnadu, India.

Abstract In todays life, Mobile applications play a vital role in communication systems. Due to its self- configured and self- maintenance functions, it developed a great impact among mobile users. The knowledge of mobile users location improves the class of services and applications that can be used by mobile user. This motivates us to delve into the study of security- oriented location based services without compromising the leverage of signal strength and fluctuations. A secure communication is achieved through data encryption in multilateral approach. The target of multilateral security is to equilibrate the security prerequisites of the various parties among the mobile users. The multilateral security comprised of proposing the Data Protection, Intellectual property protection and Security authentication schemes. We will develop a novel scheme that collaboratively works in achieving fair signal strength with an effective authentication system. Performance metrics energy cost, precision and recall of data protection will be studied. We propose a novel location-privacy preserving mechanism for LBSs. To take advantage of the high effectiveness of hiding user queries from the server, which minimizes the exposed information about the users location to the server, we propose a mechanism in which a user can hide in the mobile crowd while using the service. The rationale behind our scheme is that users who already have some location-specific information (originally given by the service provider) can pass it to other users who are seeking such information. They can do so in a wireless peer-to-peer manner. Simply put,information about a location can remain around the location it relates to and change hands several times before it expires. Our proposed collaborative scheme enables many users to get such location- specific information from each other without contacting the server, hence minimizing the disclosure of their location information to the adversary.

Key Terms:- Security-oriented location based services,signal strength,Multilateral security,mobi crowd protocol,peer-to-peer manner, data protection, intellectual property protection,security authentication schemes.

  1. INTRODUCTION

    Recent years have witnessed a paradigm shift in personal computing. The popularity of mobile devices equipped with location-sensing technology has enabled the expansion of many existing information services by adding a location

    dimension. A variety of location-based applications and services have progressively permeated people's daily life, ranging from the services for directions or recommendations about nearby attractions to social interaction with friends via location sharing [23]. Location-based applications will become more diverse and pervasive due to the potential for a range of highly personalized and context-aware services [6] and, consequently, result in further pressure on the limited battery capacity of mobile devices. Thus, reducing the communication energy is an imminent challenge in stimulating the development of emerging location-based applications. Mobile computing is the discipline for creating an information management platform, which is free from spatial and temporal constraints. The freedom from these constraints allows its users to access and process desired information from anywhere in the space. The state of the user, static or mobile, does not affect the information management capability of the mobile platform. A user can continue to access and manipulate desired data while traveling on plane, in car, on ship, etc. Thus, the discipline creates an illusion that the desired data and sufficient processing power are available on the spot, where as in reality they may be located far away. Otherwise Mobile computing is a generic term used to refer to a variety of devices that allow people to access data and

    information from where ever they are.

    1. About Android

      One of the most widely used mobile OS these days is ANDROID. Android is the software bunch of comprising not only operating system but also middleware and key applications. Android is a powerful Operating System supporting a large number of applications in Smart Phones. These applications make life more comfortable and advanced for the users. Hardwares that support Android are mainly based on ARM architecture platform. Android applications are written in java programming language. Android is available as open source for developers to develop applications which can be further used for selling in android market. There are around 200000 applications developed for android with over 3 billion+ downloads.

      Android relies on Linux version 2.6 for core system services such as security, memory management, process management, network stack, and driver model.

    2. About Eclipse

    Eclipse is an open source community whose projects are focused on building an extensible development platform, runtimes and application frameworks for building, deploying and managing software across the entire software lifecycle. Many people know us, and hopefully love us, as a Java IDE but Eclipse is much more than a Java IDE. Eclipse is a multi- language software development environment comprising an integrated development environment (IDE) and an extensible plug-in system. It is written mostly in Java and can be used to develop applications in Java and, by means of various plug- ins, other programming languages including Ada, C, C++, COBOL, Perl, PHP, Python, Ruby (including Ruby on Rails framework), Scala, Clojure, and Scheme. The IDE is often called Eclipse ADT for Ada, Eclipse CDT for C/C++, Eclipse JDT for Java, and Eclipse PDT for PHP.

  2. PROPOSED WORK

We propose a novel location-privacy preserving mechanism for LBSs. To take advantage of the high effectiveness of hiding user queries from the server, which minimizes the exposed information about the users location to the server, we propose a mechanism in which a user can hide in the mobile crowd while using the service. The rationale behind our scheme is that users who already have some location- specific information (originally given by the service provider) can pass it to other users who are seeking such information. They can do so in a wireless peer-to-peer manner. Simply put, information about a location can remain around the location it relates to and change hands several times before it expires. Our proposed collaborative scheme enables many users to get such location-specific information from each other without contacting the server, hence minimizing the disclosure of their location information to the adversary.

  1. MODULES OF THE SYSTEM

    • Mobile Users

    • Location Based Server (LBS)

    • User Query

    • Check authenticity

    • User privacy

  2. MOBILE USERS

Consider N users who move in an area split into M discrete regions/locations. The mobility of each user u is a discrete- time Markov chain on the set of regions: The probability that user u, currently in region ri, will next visit region rj is dented by pu(rj |ri). Let u(ri) be the probability that user u is in region ri. Each user possesses a location-aware wireless device, capable of ad hoc device-to-device communication and of connecting to the wireless infrastructure (e.g., cellular and Wi-Fi networks).

B.LOCATION BASED SERVER(LBS)

As users move between regions, they leverage the infrastructure to submit local-search queries to LBS. The information that the LBS provides expires periodically, in the sense that it is no longer valid. Note that information expiration is not equivalent to the user accessing the LBS: A user accesses the LBS when her information has expired and she wishes to receive the most up-to-date version of it.

C.USER QUERY

A seeker, essentially a user who does not have the sought information in her buffer, first broadcasts her query to her neighbors through the wireless ad hoc interface of the device. This a local query. Each user with valid information about a region is termed informed user for that region. Users interested in getting location-specific information about a region are called information seekers of that region.

D.CHECK AUTHENTICITY

The information the LBS provides is self-verifiable, i.e., users can verify the integrity and authenticity of the server responses. This can be done in different ways; in our system, the user device verifies a digital signature of the LBS on each reply by using the LBS providers public key. As a result, a compromised access point or mobile device cannot degrade the experience of users by altering replies or disseminating expired information.

E.USER PRIVACY

In essence, a subset of users in every region has to contact the LBS to get the updated information, and the rest of the users benefit from the peer-to-peer collaboration. Intuitively, the higher the proportion of hidden user queries, the higher her location privacy is.

III .ENERGY AND DATA RATE MODELS

A .BLOCK DIAGRAM

C.SYSTEM ARCHITECTURE

QUERY

QUERY

a.

QUERIER

QUERIER

Map&locat ion details

Signal strength details

Map&locat ion details

Signal strength details

    1. YSTEM REQUIREMENTS

      HARDWARE REQUIREMENTS

      • System : Pentium IV 2.4GHz.

      • Hard Disk : 40 GB.

      • Floppy Drive : 1.44 Mb.

      • Monitor : 15 VGA Colour.

      • Mouse : Logitech.

      • Ram : 512 Mb.

      • Mobile : Android

        SOFTWARE REQUIREMENTS

      • Operating system : Windows 7.

      • Coding Language : Java 1.7

      • Tool Kit : Android

      • IDE : Eclipse

D ILLUSTRATIONS TO DYNAMIC PROGRAMMING FORMULA

IV. CONCLUSION

In the proposed approach we have introduced the concept of multilateral security and mobicrowd protocol to provide a secure communication with LBS to get location based information with an effective authentication system.

Multilateral security means taking into consideration the security requirements of all parties involved.It also means considering all involved parties as potential attackers.It is particularly high forpublic communication networks that are intended for universal use.The reply or response from the LBS is provided with a digital signature. Digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital documents. So, the third party cannot able to view the user query and the location information retrieved. Hence, a secure communication with LBS to get a location based information with an effective authentication system and fair signal strength is also achieved by this approach.

  1. F. Qian, Z. Wang, A. Gerber, Z. M. Mao, S. Sen, and O. Spatscheck, TOP: Tail optimization protocol for cellular radio resource allocation, in Proc. IEEE ICNP, 2010, pp. 285294.

  2. M.-R. Ra, J. Paek, A. B. Sharma, R. Govindan, M. H. Krieger, and M. J. Neely, Energy-delay tradeoffs in smartphone applications, in Proc. ACM MobiSys, 2010, pp. 255270.

  3. A. Rahmati and L. Zhong, Context-based network estimation for energy- efficient ubiquitous wireless connectivity, IEEE Trans. Mobile Comput., vol. 10, no. 1, pp. 5466, Jan. 2011.

ACKNOWLEDGMENT

The authors would like to thank the editor and the anonymous reviewers for their valuable comments and suggestions.

REFERENCES

  1. Chih-Chuan Cheng and Pi-Cheng Hsiu, Extend Your Journey: Considering Signal Strength and Fluctuation in Location-Based Applications, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 2, APRIL 2015.

  2. G. Ananthanarayanan and I. Stoica, Blue-Fi: Enhancing Wi-Fi performance using bluetooth signals, in Proc. ACM MobiSys, 2009, pp. 249262.

  3. A. Balasubramanian, R. Mahajan, and A. Venkataramani, Augmenting Mobile 3G using WiFi, in Proc. ACM MobiSys, 2010, pp. 209222.

  4. N. Balasubramanian, A. Balasubramanian, and A. Venkataramani, Energy consumption in mobile smartphones: A measurement study and implications for network applications, in Proc. ACM IMC, 2009, pp. 280293.

  5. M. Calder and M. K. Marina, Batch scheduling of recurrent applications for energy savings on mobile phones, in Proc. IEEE SECON, 2010, pp. 13.

  6. C.-C. Cheng and P.-C. Hsiu, Extend your journey: Introducing signal strength into location-based applications, in Proc. IEEE INFOCOM, 2013, pp. 27422750.

  7. S. Dhar and U. Varshney, Challenges and business models for mobile location-based services and advertising, Commun. ACM, vol. 54, no. 5, pp. 121128, 2011.

  8. A. El-Geneidy, K. J. Krizek, and M. Iacono, Predicting bicycle travel speeds along different facilities using GPS data: A proof of concept model, presented at the 86th Annu. Meeting Transport. Res. Board, 2007.

  9. A. Gember, A. Akella, J. Pang, A. Varshavsky, and R. Caceres, Obtaining in-context measurements of cellular network performance, in Proc. ACM IMC, 2012, pp. 287300.

  10. K. Hoffman and R. A. Kunze, Linear Algebra, 2nd ed. Upper Saddle River, NJ, USA: Prentice-Hall, 1961, p. 97. [10] H. Holma and A. Toskala, WCDMA for UMTS: HSPA Evolution and LTE, 4th ed. Hoboken, NJ, USA: Wiley, 2007, pp. 175221.

  11. H. Holma and A. Toskala, LTEfor UMTS: Evolution to LTE Advanced, 2nd ed. Hoboken, NJ, USA: Wiley, 2011, pp. 257302.

  12. J. Huang, F. Qian, A. Gerber, Z. M. Mao, S. Sen, and O. Spatscheck A close examination of performance and power characteristics of 4G LTE networks, in Proc. ACM MobiSys, 2012, pp. 225238.

  13. R. L. Knoblauch, M. T. Pietrucha, and M. Nitzburg, Field studies of pedestrian walking speed and start-up time, Transport. Res. Rec., vol. 1538, no. 1, pp. 2738, 1996.

  14. H. Liu, Y. Zhang, and Y. Zhou, TailTheft: Leveraging the wasted time for saving energy in cellular communications, in Proc. ACMMobiArch, 2011, pp. 3136.

  15. A. J. Nicholson and B. D. Noble, BreadCrumbs: Forecasting mobile connectivity, in Proc. ACM MobiCom, 2008, pp. 4657.

  16. F. Qian, Z. Wang, A. Gerber, Z. M. Mao, S. Sen, and O. Spatscheck, Characterizing radio resource allocation for 3G networks, in Proc. ACM IMC, 2010, pp. 137150.

Leave a Reply