Journal Title : International Journal of Modern Trends in Engineering and Science
Volume 03 Issue 03 2016
ISSN no: 2348-3121
Page no: 38-41
Abstract – The main aim is systematically change the mobile settings like (Mode, Mobile data, Wi-Fi, etc). The feature of the application is finding the missed mobile which is in silent mode. This application needs an one time registration like user name, password and phone number. After the registration we could create different profiles and change profile settings from any mobile number using message command with password. While creating a new profile based on location, the device must be present in the particular location. For Ex: If user wants to create a office profile, the device must be in college campus. Once the profile is created, it starts working without user interaction and physical presence. This works using service which is a component that runs in the background. In this paper we propose mobile settings based on location. Our implementation of context differentiates between closely located sub-areas within the same location. We have modified the android operating system, So that the mobile devices based on location can be specified and enforced. We have performed several experiments to assess the efficiency of our access control mechanism and the accuracy of context detection.
Keywords— Android; Location; Mobile device
- A. S. Paul and E. Wan, “Rssi-based indoor localization and tracking using sigma-point kalman smoothers,” Selected Topics in Signal Processing, IEEE Journal of, vol. 3, no. 5, pp. 860–873, 2009.
- S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry, “Towards taming privilege-escalation attacks on Android,” in Proceedings of the 19th Annual Network & Distributed System Security Symposium, Feb. 2012.
- M. Moyer and M. Abamad, “Generalized role-based access control,” in Distributed Computing Systems, 2001. 21st International Conference on., 2001,pp. 391–398.
- M. J. Covington, W. Long, S. Srinivasan, A. K.Dev, M. Ahamad, and G. D. Abowd, “Securing contextaware applications using environment roles,” inProceedings of the sixth ACM symposium on Access.