A Security System Based on Door Movement Detecting

Recently, the smartphone devices have become the one of the most popular production in the whole world and the price of smartphone have become cheaper and cheaper. Especially, most of the smartphones have embedded lots of sensors such as light sensor, orientation sensor, accelerometer sensor, etc. Thus, our research is implemented a security application called DoorPass which based on smartphone device sensors. By placing the smartphone behind the door, DoorPass can detect the door movement, and provide some protection to the user. We provided three kinds of notification which are sending sms, make a phone call, and send email. Besides, we also provide three different functions for protection which are track phone, video record, and face detection. By implementing on the smartphone, DoorPass not only can provide the protection but also lower down the cost fee of buying the security hardware and provided convenient, simple and security functions.

[1]  Ling Bao,et al.  Activity Recognition from User-Annotated Acceleration Data , 2004, Pervasive.

[2]  Calvin C. Newport Improving Wireless Network Performance Using Sensor Hints , 2011, NSDI.

[3]  Hung-Min Sun,et al.  Eliminating rouge femtocells based on distance bounding protocol and geographic information , 2014, Expert Syst. Appl..

[4]  Hung-Min Sun,et al.  SASHIMI: Secure Aggregation via Successively Hierarchical Inspecting of Message Integrity on WSN , 2013, J. Inf. Hiding Multim. Signal Process..

[5]  Uwe Hansmann,et al.  Pervasive Computing , 2003 .

[6]  Chien-Ming Chen,et al.  Cryptanalysis of a Variant of Peyravian-Zunic's Password Authentication Scheme , 2003 .

[7]  Zhi Xu,et al.  TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors , 2012, WISEC '12.

[8]  Hung-Min Sun,et al.  A Native APIs Protection Mechanism in the Kernel Mode against Malicious Code , 2011, IEEE Transactions on Computers.

[9]  Tadahiko Kimoto Enhancement of Error-Correction Coding of Spatial Watermarks in Gray Code , 2013 .

[10]  Hao Chen,et al.  On the Practicality of Motion Based Keystroke Inference Attack , 2012, TRUST.

[11]  Hung-Min Sun,et al.  A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices , 2013, IEEE Transactions on Information Forensics and Security.

[12]  Zhenyu He,et al.  Activity recognition from acceleration data based on discrete consine transform and SVM , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.

[13]  Michael L. Littman,et al.  Activity Recognition from Accelerometer Data , 2005, AAAI.

[14]  Petia Radeva,et al.  Human Activity Recognition from Accelerometer Data Using a Wearable Device , 2011, IbPRIA.

[15]  Xiaofei Xu,et al.  Location-Based Distributed Group Key Agreement Scheme for Vehicular Ad Hoc Network , 2014, Int. J. Distributed Sens. Networks.

[16]  Hung-Min Sun,et al.  A defence scheme against Identity Theft Attack based on multiple social networks , 2014, Expert Syst. Appl..

[17]  Jun Han,et al.  ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.

[18]  Jun Han,et al.  ACComplice: Location inference using accelerometers on smartphones , 2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).

[19]  Yuh-Min Tseng,et al.  Further analysis of pairing-based traitor tracing schemes for broadcast encryption , 2013, Secur. Commun. Networks.

[20]  Hao Chen,et al.  TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.

[21]  Gu-Min Jeong,et al.  An analysis of vibration sensors for smartphone applications using camera , 2011, ICTC 2011.

[22]  Lian-Wen Jin,et al.  Activity recognition from acceleration data using AR model representation and SVM , 2008, 2008 International Conference on Machine Learning and Cybernetics.