SlideShare a Scribd company logo
1 of 11
Download to read offline
Detecting User Activities using the Accelerometer
on Android Smartphones
Sauvik Das — Georgia Institute of Technology
LaToya Green — University of Houston
Beatrice Perez — University of Puerto Rico, Mayaguez
Michael Murphy — Franklin W. Olin College of Engineering
Supervisor: Dr.Adrian Perrig
July 30, 2010
Contents
1 Abstract 1
2 Introduction 1
3 Background Information 2
4 Related Work 3
5 Methodology 3
5.1 Background . . . . . . . . . . 3
5.2 Data Acquisition . . . . . . . 4
5.3 Signal Processing . . . . . . . 5
5.3.1 Preprocessing . . . . . 5
5.3.2 Noise Reduction . . . 5
5.3.3 Linearization . . . . . 6
5.3.4 Smoothing . . . . . . . 6
5.4 Feature Extraction . . . . . . . 7
5.5 Classification . . . . . . . . . . 8
6 Results 9
7 Conclusions and Future Work 9
8 References 10
1 Abstract
The purpose of this study is to identify whether
smartphones pose a security threat to the user.
The accelerometer and other sensors within the
device can be used without the users consent.
Our intent in this is to show that the accelerom-
eter can be used to obtain sensitive information
about the user. Using the magnitude of the ac-
celerometer data we found that we could iden-
tify general activities preformed by the user, and
even have the phone learn new activities. Mul-
tiple approaches were implemented to attempt to
find the best results. With individual calibra-
tion we obtained accuracy of 93%, which could
be improved with future work.
2 Introduction
Smartphone security is becoming increas-
ingly important as consumers rely more
and more on their smartphones to store
personal information. With the devel-
opment of smartphone operating systems,
such as Apple’s iOs, Google’s Android and
Blakcberry’s RIM operating systems on the
rise, it is imperative that security measures
are in place to protect the privacy of the user.
This is especially true for Google’s Android
platform, being that it has an open develop-
ment environment.
What is Android?
The Android platform is an open platform
for mobile devices consisting of an operat-
ing system, applications and middleware1
.
Android gives users the opportunity to
build and publish their own applications by
providing an open development environ-
ment. Android treats all applications (na-
tive and third-party) as equals2
. Therefore,
having such an open development environ-
ment requires security measures to be taken
in order to protect the integrity of the An-
droid platform and the privacy of its users.
Android Security and Permissions
The Android Platform takes advantage
of several mechanisms designed to protect
the privacy and security of Android users,
1
as well as the operating system. These
methods include the Android security ar-
chitecture, application certificates, and ap-
plication permissions. The purpose of the
Android security architecture is to prevent
applications from being able to automati-
cally perform operations that could jeopar-
dize the security of other applications, the
operating system or the user. Certificates
are used to identify the author of a spe-
cific application and to prevent users from
installing fraudulent software on their de-
vices. Android will not install an applica-
tion that has not been signed with a certifi-
cate. Therefore, the origin of all published
applications is traceable.
Android security permissions are han-
dled by the AndroidManifest.xml file
present within all application files. When
a user downloads an application onto their
device, they are automatically notified of
the permissions the application has access
to. This informs the user of what type of
information an application is able to collect
from the device as well as the hardware the
application can use.
The AndroidManifest.xml file takes care
of both software and hardware permissions.
But while Android does require permis-
sions for the use of hardware devices such
as the camera and vibrator, it does not re-
quire permissions to be set in place for the
use of any available sensors, including the
accelerometer, orientation, and gyroscope
sensors3
. But we have found that these sen-
sors, when used alongside other tools such
as the internet and GPS, can also pose as se-
curity threat to the user. And it is possible
for an application to collect user informa-
tion from these sensors without the user’s
knowledge.
Accelerometers
The accelerometer in Android phones
measures the acceleration of the device on
the x (lateral), y (longitudinal), and z (ver-
tical) axes. Accelerometers can be used to
detect movement and the rate of change of
the speed of movement. As stated above,
the use of accelerometers in Android ap-
plications does not require the application
to have permission to use it. Therefore, it
is possible for an application to collect a
user’s accelerometer data without the user’s
knowledge. With accelerometer data and
the use of a server to collect the informa-
tion, it is a fairly simple task for someone to
gain a user’s personal information, their lo-
cation, or to figure out what a user is doing
or typing.
3 Background Information
Accelerometers have been used for a variety
of uses throughout the world today, from
medical to research, from car performance
to robotics. However, with the advent of
the iPhone and Android, accelerometers are
much more commonplace in the world of
today. The most commonly used accelerom-
eter within our phones is the LIS311DLH, at
3x3x1 millimeters, it is a tiny, low power,
high performance linear accelerometer. It
senses the forces of acceleration in the X Y
and Z planes to a precision of six decimal
places. In order to investigate the possible
2
link between cyber security and physical se-
curity, we set out to see how these sensors in
smart phones, specifically this accelerome-
ter could be used. In our research we wish
to see if this device can turn what seems to
be a harmless application on the Android
Marketplace into a potential spying device,
able to detect what actions the user is taking
at the moment.
4 Related Work
Many groups have developed sensor
recording and processing devices, such as
the eWatch, a wearable sensor that is in-
tended for use of monitoring elderly and
sick, identify non-responsiveness and keep
taps on their position5
. A Japanese com-
pany, KDDI, has developed something sim-
ilar to this, a system to keep track of em-
ployee’s actions throughout the day, and
send it back to a central mother server.
This device can detect such activities such
as walking, climbing stairs, or even clean-
ing. However, little thought from the com-
pany has gone into the potential security
violations6
. Many other universities have
explored activity recognition using video
instead of accelerometer data7
. While this
is not exactly related, it also explores the
idea of using a system we don’t have on our
minds as being a security threat, in fact, the
opposite, a security tool - cameras - as some-
thing to invade privacy. Indeed, some uni-
versities also attempted activity recognition
using cell phones as well8
. Other systems
have been suggested by the world today,
but not implemented, such as a path track-
ing device using only accelerometer data,
or the use of accelerometer to transmit data
other than the data of acceleration. Such
phones could then be used as tracking de-
vices for the creators, able to see their user’s
daily lives through accelerometer data.
Current location tracking systems offer
high accuracy using GPS and other such
methods; however, those require consent
from the user. In this paper we attempt to
show such things as location and activity
can be detected and recorded without the
knowledge of the user, using simply the ac-
celerometer within their phone.
5 Methodology
5.1 Background
The data received from the accelerometer
was in the form of a three-valued vector
of floating point numbers that represented
the individual accelerations of the smart-
phone device in the X, Y, and Z axes sub-
tracted by the gravity vector G. The ac-
celeration values were recorded in meters
per second squared(m
s2 ). Thus, layed flat
on a level surface, the expected reading of
the accelerometer would be approximately
[0,0,-9.81]. The process of converting these
acceleration vectors into known activities
occured in four broad phases: data acqui-
sition,signal processing, feature extraction and
classification.
During the preprocessing stage, each sam-
pled acceleration vector was combined into
3
a single magnitude; in the noise reduction
stage, the received signal was linearized and
smoothed to reduce noise; in the feature ex-
traction stage, features were extracted for
each sample window of a predetermined
number of 512 samples; in the classification
stage, unknown patterns of data were clas-
sified via feature comparison of known pat-
terns of data, using the Nearest Neighbor
and Naive Bayes classifiers. Two versions of
the classification stage were implemented,
one online–which was done on the fly as data
was being received–and one offline–which
was done on a server after all relevant data
had been collected.
Prior to implementation, we had decided
on attempting to classify the following five
activities:
• Phone Detached: The user is not cur-
rently holding the phone
• Idle: The user is holding the phone in
an idle state
• Walking: The user is walking
• Running: The user is running
• Jumping: The user is jumping
. Having achieved significant accuracy
in classifying the aforementioned activities,
two additional activities were added to the
list:
• Descending Stairs: The user is de-
scending stairs
• Climbing Stairs: The user is climbing
stairs
Figure 1: The data acquisition application running
on the Motorola Droid
. Following reasonable success with these
additions, users would be allowed to enter
customized gesture patterns.
5.2 Data Acquisition
The device used was the Motorola Droid.
To acquire the accelerometer data, we cre-
ated an application for the Droid using the
Android SDK. Training data was acquired
by having users perform an instructed task
(e.g., walking, running, jumping) while the
data was either being exported to a server or
written to the Droid’s SD card. The applica-
tion also graphed the sampled acceleration
data, allowing for a real-time preview of the
data. Figure 1 shows a screenshot of the
application running on the Droid.
4
Figure 2: Raw accelerometer data in the X,Y and Z.
Horizontal axis units are in milliseconds, and vertical
axis units are in m
s2
5.3 Signal Processing
5.3.1 Preprocessing
The first step taken was to merge the three-
dimensional input signal into one accelera-
tion magnitude. The original signal can be
seen in Figure 2. We found the magnitude
of the acceleration vector by taking the eu-
clidean magnitude of the three individual
values, that is:
¯a = x2 + y2 + z2 (1)
The signal run through equation (1) can be
seen in Figure 3. The merger was done
to simplify feature extraction, because the
overall theme in the acceleration pattern
was deemed to be sufficient for the recog-
nition of our original set of activities, none
of which required distinction of directional
accelerations. However, features from indi-
vidual acceleration axes may be important
in determining activities where directional
Figure 3: Merged acceleration magnitude data.
Horizontal axis units are in milliseconds, and ver-
tical axis units are in m
s2
information is relevant, such as differentiat-
ing between martial arts motions.
5.3.2 Noise Reduction
There were two primary sources of noise in
the received signal. The first was irregular
sampling rates and the second was the noise
inherent in discrete physical sampling of a
continous function.
The accelerometer was likely sampled ir-
regularly because of the Android frame-
work’s implementation of the sampling
mechanism. The Android API offers four
abstract sampling rates for its accelerome-
ter sensor (listed from fastest to slowest):
Fastest, Game, Normal, and UI. The actual
physical sampling capabilities of the ac-
clerometers likely vary from device to de-
vice, so these sampling rate options are used
more as guidelines than as actual physical
sampling rates. Another reason is because
of how application on the Android frame-
5
work receives acceleration readings. The
Android API only allows the acquisition
of an acceleration sample on an ”onSensor-
Changed()” event, which fires whenever the
Android OS determines that the accelerom-
eter values have changed. As such, an accel-
eration sampling application cannot force
a reading of the accelerometer at predeter-
mined intervals. Combined with the fact
that Android OS likely has varying loads of
activity from moment to moment, the ”on-
SensorChanged()” is not scheduled firmly,
resulting in irregularly sampled values. To
regularize sampled values, the holes in the
signal were interpolated via a process called
data linearization.
Outside of irregular sampling rates, addi-
tional noise was periodically introduced to
the signal just from the nature of the activity
patterns performed. For example, a slight
change in the orientation of the phone is
quite common even in an Idle position, but
can result in an anomalous peak in the re-
sultant signal. This type of noise was han-
dled by running the signal through a 5-point
smoothing algorithm.
5.3.3 Linearization
Data Linearization was the process used
to handle the irregular sampling of the re-
ceived acceleration signal. The process in-
volved choosing a desired regular sampling
rate, and interpolating all the holes in the
data via linear interpolation. The linearized
value would be calculated by finding the
closest sampled data point before the de-
sired sampling time, and the closest sam-
pled data point after the desired sampling
time, and then interpolating what the value
of the desired sample time would have been.
One significant problem in the linearization
process was to determine an ideal desired
sampling rate.
In order to ensure that not too much data
was calculated via interpolation - which
could have resulted in a false recreation of
the original signal - a program was created
which determined the mean and minimum
differences in time (in milliseconds) of sub-
sequent readings. The arithmetic average
of these two values was then calculated and
analyzed for multiple datasets in order to
provide us with a general guideline of what
might be an ideal sampling rate. It was de-
termined that approximately 1 sample ev-
ery 8 milliseconds, or 125 samples per sec-
ond was a good sampling rate for the data.
A signal before and after data lineariza-
tion can be seen in Figures 4 and 5, respec-
tively. Notice that while the X axis has al-
most doubled in length, the key features of
the signal are exactly preserved. This is ex-
pected because data linearization is simply
meant to fill in the holes of a sampled signal,
and should not significantly alter the signal
itself. The X domain is doubled because we
used the arithmetic average of the minimum
and mean sampling time differences, which
in this case corresponded to about half the
mean difference.
5.3.4 Smoothing
The linearized signal was then run through
a 5-point smoothing algorithm to reduce
6
Figure 4: An acceleration signal before data lin-
earization. X-axis is the sample number, Y-axis is in
m
s2
any additional noise. This additional noise
could have come from any of a number of
sources (e.g., idle orientation shifts, screen
taps, bumps on the road while walking).
The 5-point smoothing algorithm calculates
each point to be the average of its four
nearest neighbors, the two nearest before
and the two nearest after. The 5-point
smooth was chosen so that spikes with an
observable, steady progression would be
preserved while anomalous, sudden spikes
would be eliminated.
We tried running the signal through a 5-
point smooth between one and five itera-
tions, with three iterations yielding the most
accuracy. This is because over-smoothing
caused subtle distinctions between similar,
but different signals - such as the Idle versus
Phone Detached signal - to disappear.
Figure 6 shows the signal shown in Figure
5 after smoothing. Notice how in Figure 5,
the signal is very jaggedy and discrete - a
key indication of a noisy signal. In Figure 6,
the signal is more smooth and continous.
Figure 5: An acceleration signal after data lin-
earization. X-axis is the sample number, Y-axis is in
m
s2 . Notice that the X-domain is significantly longer
in this image, though the shape of the curve is ap-
proximately the same.
Revisiting data linearization, Figure 7
shows the same signal smoothed, but not
first linearized. Notice how the signals in
Figures 5 and 6 are significantly different.
Thus, it was determined that after smooth-
ing, the differences between linearized and
non-linearized signals are noticable and sig-
nificant.
5.4 Feature Extraction
Feature Extraction was the process used to
extract the key elements from a processed
signal which made the signal distinct. For
example, how could one represent the sig-
nals in Figure 8 such that a classification al-
gorithm could later distinguish between the
three signals? As humans, it is simple for
us to make the distinction visuall; but ma-
chine algorithms require concrete statistics
- features.
The following features were chosen based
7
Figure 6: Smoothed acceleration signal. Compare
this signal to the signal in Figure 5.
Figure 7: Smoothed, but not linearized accelera-
tion signal. Notice how this signal is significantly
different from the one in Figure 6.
on our own discussion and the recommen-
dations of previous accelerometer based ac-
tivity recognition research:
1. Fundamental Frequencies: The funda-
mental frequencies of the signal. These
were found from the Fourier Transfor-
mation of the signal over the sample
window. The final value was the aver-
age of the three dominant frequencies
of the signal.
2. Average Acceleration: The arithmetic
Figure 8: A thirty second-spread of Walking, Run-
ning and Jumping accleration signals.
average of the acceleration values in the
sample window.
3. Maximum Amplitude: The maximum
value of the signal in the window.
4. Minimum Amplitude: The minimum
value of the signal in the window.
Note that a sample window of 512 sam-
ples was used. 512 samples were chosen
based on the recommendation of prior pa-
pers, because it was deemed sufficient for
activity recognition and because 512 is a 2n
number, which is ideal for the Fast Fourier
Transformation algorithm.
5.5 Classification
During the classification stage, we labeled
unknown patterns of data based on the
knowledge acquired from known patterns
of data. For the online implementation
of the Activity Recognition application, we
implemented a 1-Nearest Neighbor classi-
fier on the Motorola Droid. The 1-Nearest
8
Neighbor algorithm is a simple algorithm
which matched unknown patterns of data
with a known pattern of data based on the
euclidean distance between the two feature
vectors. The known pattern of data with
the lowest euclidean distance from the un-
known pattern of data was determined to
be the best match. For the offline classifi-
cation, we used the Naive Bayes classifier
provided by the Weka 3 data mining soft-
ware. The Naive Bayes classifier works on
the premise that the absence of a single fea-
turedoesnot necessarily disqualifyaknown
pattern of data from being the correct match.
Despite this assumption, Naive Bayes has
been shown to be a very effective classifier.
Unfortunately, Weka 3 could not be run on
the Droid because of Java Mobile Edition’s
limited functionality.
6 Results
We found that using the nearest neighbor
classifier the program could predict patterns
or activities with 93% accuracy after it had
been calibrated for a particular user. We
found that for people of the same height the
phone could predict activities even if the
subject had not gone through the training
process. A different classifier, for example
Naives Bayes could complete the predic-
tions for a bigger population after a min-
imum amount of samples had been col-
lected. Individual gestures were recognized
with as much accuracy as activities but once
again machine learning had to come first.
One of the limitations of our program is
that for the phone to make accurate predic-
tions, the handset would have to be in the
same place as it was when it was in the train-
ing mode for example if during the train-
ing mode the phone was being held in the
hand, then for more accurate predictions,
the phone would have to be in the hand of
the person that was using it. Having it be
on the pocket or the purse could make the
classifier label an activity incorrectly.
7 Conclusions and Future
Work
The research shows that sensors in the an-
droid platform could constitute a violation
of privacy for the users. Still to be done
on the activity recognition implementation
would be to use a better classifier that would
predict for a greater amount of people with-
out having to go through the training pro-
cess. The accelerometer proved to be a use-
ful tool in identifying activities based on
your phone’s movements and other uses of
the accelerometer could potentially include
its use in detecting key presses and even text
without the knowledge of the user. Another
interesting application would be the trans-
fer of information between phones based on
the matching acceleration values between
them. Overall we found that the safeguards
in place are not enough and have flaws that
must be corrected in future updates to the
platform.
9
8 References
[1] ”Android FAQ - What Is Google An-
droid?” Android News - Android Google
Phone Forums. Web. 20 July 2010. http :
//www.talkandroid.com/google − android −
faq/ .
[2] Meier, Reto. Professional Android
2 Application Development. Indianapolis,
IN: Wiley, 2010. Print.
[3] ”Security and Permissions.” Android
Developers. Web. 20 July 2010. http :
//developer.android.com/guide/topics/security/security.html .
[4] ”LIS331DLH MEMS digital out-
put motion sensor ultra low-power
high performance 3-axes ”nano” ac-
celerometer.” Web, 28 July 2010. http :
//www.st.com/stonline/products/literature/ds/15094.pdf
[5] Uwe Maurer, Anthony Rowe, Asim
Smailagic, and Daniel Siewiorek. Location
and Activity Recognition Using eWatch: A
Wearable Sensor Platform. 2008. Print.
[6] ”Mobile that allows bosses to
snoop on staff developed ” BBC NEWS
- Technology. Web. 27 July 2010. http :
//news.bbc.co.uk/2/hi/technology/8559683.stm/ .
[7] Weiyao Lin, Ming-Ting Sun, Radha
Poovandran, and Zhengyou Zhang.
”Human Activity Recognition for Video
Surveillance.” Web 29 July 2010 http :
//www.ee.washington.edu/research/nsl/papers/iscas−
08.pdf .
[8] Nishkam Ravi and Nikhil Dandekar
and Preetham Mysore and Michael L.
Littman. Activity Recognition from Ac-
celerometer Data. Department of Computer
Science Rutgers University
[9] Bao, L., and Intille, S. S. 2004. Activ-
ity recognition from userannotated acceler-
ation data. In Proceceedings of the 2nd In-
ternational Conference on Pervasive Com-
puting.
10

More Related Content

What's hot

Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureeSAT Publishing House
 
IRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET Journal
 
Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Vineet Garg
 
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES IJCI JOURNAL
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...IRJET Journal
 
A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)IOSR Journals
 
iot based home security using image processing algorithms
iot based home security using image processing algorithmsiot based home security using image processing algorithms
iot based home security using image processing algorithmsBadiginchala Manohari
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voiceeSAT Publishing House
 
A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionIJERA Editor
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
 
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingPreparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingCellebrite
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisIRJET Journal
 
A smart, location based time and
A smart, location based time andA smart, location based time and
A smart, location based time andijcseit
 
IRJET- Applications of Object Detection System
IRJET-  	  Applications of Object Detection SystemIRJET-  	  Applications of Object Detection System
IRJET- Applications of Object Detection SystemIRJET Journal
 

What's hot (15)

Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
 
IRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoT
 
Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...
 
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
 
A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)
 
iot based home security using image processing algorithms
iot based home security using image processing algorithmsiot based home security using image processing algorithms
iot based home security using image processing algorithms
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
 
A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face Detection
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingPreparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault Analysis
 
A smart, location based time and
A smart, location based time andA smart, location based time and
A smart, location based time and
 
Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
 
IRJET- Applications of Object Detection System
IRJET-  	  Applications of Object Detection SystemIRJET-  	  Applications of Object Detection System
IRJET- Applications of Object Detection System
 

Similar to DasGreenPerezMurphy_Paper

Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning TechniquesBehavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning Techniquesgerogepatton
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various ToolsIRJET Journal
 
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...theijes
 
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESBEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESijaia
 
A Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android SmartphonesA Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android SmartphonesIOSR Journals
 
A Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android SmartphonesA Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android SmartphonesIOSR Journals
 
CNS_2016_Poster_Ming.pdf
CNS_2016_Poster_Ming.pdfCNS_2016_Poster_Ming.pdf
CNS_2016_Poster_Ming.pdfBorisIvanov42
 
On the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesOn the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesCSCJournals
 
A Comparison Study of Android Mobile Forensics for Retrieving Files System
A Comparison Study of Android Mobile Forensics for Retrieving Files SystemA Comparison Study of Android Mobile Forensics for Retrieving Files System
A Comparison Study of Android Mobile Forensics for Retrieving Files SystemCSCJournals
 
1668170.ppt
1668170.ppt1668170.ppt
1668170.ppt230405
 
Daily Human Activity Recognition using Adaboost Classifiers on Wisdm Dataset
Daily Human Activity Recognition using Adaboost Classifiers on Wisdm DatasetDaily Human Activity Recognition using Adaboost Classifiers on Wisdm Dataset
Daily Human Activity Recognition using Adaboost Classifiers on Wisdm Datasetijtsrd
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safetyiosrjce
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 
Human Activity Recognition in Android
Human Activity Recognition in AndroidHuman Activity Recognition in Android
Human Activity Recognition in AndroidSurbhi Jain
 

Similar to DasGreenPerezMurphy_Paper (20)

I018145157
I018145157I018145157
I018145157
 
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning TechniquesBehavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various Tools
 
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
 
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESBEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
 
A Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android SmartphonesA Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android Smartphones
 
A Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android SmartphonesA Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android Smartphones
 
C017211519
C017211519C017211519
C017211519
 
CNS_2016_Poster_Ming.pdf
CNS_2016_Poster_Ming.pdfCNS_2016_Poster_Ming.pdf
CNS_2016_Poster_Ming.pdf
 
On the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesOn the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for Smartphones
 
A Comparison Study of Android Mobile Forensics for Retrieving Files System
A Comparison Study of Android Mobile Forensics for Retrieving Files SystemA Comparison Study of Android Mobile Forensics for Retrieving Files System
A Comparison Study of Android Mobile Forensics for Retrieving Files System
 
1668170.ppt
1668170.ppt1668170.ppt
1668170.ppt
 
safe journey
safe journeysafe journey
safe journey
 
Daily Human Activity Recognition using Adaboost Classifiers on Wisdm Dataset
Daily Human Activity Recognition using Adaboost Classifiers on Wisdm DatasetDaily Human Activity Recognition using Adaboost Classifiers on Wisdm Dataset
Daily Human Activity Recognition using Adaboost Classifiers on Wisdm Dataset
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safety
 
A017340104
A017340104A017340104
A017340104
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
A017360104
A017360104A017360104
A017360104
 
Human Activity Recognition in Android
Human Activity Recognition in AndroidHuman Activity Recognition in Android
Human Activity Recognition in Android
 
321
321321
321
 

DasGreenPerezMurphy_Paper

  • 1. Detecting User Activities using the Accelerometer on Android Smartphones Sauvik Das — Georgia Institute of Technology LaToya Green — University of Houston Beatrice Perez — University of Puerto Rico, Mayaguez Michael Murphy — Franklin W. Olin College of Engineering Supervisor: Dr.Adrian Perrig July 30, 2010
  • 2. Contents 1 Abstract 1 2 Introduction 1 3 Background Information 2 4 Related Work 3 5 Methodology 3 5.1 Background . . . . . . . . . . 3 5.2 Data Acquisition . . . . . . . 4 5.3 Signal Processing . . . . . . . 5 5.3.1 Preprocessing . . . . . 5 5.3.2 Noise Reduction . . . 5 5.3.3 Linearization . . . . . 6 5.3.4 Smoothing . . . . . . . 6 5.4 Feature Extraction . . . . . . . 7 5.5 Classification . . . . . . . . . . 8 6 Results 9 7 Conclusions and Future Work 9 8 References 10 1 Abstract The purpose of this study is to identify whether smartphones pose a security threat to the user. The accelerometer and other sensors within the device can be used without the users consent. Our intent in this is to show that the accelerom- eter can be used to obtain sensitive information about the user. Using the magnitude of the ac- celerometer data we found that we could iden- tify general activities preformed by the user, and even have the phone learn new activities. Mul- tiple approaches were implemented to attempt to find the best results. With individual calibra- tion we obtained accuracy of 93%, which could be improved with future work. 2 Introduction Smartphone security is becoming increas- ingly important as consumers rely more and more on their smartphones to store personal information. With the devel- opment of smartphone operating systems, such as Apple’s iOs, Google’s Android and Blakcberry’s RIM operating systems on the rise, it is imperative that security measures are in place to protect the privacy of the user. This is especially true for Google’s Android platform, being that it has an open develop- ment environment. What is Android? The Android platform is an open platform for mobile devices consisting of an operat- ing system, applications and middleware1 . Android gives users the opportunity to build and publish their own applications by providing an open development environ- ment. Android treats all applications (na- tive and third-party) as equals2 . Therefore, having such an open development environ- ment requires security measures to be taken in order to protect the integrity of the An- droid platform and the privacy of its users. Android Security and Permissions The Android Platform takes advantage of several mechanisms designed to protect the privacy and security of Android users, 1
  • 3. as well as the operating system. These methods include the Android security ar- chitecture, application certificates, and ap- plication permissions. The purpose of the Android security architecture is to prevent applications from being able to automati- cally perform operations that could jeopar- dize the security of other applications, the operating system or the user. Certificates are used to identify the author of a spe- cific application and to prevent users from installing fraudulent software on their de- vices. Android will not install an applica- tion that has not been signed with a certifi- cate. Therefore, the origin of all published applications is traceable. Android security permissions are han- dled by the AndroidManifest.xml file present within all application files. When a user downloads an application onto their device, they are automatically notified of the permissions the application has access to. This informs the user of what type of information an application is able to collect from the device as well as the hardware the application can use. The AndroidManifest.xml file takes care of both software and hardware permissions. But while Android does require permis- sions for the use of hardware devices such as the camera and vibrator, it does not re- quire permissions to be set in place for the use of any available sensors, including the accelerometer, orientation, and gyroscope sensors3 . But we have found that these sen- sors, when used alongside other tools such as the internet and GPS, can also pose as se- curity threat to the user. And it is possible for an application to collect user informa- tion from these sensors without the user’s knowledge. Accelerometers The accelerometer in Android phones measures the acceleration of the device on the x (lateral), y (longitudinal), and z (ver- tical) axes. Accelerometers can be used to detect movement and the rate of change of the speed of movement. As stated above, the use of accelerometers in Android ap- plications does not require the application to have permission to use it. Therefore, it is possible for an application to collect a user’s accelerometer data without the user’s knowledge. With accelerometer data and the use of a server to collect the informa- tion, it is a fairly simple task for someone to gain a user’s personal information, their lo- cation, or to figure out what a user is doing or typing. 3 Background Information Accelerometers have been used for a variety of uses throughout the world today, from medical to research, from car performance to robotics. However, with the advent of the iPhone and Android, accelerometers are much more commonplace in the world of today. The most commonly used accelerom- eter within our phones is the LIS311DLH, at 3x3x1 millimeters, it is a tiny, low power, high performance linear accelerometer. It senses the forces of acceleration in the X Y and Z planes to a precision of six decimal places. In order to investigate the possible 2
  • 4. link between cyber security and physical se- curity, we set out to see how these sensors in smart phones, specifically this accelerome- ter could be used. In our research we wish to see if this device can turn what seems to be a harmless application on the Android Marketplace into a potential spying device, able to detect what actions the user is taking at the moment. 4 Related Work Many groups have developed sensor recording and processing devices, such as the eWatch, a wearable sensor that is in- tended for use of monitoring elderly and sick, identify non-responsiveness and keep taps on their position5 . A Japanese com- pany, KDDI, has developed something sim- ilar to this, a system to keep track of em- ployee’s actions throughout the day, and send it back to a central mother server. This device can detect such activities such as walking, climbing stairs, or even clean- ing. However, little thought from the com- pany has gone into the potential security violations6 . Many other universities have explored activity recognition using video instead of accelerometer data7 . While this is not exactly related, it also explores the idea of using a system we don’t have on our minds as being a security threat, in fact, the opposite, a security tool - cameras - as some- thing to invade privacy. Indeed, some uni- versities also attempted activity recognition using cell phones as well8 . Other systems have been suggested by the world today, but not implemented, such as a path track- ing device using only accelerometer data, or the use of accelerometer to transmit data other than the data of acceleration. Such phones could then be used as tracking de- vices for the creators, able to see their user’s daily lives through accelerometer data. Current location tracking systems offer high accuracy using GPS and other such methods; however, those require consent from the user. In this paper we attempt to show such things as location and activity can be detected and recorded without the knowledge of the user, using simply the ac- celerometer within their phone. 5 Methodology 5.1 Background The data received from the accelerometer was in the form of a three-valued vector of floating point numbers that represented the individual accelerations of the smart- phone device in the X, Y, and Z axes sub- tracted by the gravity vector G. The ac- celeration values were recorded in meters per second squared(m s2 ). Thus, layed flat on a level surface, the expected reading of the accelerometer would be approximately [0,0,-9.81]. The process of converting these acceleration vectors into known activities occured in four broad phases: data acqui- sition,signal processing, feature extraction and classification. During the preprocessing stage, each sam- pled acceleration vector was combined into 3
  • 5. a single magnitude; in the noise reduction stage, the received signal was linearized and smoothed to reduce noise; in the feature ex- traction stage, features were extracted for each sample window of a predetermined number of 512 samples; in the classification stage, unknown patterns of data were clas- sified via feature comparison of known pat- terns of data, using the Nearest Neighbor and Naive Bayes classifiers. Two versions of the classification stage were implemented, one online–which was done on the fly as data was being received–and one offline–which was done on a server after all relevant data had been collected. Prior to implementation, we had decided on attempting to classify the following five activities: • Phone Detached: The user is not cur- rently holding the phone • Idle: The user is holding the phone in an idle state • Walking: The user is walking • Running: The user is running • Jumping: The user is jumping . Having achieved significant accuracy in classifying the aforementioned activities, two additional activities were added to the list: • Descending Stairs: The user is de- scending stairs • Climbing Stairs: The user is climbing stairs Figure 1: The data acquisition application running on the Motorola Droid . Following reasonable success with these additions, users would be allowed to enter customized gesture patterns. 5.2 Data Acquisition The device used was the Motorola Droid. To acquire the accelerometer data, we cre- ated an application for the Droid using the Android SDK. Training data was acquired by having users perform an instructed task (e.g., walking, running, jumping) while the data was either being exported to a server or written to the Droid’s SD card. The applica- tion also graphed the sampled acceleration data, allowing for a real-time preview of the data. Figure 1 shows a screenshot of the application running on the Droid. 4
  • 6. Figure 2: Raw accelerometer data in the X,Y and Z. Horizontal axis units are in milliseconds, and vertical axis units are in m s2 5.3 Signal Processing 5.3.1 Preprocessing The first step taken was to merge the three- dimensional input signal into one accelera- tion magnitude. The original signal can be seen in Figure 2. We found the magnitude of the acceleration vector by taking the eu- clidean magnitude of the three individual values, that is: ¯a = x2 + y2 + z2 (1) The signal run through equation (1) can be seen in Figure 3. The merger was done to simplify feature extraction, because the overall theme in the acceleration pattern was deemed to be sufficient for the recog- nition of our original set of activities, none of which required distinction of directional accelerations. However, features from indi- vidual acceleration axes may be important in determining activities where directional Figure 3: Merged acceleration magnitude data. Horizontal axis units are in milliseconds, and ver- tical axis units are in m s2 information is relevant, such as differentiat- ing between martial arts motions. 5.3.2 Noise Reduction There were two primary sources of noise in the received signal. The first was irregular sampling rates and the second was the noise inherent in discrete physical sampling of a continous function. The accelerometer was likely sampled ir- regularly because of the Android frame- work’s implementation of the sampling mechanism. The Android API offers four abstract sampling rates for its accelerome- ter sensor (listed from fastest to slowest): Fastest, Game, Normal, and UI. The actual physical sampling capabilities of the ac- clerometers likely vary from device to de- vice, so these sampling rate options are used more as guidelines than as actual physical sampling rates. Another reason is because of how application on the Android frame- 5
  • 7. work receives acceleration readings. The Android API only allows the acquisition of an acceleration sample on an ”onSensor- Changed()” event, which fires whenever the Android OS determines that the accelerom- eter values have changed. As such, an accel- eration sampling application cannot force a reading of the accelerometer at predeter- mined intervals. Combined with the fact that Android OS likely has varying loads of activity from moment to moment, the ”on- SensorChanged()” is not scheduled firmly, resulting in irregularly sampled values. To regularize sampled values, the holes in the signal were interpolated via a process called data linearization. Outside of irregular sampling rates, addi- tional noise was periodically introduced to the signal just from the nature of the activity patterns performed. For example, a slight change in the orientation of the phone is quite common even in an Idle position, but can result in an anomalous peak in the re- sultant signal. This type of noise was han- dled by running the signal through a 5-point smoothing algorithm. 5.3.3 Linearization Data Linearization was the process used to handle the irregular sampling of the re- ceived acceleration signal. The process in- volved choosing a desired regular sampling rate, and interpolating all the holes in the data via linear interpolation. The linearized value would be calculated by finding the closest sampled data point before the de- sired sampling time, and the closest sam- pled data point after the desired sampling time, and then interpolating what the value of the desired sample time would have been. One significant problem in the linearization process was to determine an ideal desired sampling rate. In order to ensure that not too much data was calculated via interpolation - which could have resulted in a false recreation of the original signal - a program was created which determined the mean and minimum differences in time (in milliseconds) of sub- sequent readings. The arithmetic average of these two values was then calculated and analyzed for multiple datasets in order to provide us with a general guideline of what might be an ideal sampling rate. It was de- termined that approximately 1 sample ev- ery 8 milliseconds, or 125 samples per sec- ond was a good sampling rate for the data. A signal before and after data lineariza- tion can be seen in Figures 4 and 5, respec- tively. Notice that while the X axis has al- most doubled in length, the key features of the signal are exactly preserved. This is ex- pected because data linearization is simply meant to fill in the holes of a sampled signal, and should not significantly alter the signal itself. The X domain is doubled because we used the arithmetic average of the minimum and mean sampling time differences, which in this case corresponded to about half the mean difference. 5.3.4 Smoothing The linearized signal was then run through a 5-point smoothing algorithm to reduce 6
  • 8. Figure 4: An acceleration signal before data lin- earization. X-axis is the sample number, Y-axis is in m s2 any additional noise. This additional noise could have come from any of a number of sources (e.g., idle orientation shifts, screen taps, bumps on the road while walking). The 5-point smoothing algorithm calculates each point to be the average of its four nearest neighbors, the two nearest before and the two nearest after. The 5-point smooth was chosen so that spikes with an observable, steady progression would be preserved while anomalous, sudden spikes would be eliminated. We tried running the signal through a 5- point smooth between one and five itera- tions, with three iterations yielding the most accuracy. This is because over-smoothing caused subtle distinctions between similar, but different signals - such as the Idle versus Phone Detached signal - to disappear. Figure 6 shows the signal shown in Figure 5 after smoothing. Notice how in Figure 5, the signal is very jaggedy and discrete - a key indication of a noisy signal. In Figure 6, the signal is more smooth and continous. Figure 5: An acceleration signal after data lin- earization. X-axis is the sample number, Y-axis is in m s2 . Notice that the X-domain is significantly longer in this image, though the shape of the curve is ap- proximately the same. Revisiting data linearization, Figure 7 shows the same signal smoothed, but not first linearized. Notice how the signals in Figures 5 and 6 are significantly different. Thus, it was determined that after smooth- ing, the differences between linearized and non-linearized signals are noticable and sig- nificant. 5.4 Feature Extraction Feature Extraction was the process used to extract the key elements from a processed signal which made the signal distinct. For example, how could one represent the sig- nals in Figure 8 such that a classification al- gorithm could later distinguish between the three signals? As humans, it is simple for us to make the distinction visuall; but ma- chine algorithms require concrete statistics - features. The following features were chosen based 7
  • 9. Figure 6: Smoothed acceleration signal. Compare this signal to the signal in Figure 5. Figure 7: Smoothed, but not linearized accelera- tion signal. Notice how this signal is significantly different from the one in Figure 6. on our own discussion and the recommen- dations of previous accelerometer based ac- tivity recognition research: 1. Fundamental Frequencies: The funda- mental frequencies of the signal. These were found from the Fourier Transfor- mation of the signal over the sample window. The final value was the aver- age of the three dominant frequencies of the signal. 2. Average Acceleration: The arithmetic Figure 8: A thirty second-spread of Walking, Run- ning and Jumping accleration signals. average of the acceleration values in the sample window. 3. Maximum Amplitude: The maximum value of the signal in the window. 4. Minimum Amplitude: The minimum value of the signal in the window. Note that a sample window of 512 sam- ples was used. 512 samples were chosen based on the recommendation of prior pa- pers, because it was deemed sufficient for activity recognition and because 512 is a 2n number, which is ideal for the Fast Fourier Transformation algorithm. 5.5 Classification During the classification stage, we labeled unknown patterns of data based on the knowledge acquired from known patterns of data. For the online implementation of the Activity Recognition application, we implemented a 1-Nearest Neighbor classi- fier on the Motorola Droid. The 1-Nearest 8
  • 10. Neighbor algorithm is a simple algorithm which matched unknown patterns of data with a known pattern of data based on the euclidean distance between the two feature vectors. The known pattern of data with the lowest euclidean distance from the un- known pattern of data was determined to be the best match. For the offline classifi- cation, we used the Naive Bayes classifier provided by the Weka 3 data mining soft- ware. The Naive Bayes classifier works on the premise that the absence of a single fea- turedoesnot necessarily disqualifyaknown pattern of data from being the correct match. Despite this assumption, Naive Bayes has been shown to be a very effective classifier. Unfortunately, Weka 3 could not be run on the Droid because of Java Mobile Edition’s limited functionality. 6 Results We found that using the nearest neighbor classifier the program could predict patterns or activities with 93% accuracy after it had been calibrated for a particular user. We found that for people of the same height the phone could predict activities even if the subject had not gone through the training process. A different classifier, for example Naives Bayes could complete the predic- tions for a bigger population after a min- imum amount of samples had been col- lected. Individual gestures were recognized with as much accuracy as activities but once again machine learning had to come first. One of the limitations of our program is that for the phone to make accurate predic- tions, the handset would have to be in the same place as it was when it was in the train- ing mode for example if during the train- ing mode the phone was being held in the hand, then for more accurate predictions, the phone would have to be in the hand of the person that was using it. Having it be on the pocket or the purse could make the classifier label an activity incorrectly. 7 Conclusions and Future Work The research shows that sensors in the an- droid platform could constitute a violation of privacy for the users. Still to be done on the activity recognition implementation would be to use a better classifier that would predict for a greater amount of people with- out having to go through the training pro- cess. The accelerometer proved to be a use- ful tool in identifying activities based on your phone’s movements and other uses of the accelerometer could potentially include its use in detecting key presses and even text without the knowledge of the user. Another interesting application would be the trans- fer of information between phones based on the matching acceleration values between them. Overall we found that the safeguards in place are not enough and have flaws that must be corrected in future updates to the platform. 9
  • 11. 8 References [1] ”Android FAQ - What Is Google An- droid?” Android News - Android Google Phone Forums. Web. 20 July 2010. http : //www.talkandroid.com/google − android − faq/ . [2] Meier, Reto. Professional Android 2 Application Development. Indianapolis, IN: Wiley, 2010. Print. [3] ”Security and Permissions.” Android Developers. Web. 20 July 2010. http : //developer.android.com/guide/topics/security/security.html . [4] ”LIS331DLH MEMS digital out- put motion sensor ultra low-power high performance 3-axes ”nano” ac- celerometer.” Web, 28 July 2010. http : //www.st.com/stonline/products/literature/ds/15094.pdf [5] Uwe Maurer, Anthony Rowe, Asim Smailagic, and Daniel Siewiorek. Location and Activity Recognition Using eWatch: A Wearable Sensor Platform. 2008. Print. [6] ”Mobile that allows bosses to snoop on staff developed ” BBC NEWS - Technology. Web. 27 July 2010. http : //news.bbc.co.uk/2/hi/technology/8559683.stm/ . [7] Weiyao Lin, Ming-Ting Sun, Radha Poovandran, and Zhengyou Zhang. ”Human Activity Recognition for Video Surveillance.” Web 29 July 2010 http : //www.ee.washington.edu/research/nsl/papers/iscas− 08.pdf . [8] Nishkam Ravi and Nikhil Dandekar and Preetham Mysore and Michael L. Littman. Activity Recognition from Ac- celerometer Data. Department of Computer Science Rutgers University [9] Bao, L., and Intille, S. S. 2004. Activ- ity recognition from userannotated acceler- ation data. In Proceceedings of the 2nd In- ternational Conference on Pervasive Com- puting. 10