Submit Search
Upload
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
•
0 likes
•
8 views
IRJET Journal
Follow
https://www.irjet.net/archives/V10/i5/IRJET-V10I506.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices .docx
lorainedeserre
Paper id 25201417
Paper id 25201417
IJRAT
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost Mobile
IRJET Journal
IRJET- Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
IRJET Journal
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...
IRJET Journal
776 s0005
776 s0005
oscarh1986
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
IRJET Journal
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
IJECEIAES
Recommended
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices .docx
lorainedeserre
Paper id 25201417
Paper id 25201417
IJRAT
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost Mobile
IRJET Journal
IRJET- Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
IRJET Journal
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...
IRJET Journal
776 s0005
776 s0005
oscarh1986
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
IRJET Journal
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
IJECEIAES
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
Jim Romeo
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
Jim Romeo
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
Cisco Service Provider Mobility
4514ijmnct01
4514ijmnct01
ijmnct
Security attacks taxonomy on
Security attacks taxonomy on
ijmnct
Smartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process Model
CSCJournals
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
AM Publications
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
Dr. Raghavendra GS
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
aulasnilda
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Eswar Publications
Smartphone Forensic Challenges
Smartphone Forensic Challenges
CSCJournals
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET Journal
Women Safety Application Android Project
Women Safety Application Android Project
IRJET Journal
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
Nana Kwame(Emeritus) Gyamfi
Adaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBR
ijtsrd
presentation
presentation
SaveraAyub2
CIO Mobility Playbook
CIO Mobility Playbook
Juniper Networks
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
amitkhanna2070
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET Journal
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
IJCSIS Research Publications
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
Jim Romeo
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
Jim Romeo
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
Cisco Service Provider Mobility
4514ijmnct01
4514ijmnct01
ijmnct
Security attacks taxonomy on
Security attacks taxonomy on
ijmnct
Smartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process Model
CSCJournals
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
AM Publications
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
Dr. Raghavendra GS
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
aulasnilda
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Eswar Publications
Smartphone Forensic Challenges
Smartphone Forensic Challenges
CSCJournals
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET Journal
Women Safety Application Android Project
Women Safety Application Android Project
IRJET Journal
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
Nana Kwame(Emeritus) Gyamfi
Adaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBR
ijtsrd
presentation
presentation
SaveraAyub2
CIO Mobility Playbook
CIO Mobility Playbook
Juniper Networks
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
amitkhanna2070
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET Journal
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
IJCSIS Research Publications
Similar to ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
(20)
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
4514ijmnct01
4514ijmnct01
Security attacks taxonomy on
Security attacks taxonomy on
Smartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process Model
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Smartphone Forensic Challenges
Smartphone Forensic Challenges
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
Women Safety Application Android Project
Women Safety Application Android Project
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
Adaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBR
presentation
presentation
CIO Mobility Playbook
CIO Mobility Playbook
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
LewisJB
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Asst.prof M.Gokilavani
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
dollysharma2066
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Tagore Institute of Engineering And Technology
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Dr SOUNDIRARAJ N
Recently uploaded
(20)
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Internship report on mechanical engineering
Internship report on mechanical engineering
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 05 | May 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 48 ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION Vedang Nikure1, Pranay Ikhar2, Vaibhav Kharalkar3, Jayant manapure4, Sweta Choudhari5, Harshad Kubade6 1 Assistant Professor, Department of Information Technology, Priyadarshini College Of Engineering, Nagpur, Maharashtra, India. 2 UG Students, Department of Information Technology, Priyadarshini College Of Engineering, Nagpur, Maharashtra, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - This initiative uses various GPS locations to locate stolen or lost phones. After installation, the program will run in the background. The unique user id and password, SIM number, backup phone number, emailaddress, WhatsApp number, and present location of thephoneareallstored inthis application. When a phone is lost or stolen, the user receives images taken by the front camera, a GPS location on a different phone number, and an email address. With the help of this information, we can quickly identify the phone and the person who has stolen it using the intruder selfiefeature inthe app. Key Words: Mobile theft catcher, firebase, alert system, android application, smart notification. 1.INTRODUCTION On smartphones, sensitive info is stored in large quantities. The combination of this knowledge and smartphones' expensive price makes them a desirable target to feed physical theft. It goes without saying that the device proprietor would choose to reclaim the device in this circumstance. The info must also be protected from unauthorized access. In this research, we present the first anti-theft strategy that addresses these issues. Our recommendation is based on an innovative concept for a theft-deterrent honeypot account that protects the person's data while preventing a criminal from scrubbing the device clean. Today's cell phones cost anywhere from 50k to 1.5 lakh rupees. Besides to the cash loss, a phone can also have its confidential data lost or stolen. According to a survey, there were more than 3.1 million missing smartphones in 2016. A separate study found that victims would spend about Rs. 41,069.33 to get back all of their private data, including photographs and videos. In turn, information leakage to the criminal is prevented and there is a high probability that the true owner of a stolen instrument will be able to retrieve it. The smartphone is a necessity for everyone. They significantly improve day-to-day living. Nowadays, people use cell phones for a wide range of activities, such as taking photos, viewing the internet, and conductingonline banking. As shown in Figure 1. However, as malware becomes more sophisticated and advanced, it has been discovered that the perimeter defence strategy's joint efforts are becoming less and less effective. Malware that is constantly changing appears to always find methods to completely avoid the perimeter defence. We provide a detailed description of the most frequent exploitations at the hardware, software, and network levels of the current information system. The advantages and disadvantages ofthemostprevalentdefence strategies employed in these levels are then covered 2. LITERATURE SURVEY Priyadharshini S. et al, [2] Machine learning techniques have been used in this study to identify malicious Android applications. Open source datasets and Kaggle datasets are the ones who acquire the datasets. Here, data preparation and feature extraction methods are used to accelerate algorithmcomputation.Applyingdatapre processingtodata characteristics. In essence, it aids in normalizing the data within a certain region. Data pruning methods for feature extraction are employed. This document shows that data science is used formalware detection andaims to expose the use of machine learning (ML) methodologies for malware research. Iliyasu Yahaya Adam et al., [3], the research discusses some security issues and potentialbenefitsofmobilephonetracker
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 05 | May 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 49 technologies, particularly for companies that buy and sell used mobile devices. Emerge in relation to the theft or disappearance of phones. Police may become involved in someof the instances astheyconductdigitalinvestigationsto find the offenders. Some complainants' inability to provide information that will help the police conduct a successful investigation may lead to the mistaken apprehending of an innocent person or people as the perpetrator of a crime related to phone theft. In order to help phone owners and prospective buyersandsellersofrefurbishedcellphoneswho want to safeguard their handsets from other GSM-related problems, the paper examines anti-theft and cellphone tracking technologies. Abdulaziz Aldegheishem et al., [4], two innovative ETD models are created in this study. In the first model, a hybrid sampling strategya syntheticminorityoversamplingmethod with an edited nearest neighbor is presented. Additionally, dimensionality reduction and information extraction from data on energy consumption are done using AlexNet. A moderate gradient boosting approach is then employed for categorization. In the second model,theactualdistributionof the data on electricity usage is captured using a conditional Wasserstein generative stochastic network with a gradient penalty. To create more accurate statistics for the minority class, auxiliary provisional information is added to the formula. Additionally, GooLeNet architecture is used to minimize the dimensionality of the dataset. Michael Becher et al., [5], the world is presently transitioning from an Internet-based to amobile society,wherepreviously unremarkable phones are being used for an increasing amount of information access. For instance, between 2016 and 2023, the proportion of mobile phones with full-fledged OS increased by almost 200%. Mobile protection is now necessary rather than inevitable. This review article offers a succinct summary of mobile phone security, attack vectors using the back-end system and the browser itself, as well as the layers of hardware and the user as an attack enabler. We highlight the contrasts and parallels between "normal" security and security for smartphones, and we conclude future study directions. Julian Jang-Jaccard et al., [6], the overwhelming majority of businesses employ a perimeter defence security strategy to shield their IT infrastructure from any potential outside intrusion. This approach places a strong emphasis on "layered defence" or "defense indepth"tactics,whichinvolve fortifying and enclosing vital internal computer assets, such as servers or sensitive data, to protect them. Sanjana Kute et al., [7], the research that will be done for this thesis will be primarily focused on designing and developing an effective and convenient anti-theft device to address security issues that will help to interrelationship/stop theft. The suggested system offers house protection and monitoring. Webcams with sensors installed assist in identifying, notifying, and keeping users updated on trespassing events. Zhenyu Cheng et al., [8], in this article, we suggest theMobile Users' Information defender model, whicheffectivelydetects information theft by using convolutional neural networks to analyse the relationship between users' functioningpatterns and network flows. Most of the apps that steal collected information can't function correctly in reality due to Command-and-Control server invalidation, system version incompatibility, etc. A. Shabtai et al., [9], in this article, we introduce a novel behavior-based anomaly identification method for the network behavior of mobile applications. The mainobjective of the suggested system is to safeguard users of mobile devices and providers of cellular infrastructure from fraudulent applications by first identifying malicious attacks or applications that pose as legitimate ones that are installed on a handheld device, and second identifying previously published, well-liked applicationsthathavebeenrepackaged with malicious code. More specifically, we try to identify a brand-new class of mobile adware that can update itself that was just discovered on the main Google Android market. M. Conti et al., [10], this system wasfullyimplementedbythe authors, and wealso carriedout a comprehensive set of tests that demonstratethat approachcanachieveprecisionaswell as accuracy levels higher than 92% for the majority of the actions taken into consideration. Theauthorsofthisresearch evaluated solutions to three cutting-edgealgorithms,andthe results showed that our solution outperforms all of these immediate rivals. 3. METHODOLOGY 3.1Problem Definition: Personal data is on a mobile phone. There is a chance that this information will be misused if the phone is taken. Any issues, whether they be personal or financial, could arise. Finding the stolen phone is therefore a crucial job. There are some accessible technologies and methods. We can identify the missing phone using that. If a phone is lost or stolen in India, the procedureoffindingitbecomes extremelydifficult. We must follow a drawn-out process and register a case at the police station. To facilitate an easy and comfortable procedure we came up with the idea of anti-theft mobile application and its features are further elaborated in the below section.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 05 | May 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 50 3.2 Proposed Methodology: App Working: Once deployed, it operates in thebackgroundsecretlytothe thief. When a theft occurs, the application begins to function and provides a real-time Google Maps position of the stolen phone, as well as an automatic server data backup. Without the thief's knowledge, the application uses the front camera to capture pictures and videos of him or her and sends them along with their precise location to a registered email address. The application will pretend to Fake Shut Down while diverting the user's focus. Regardless of whether the gadget has a mechanism for locking or not, there are two ways that it can be stolen. If the device is not secured by an unlocking mechanism, a thiefwill have instant access to the owner's data and may misuse user data on the device such as credentials to cause the owner further damage. For as long as the mechanism for unlocking is in position and the device is locked, it is useless to the burglar. Because of this, it will probably happen that the burglar will completely reset the device, which will result in the loss of all user data. Nowadays, a lot of important private data is stored on smartphones. Additionally, existing anti- theft applications will also be removed from the device, greatly decreasing the likelihood that the device's user can recover it. [11] These two possibilities are not satisfactory. Therefore, a solution is required that safeguards user data security while preventing unauthorized factory resets of the device. The authors of this work presentthefirstmethodthat can safeguard the privacy of a device owner'suserdatawhile prohibiting a thief from performing a factory reset and erasingany anti theft software that has beenloaded.[11]By activating theemergencywarning,TheftCatcher,alostphone finder, makes sure that anyone who obtains your phone gets into difficulty. Even if they switch off the device or activate airplane mode. It will capture covert pictures of the intruder and email them to you. To assist in locatingmissingphones,it additionally includes a cellphone tracker. False Shutdown, Fake Airplane Setting, and Intruder Detector are features of Theft Catcher. All of theseweredesignedtonotifyyourfamily to their safety and to send help. Features of the Application 1. Emergency Contacts: Hammer communicates live location updates, photos, and audio files to those closest to you when it senses an SOS. 2. Fake Shutdown: Any tracking application in the universe is disabled the moment your phone is turned off. We made the decision to address the underlying issue as a result. Hammer will pretend that your phone is shutting down if someone attempts to do so, but it will actually send your Emergency Contacts a live location, pictures, and audio instead. 3. Fake Airplane Mode: Hammer simulates an airplane mode state when someone attempts to activate it, but instead sends live location, photos, and audios to your contact list for emergencies. 4. Intruder Selfie: We will snap a photo of you and forward it to your registered email if someone repeatedly tries to unlock your cell device without success. 5. RESULT Splish Screen:-
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 05 | May 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 51 Setup Screen:- Login Page:- Mobile Information:- Live Location:- 5. CONCLUSION Our work on the Anti-Theft Mobile Application fulfils the need of the user of the application for the protection of their contacts, bank information, and other personal information from thieves. With the help of firebase technology, we can connect and send SMS to whoever we want, and with the user's legal permission, the phone's camera and contact access is taken to take action on the thief. The proposed application is made using java technology as itsbackendand XML for frontend designing. The suggested idea is adaptable to different platforms and scenarios and is universal. Although this method is a crucial advancement in the creation of anti-theft mechanisms, it has more potential in the future. Potential upgradesincludesafeguardingdifferent user data repositories, like the SIM card and device preferences. Since the SIM card is no longer frequently used to store personal data as well as the device settings do not hold highly sensitive information, these storages were not considered in our approach. The development of alternative methods that simulate the owner's account data from throughout the honeypot account is another area of future work. [11] The automatic or semi automatic generation of false data is one of these methods. 6.REFERENCES [1] S. N. Julian Jang-Jaccard, "A survey of emerging threatsin cybersecurity,," Journal of Computer and System Sciences,, Vols. Volume 80, ISSN 0022-0000,, no. Issue 5, https://doi.org/10.1016/j.jcss.2014.02.005., pp.Pages973- 993,, 2014,. [2] S. P. a. S. Shanthi, "A Survey On Detecting Android Malware Using Machine Learning Technique," 7th International Conference on Advanced Computing and Communication Systems (ICACCS), no. doi: 10.1109/ICACCS51430.2021.9441712., pp. pp. 1621-1627,, Coimbatore, India, 2021,. [3] C. V. A. V. Iliyasu Yahaya Adam, "Problems and Prospects of Anti-Theft and Mobile Phone Tracking: A case in Nigeria," 7th International Symposium on Digital Forensics and
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 05 | May 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 52 Security (ISDFS), no. DOI:10.1109/ISDFS.2019.8757527, June 2019. [4] M. A. N. J. N. A. M. S. a. H. A. Abdulaziz Aldegheishem, "Towards Sustainable Energy Efficiency with Intelligent Electricity Theft Detection in Smart Grids Emphasising Enhanced Neural Networks," IEEE Access, vol. VOLUME 9, no. DOI - 10.1109/ACCESS.2021.30565664, 2021. [5] F. C. F. J. H. T. H. S. U. C. W. Michael Becher, "Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices," IEEE Symposium on Security and Privacy, vol. 11 , no. DOI 10.1109/SP.2011.29, pp. 1081- 6011, 2011. [6] S. N. Julian Jang-Jaccard, "A survey of emerging threatsin cybersecurity," Journal of Computer and System Sciences, Vols. Volume 80, ISSN 0022-0000, no. Issue 5, doi.org/10.1016/j.jcss.2014.02.005., pp. Pages 973-993, 2014. [7] R. P. V. M. M. G. Sanjana Kute, "Theft Detection System," Iconic Research and Engineering Journals, vol. Volume 4 Issue 10, no. ISSN: 2456-8880, April 2021. [8] X. C. Y. Z. S. L. a. J. X. Zhenyu Cheng, "MUI-defender: CNN- Driven, Network Flow-BasedInformation TheftDetection for Mobile Users," Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer, vol. vol 268, no. doi.org/10.1007/978-3-030-12981-1_23. [9] L. T.-C. D. M. L. R. B. S. Y. E. A. Shabtai, "Mobile malware detection through analysis of deviations in application network behavior," Computers & Security, vol. Volume 43, no. ISSN 0167-4048, doi.org/10.1016/j.cose.2014.02.009, pp. Pages 1-18, 2014. [10] L. V. M. R. S. a. N. V. V. M. Conti, "Analyzing Android Encrypted Network Traffic to Identify User Actions,"inIEEE Transactions on Information ForensicsandSecurity,vol.vol. 11, no. doi: 10.1109/TIFS.2015.2478741, pp. pp. 114- 125, Jan. 2016. [11] A. T. C. H. Sascha Groß, "ThiefTrap – An Anti-theft Framework for Android," Security and Privacy in Communication Networks, no. DOI:10.1007/978-3-319- 78813-5_9, pp. pp.167-184, January 2018.
Download now