SlideShare a Scribd company logo
1 of 3
Download to read offline
Original Research Paper
AhmedB.Elmadani
Department of Computer Science, Faculty of Science, Sebha University.
PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
ABSTRACT
Due to the complicity of the nowadays life, people need to do several things at the same time in work, at home. This can be done only if personal resource can be
accessed securely where they are located in computers at home or in office. This paper presents an algorithm of accessing securely a desktop computer (DC) at home
remotely to perform some tasks using a mobile phone (MP), transferred tokens were protected by use of RC5 encryption code. The obtained results show that
proposedalgorithmcanbeappliedtoperformtaskstohelppeopleinwork orathomesimultaneously.
KEYWORDS: MP, remoteDC, resourceaccess,RC5.
1.INTRODUCTION
There are plenty of reasons to have a remote control for your computer. Maybe
you need a way to access your files from outside your home, or you use your sys-
tem without a monitor, or you want an easy way to control a home DC without a
mouse and keyboard cluttering up your coffee table [1]. Either retrieve or backup
fileslocatedathomeor inoffice.
Practically, there are two general ways to achieve remote control. One way is to
use a full remote desktop client, which will transmit files from your monitor to
your phone or tablet. This option is generally more powerful, but it’s also a bit
more complicated[5], and is preferred by more advanced users. Second way, is a
standard “mouse and keyboard”. It is working more or less like aTVremote con-
trolfor yourDC. For allof themyou’llneedanactiveconnectionon thelocalnet-
work (preferably Wi-Fi, but you can connect your computer to the router via
Ethernet)andtosecureyourtransaction[4].
In commerce, there are several applications to control your DC remotely such as
a "TeamViewer”. It is a powerfully program that can easily install and use to con-
trol a DC remotely. It can be use with android to transfer files between DC and
MPitworks over3G and4G as wellasWi-Fi[2].
A DC can be controlled remotely by configuring router’s page. Most recent
remoteDC clientsoffercontrolovertheInternetaswell[3].
Researches regarding this subject are either accessing remote MP or accessing
remote DC using MP [8]. In last few years two important researches have done.
First is by Mule O. el al. (2016) to access remote MP using a DC. Second is by
Bharathi J. C. and Rao T.Y.S. (2012) in accessing a remote DC using MP. In the
first research, cellphone was accessed remotely using a DC. The project uses a
DC which is considered as server to connect a client android remotely.An appli-
cation is used to monitor and control android smart phone remotely, so user will
beabletoretrieveallhis callsandmessagesremotely[6].
In the second research a DC was accessed remotely with help of android MP, the
process is based on use of virtual network computing. A server was created on a
DC and with use of aWi-Fi network connection, a MPas client can be connected.
An image of the DC is compressed then sent to the cellphone. Short functions are
usedtoaccessareaintheDC itworks likeaTV[7].
To communicate or to access sensitive information, there are a number of secu-
rity algorithms that can be used to protect your data before sending it over trans-
action among them RC5 algorithm. Such algorithm can be used to encrypt data
toprotectitfromun authorizeduse [9].
Based on the above, DCs can be controlled remotely, in this study will focus in
send messages from a MP to a remote DC to perform some helpful tasks to kids
as well families at home then receive a performance acknowledgement and pro-
videthemsecurityas well.
2.METHODOLOGY
Components used by the proposed system hardware and software are explained
inthefollowingparagraphs:
2.1The system
1. User uses hismobilephone(MP) viaSIM1 sendamessagetoaremoteDesk-
topcomputer(DC) throughSIM2, using localMPcoverage.
2. The received message is to be checked whether it is a true message or false
message
True Message
a. Software in DC was prepared to load an action based on value of received
messageandperformproperaction.
b. Once action is performed an ACK of finishing action is sent to the SIM1
thoughSIM2
c. Go to3
Falsemessage
a. AnACK ofwrong messageis senttotheSIM thoughSIM1 2
3. Next:new message?Yesor No
4. Yes:Go to1
5. No:Go to6
6. END
Fig(1) shows aflowchartof theproposedsystem.
Fig. 1. Flowchart of proposed system
2.2System Configuration
The proposed system as in Fig 2, consists of a remote DC, with an integrated SIM
card denoted by SIM , a MP configured with SIM card denoted by SIM .Asoft-1 2
ware program written inVBasic language used to explain messages that received
by SIM to perform a suitable action, then the DC return anACK to SIM waiting2 1
fornew message.
Fig. 2. Equipment of proposed system
Copyright© 2016, IEASRJ.This open-access article is published under the terms of the Creative CommonsAttribution-NonCommercial 4.0 International License which permits Share (copy and redistribute the material in
anymediumorformat)andAdapt(remix,transform,andbuilduponthematerial)undertheAttribution-NonCommercialterms.
10International Educational Applied Scientific Research Journal (IEASRJ)
Computer Science Volume : 2 ¦ Issue : 1 ¦ Jan 2017 ¦ e-ISSN : 2456-5040
Fig. 3. shows messages exchange between remote DC and a MP, messages are
exchanged through SIM cards integrated in both systems, the MPsend a message
wereremoteDC returnanACK.
Fig. 3. Messages exchange between remote DC and MP
2.3Messageconfiguration
Messages to be send from any HPhave to be configured first in the proposed sys-
tem. Few messages are chosen for testing noting that any type of message can
work. Menu of configuring the system is shown in Fig. 4. Message id, command
anddescriptionshavetogivetothesystem.
Fig. 4. Message configuration by proposed system
2.4MP(SIM )connectionto RemoteDC(SIM )1 2
The MP was integrated with the SIM , it works in any local coverage, simply1
information such as dial Remote DC number, message id, the command type for
selected message and its description will be shown. Fig. 5. shows sending mes-
sagemenuby theMP.Messageis directlysenttotheRemoteDC.
Fig. 5. Message to be send by MP
2.5Messagereceivingby remoteDC (SIM )2
The remote DC with an integrated SIM card, it can receive a message and store it2
into a directory prepared for that proposes, that is if and only if the remote DC
(SIM2) iswithinthelocalcoverage.
2.6MessageLoading inremoteDC (SIM2) directory
A program written in VBasic is used to load a received message and consult a
database to select the suitable action. Instruction are written in a VBase code and
fill into a data base, each instruction was numbered, once the received number
matches the database an action is taken by the remote DC.Actions are numbered
(01 to 07). Remote DC peeps if it receives a message code equals to “06”.To per-
form action reset DC, the received message must be “01” and so on as described
inTable1.
Table 1. Messages and corresponded instructions
2.7ACK toMPofactionperformance.
Any received message must have its corresponding in data base that easily helps
in performing proper action by the remote DC. Then an ACK of performing the
requiredactionhavetobesenttotheMP(SIM )anddisplayedonitsscreen.2
2.8ACK toMPofwrong choice
In case a DC (SIM ) receives un valid message which means receiving any text or1
number which is not in database anACK of wrong message is prepared and sent
backtoMP(SIM ).2
2.9Data Protection
Data transferred between DC and MP have to be encrypted when it sent and
decrypted at time it received, hens the proposed algorithm uses RC5 for encryp-
tion/decryptionof data.In MPapairof publickeyis produced(publickeyandpri-
vate key), then send public key to the remote DC. Remote DC uses it to encrypt
the RC5 secret key and send it to MP. MPdecrypts the received key and uses it for
anyfartherencryption/decryptionbetweenthem.
To avoid an authorized access, each command sent by MP to DC is encrypted
with a shared key between the two parties and using RC5 algorithm. A replay is
received using same procedure. Noting that with use of symmetric encryption
algorithmwillprotectdataandwont delaythesystem.
3.RESULTS
Testing the proposed system it gives good results. As mentioned in the previous
paragraph the received is load in the directory and a written program is consulted
to select the proper action. As shows in Fig. 6, the remote DC (SIM ) received a2
messagewithvalue“05”fromMP(SIM )whichmeansrun acalculator.1
Fig. 6 running the calculator in remote DC
Similarly in Fig. 7, message with value “04” was received by the remote DC
(SIM ) sentbytheMP(SIM )thenitdisplaysthecontrolpanelas shown.2 1
Fig. 7. Displaying control panel by remote DC
Another message was shown by the remote DC (SIM2). It shows a note pad as in
Fig.8.
Fig. 8. Displaying note pad by remote DC
4.RESULTANALYSIS
As shown inresultsiteasytoinvokearemoteDC whereitwas locatedinofficeat
home to copy to do some work and no need to use internet to do so, just use the
MP with a local coverage to perform certain work. Results shows among hun-
dred messages, the proposed system recognizes ninety seven of them were by the
remote makes 97% were as shown in the field correct and recognized (CR) in the
Original Research Paper Volume : 2 ¦ Issue : 1 ¦ Jan 2017 ¦ e-ISSN : 2456-5040
11 International Educational Applied Scientific Research Journal (IEASRJ)
No. Message Description
1 01 Reset pc
2 02 Run game
3 03 Control panel
4 04 Note pad
5 05 Run Calculator
6 06 peep
7 07 Display Time
Original Research Paper Volume : 2 ¦ Issue : 1 ¦ Jan 2017 ¦ e-ISSN : 2456-5040
12International Educational Applied Scientific Research Journal (IEASRJ)
Table 2 and only 3 messages did not recognized due to distortion caused by bad
coverage.Table2, shows performanceresultsobtainedby theproposedsystem.
Table 2. Proposed system Acceptance and Rejection
Where:
MT message type, NM number of messages, R recognized, NR non recognized,
CR correct and recognized, WR wrong not recognized, DT different type, ST
samemessageandTM totalmessages.
5.RELATEDWORK
The idea of this work is similar to the work provided by [7] and [8] that is access-
ing a remote desktop computer using hand phone. The mentioned works use a
Wi-Fi network in establishing a connection between the DC and MP, where in
the proposed system uses local MP coverage and this gives the proposed system
an advantage in enhancing the mobility by increasing the access range and
securedatatransactionbetweentwoparties.
6.CONCLUSION
Asecure system of accessing a remote DC using a MPwas presented main while
paper investigates similar systems. Paper also shoes how to secure messages sent
totheDC remotely.
REFERENCES
1. Nield D.(2012). How To Control Your Computer With Your Phone.
http://gizmodo.com.
2. Rhee E.(2011).How to control computers remotely with your Android phone
http://www.cnet.com
3. Garnett A.(2013). How to control your PC with your Android phone. PC World
http://www.pcworld.com
4. Crider M.(2015). Use your PC from the couch – or anywhere – with these smartphone
apps.http://www.digitaltrends.com
5. Taichung C. Y, and Kou M.(2005). Remote monitoring and control of PC clusters
using mobile phones with J2ME. 3rd International Conference on Information Tech-
nology:ResearchandEducation.
6. Mule O, Shaikh N, Shinde P, Wagaskar A, Ramteke S.(2016). Remote Access of
Android Smart Phone. International Journal of Computer Science and Information
Technologies,Vol.7(2)PP711-714.
7. Bharathi J. C. and Rao T.Y.S. (2012).Remote computer access through Android
mobiles. International Journal of Computer Science Issues, Vol. 9, Issue 5, No 3.ISSN
(Online):1694-0814.
8. Bhandari K. S., Mandole V. B., Sachin B. Munde T. A. D. (2015). Remote Desktop
Access through Android Mobiles and Android Mobiles Access through Web Browser.
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X.Vol.3,Issue 1,pp:(369-373).
9. Elmadani A. B.(2013).Multiple layer security in protecting Arabic-unicode sensitive
information based on stenography and cryptographic algorithms. Proceedings of the
second International Conference on Informatics &Applications (ICIA2013). Vol. No.
1.Pp 19-23.LodzPoland.ISBN: 978.1.467305255.0©2013IEEE.
No. MT NM R NR CR WR
1 DT 50 49 1 98% 2%
2 ST 50 48 2 96% 4%
3 TM 100 97 3 97% 3%

More Related Content

What's hot

Class-note-data communications-01
Class-note-data communications-01Class-note-data communications-01
Class-note-data communications-01Md. Abdur Rahim Khan
 
Bj4101347351
Bj4101347351Bj4101347351
Bj4101347351IJERA Editor
 
Telecommunications
TelecommunicationsTelecommunications
TelecommunicationsSopon Tumchota
 
Network Robots - Abhijeet
Network Robots - AbhijeetNetwork Robots - Abhijeet
Network Robots - AbhijeetAbhijeet Kalsi
 
Jq2416671672
Jq2416671672Jq2416671672
Jq2416671672IJERA Editor
 
Siemens Industrial Training
Siemens Industrial TrainingSiemens Industrial Training
Siemens Industrial TrainingSrinidhi Bheesette
 
Practical DNP3, 60870.5 & Modern SCADA Communication Systems
Practical DNP3, 60870.5 & Modern SCADA Communication SystemsPractical DNP3, 60870.5 & Modern SCADA Communication Systems
Practical DNP3, 60870.5 & Modern SCADA Communication SystemsLiving Online
 
Summer Internship report on IOT RTTC Trivandrum
Summer Internship report on IOT  RTTC TrivandrumSummer Internship report on IOT  RTTC Trivandrum
Summer Internship report on IOT RTTC TrivandrumFathimaCec
 
Data Communication and Computer Networking Part # 2
Data Communication and Computer Networking Part # 2Data Communication and Computer Networking Part # 2
Data Communication and Computer Networking Part # 2Quaid-i-Azam University
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-reportSagar Shashank
 
Design of optimal system level for embedded wireless sensor unit
Design of optimal system  level for embedded wireless sensor unitDesign of optimal system  level for embedded wireless sensor unit
Design of optimal system level for embedded wireless sensor unitIAEME Publication
 
Network concepts and wi fi
Network concepts and wi fiNetwork concepts and wi fi
Network concepts and wi fiDeepak John
 
Mobile Computing UNIT-8
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8Ramesh Babu
 

What's hot (20)

IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Ccna report
Ccna reportCcna report
Ccna report
 
Class-note-data communications-01
Class-note-data communications-01Class-note-data communications-01
Class-note-data communications-01
 
Bj4101347351
Bj4101347351Bj4101347351
Bj4101347351
 
Telecommunications
TelecommunicationsTelecommunications
Telecommunications
 
Network Robots - Abhijeet
Network Robots - AbhijeetNetwork Robots - Abhijeet
Network Robots - Abhijeet
 
Jq2416671672
Jq2416671672Jq2416671672
Jq2416671672
 
Siemens Industrial Training
Siemens Industrial TrainingSiemens Industrial Training
Siemens Industrial Training
 
Practical DNP3, 60870.5 & Modern SCADA Communication Systems
Practical DNP3, 60870.5 & Modern SCADA Communication SystemsPractical DNP3, 60870.5 & Modern SCADA Communication Systems
Practical DNP3, 60870.5 & Modern SCADA Communication Systems
 
Summer Internship report on IOT RTTC Trivandrum
Summer Internship report on IOT  RTTC TrivandrumSummer Internship report on IOT  RTTC Trivandrum
Summer Internship report on IOT RTTC Trivandrum
 
Data Communication and Computer Networking Part # 2
Data Communication and Computer Networking Part # 2Data Communication and Computer Networking Part # 2
Data Communication and Computer Networking Part # 2
 
LTE_D2D
LTE_D2DLTE_D2D
LTE_D2D
 
Qos wlan
Qos wlanQos wlan
Qos wlan
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 
IP Geolocation
IP GeolocationIP Geolocation
IP Geolocation
 
Design of optimal system level for embedded wireless sensor unit
Design of optimal system  level for embedded wireless sensor unitDesign of optimal system  level for embedded wireless sensor unit
Design of optimal system level for embedded wireless sensor unit
 
Network concepts and wi fi
Network concepts and wi fiNetwork concepts and wi fi
Network concepts and wi fi
 
C010221015
C010221015C010221015
C010221015
 
Mobile Computing UNIT-8
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8
 
Ids in wn
Ids in wnIds in wn
Ids in wn
 

Similar to Mobile-based desktop access using RC5 encryption

An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2Priyasloka Arya
 
Project report
Project reportProject report
Project reportrahul poteti
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environmentidescitation
 
Quantum composers white paper ethernet connectivity
Quantum composers white paper  ethernet connectivityQuantum composers white paper  ethernet connectivity
Quantum composers white paper ethernet connectivityQuantum Composers
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Ecwayt
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Ecway2004
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Ecwayt
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Ecwaytechnoz
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Ecwayt
 
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...RAJASHREE B
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Gsm based wireless notice board Rajneesh
Gsm based wireless notice board RajneeshGsm based wireless notice board Rajneesh
Gsm based wireless notice board RajneeshRAJNEESH KUMAR SALGOTRA
 
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET Journal
 
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...IJCSES Journal
 
Project report,nowrin
Project report,nowrinProject report,nowrin
Project report,nowrinNowrinJahanSiam
 
Iaetsd wireless electronic notice board using gsm
Iaetsd wireless electronic notice board using gsmIaetsd wireless electronic notice board using gsm
Iaetsd wireless electronic notice board using gsmIaetsd Iaetsd
 

Similar to Mobile-based desktop access using RC5 encryption (20)

An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
 
15-105 v6
15-105 v615-105 v6
15-105 v6
 
Project report
Project reportProject report
Project report
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
 
Quantum composers white paper ethernet connectivity
Quantum composers white paper  ethernet connectivityQuantum composers white paper  ethernet connectivity
Quantum composers white paper ethernet connectivity
 
I010315760
I010315760I010315760
I010315760
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...
 
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Gsm based wireless notice board Rajneesh
Gsm based wireless notice board RajneeshGsm based wireless notice board Rajneesh
Gsm based wireless notice board Rajneesh
 
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
 
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
 
GSM Report_2013
GSM Report_2013GSM Report_2013
GSM Report_2013
 
GSM Report_2013
GSM Report_2013GSM Report_2013
GSM Report_2013
 
Project report,nowrin
Project report,nowrinProject report,nowrin
Project report,nowrin
 
Iaetsd wireless electronic notice board using gsm
Iaetsd wireless electronic notice board using gsmIaetsd wireless electronic notice board using gsm
Iaetsd wireless electronic notice board using gsm
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Mobile-based desktop access using RC5 encryption

  • 1. Original Research Paper AhmedB.Elmadani Department of Computer Science, Faculty of Science, Sebha University. PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE ABSTRACT Due to the complicity of the nowadays life, people need to do several things at the same time in work, at home. This can be done only if personal resource can be accessed securely where they are located in computers at home or in office. This paper presents an algorithm of accessing securely a desktop computer (DC) at home remotely to perform some tasks using a mobile phone (MP), transferred tokens were protected by use of RC5 encryption code. The obtained results show that proposedalgorithmcanbeappliedtoperformtaskstohelppeopleinwork orathomesimultaneously. KEYWORDS: MP, remoteDC, resourceaccess,RC5. 1.INTRODUCTION There are plenty of reasons to have a remote control for your computer. Maybe you need a way to access your files from outside your home, or you use your sys- tem without a monitor, or you want an easy way to control a home DC without a mouse and keyboard cluttering up your coffee table [1]. Either retrieve or backup fileslocatedathomeor inoffice. Practically, there are two general ways to achieve remote control. One way is to use a full remote desktop client, which will transmit files from your monitor to your phone or tablet. This option is generally more powerful, but it’s also a bit more complicated[5], and is preferred by more advanced users. Second way, is a standard “mouse and keyboard”. It is working more or less like aTVremote con- trolfor yourDC. For allof themyou’llneedanactiveconnectionon thelocalnet- work (preferably Wi-Fi, but you can connect your computer to the router via Ethernet)andtosecureyourtransaction[4]. In commerce, there are several applications to control your DC remotely such as a "TeamViewer”. It is a powerfully program that can easily install and use to con- trol a DC remotely. It can be use with android to transfer files between DC and MPitworks over3G and4G as wellasWi-Fi[2]. A DC can be controlled remotely by configuring router’s page. Most recent remoteDC clientsoffercontrolovertheInternetaswell[3]. Researches regarding this subject are either accessing remote MP or accessing remote DC using MP [8]. In last few years two important researches have done. First is by Mule O. el al. (2016) to access remote MP using a DC. Second is by Bharathi J. C. and Rao T.Y.S. (2012) in accessing a remote DC using MP. In the first research, cellphone was accessed remotely using a DC. The project uses a DC which is considered as server to connect a client android remotely.An appli- cation is used to monitor and control android smart phone remotely, so user will beabletoretrieveallhis callsandmessagesremotely[6]. In the second research a DC was accessed remotely with help of android MP, the process is based on use of virtual network computing. A server was created on a DC and with use of aWi-Fi network connection, a MPas client can be connected. An image of the DC is compressed then sent to the cellphone. Short functions are usedtoaccessareaintheDC itworks likeaTV[7]. To communicate or to access sensitive information, there are a number of secu- rity algorithms that can be used to protect your data before sending it over trans- action among them RC5 algorithm. Such algorithm can be used to encrypt data toprotectitfromun authorizeduse [9]. Based on the above, DCs can be controlled remotely, in this study will focus in send messages from a MP to a remote DC to perform some helpful tasks to kids as well families at home then receive a performance acknowledgement and pro- videthemsecurityas well. 2.METHODOLOGY Components used by the proposed system hardware and software are explained inthefollowingparagraphs: 2.1The system 1. User uses hismobilephone(MP) viaSIM1 sendamessagetoaremoteDesk- topcomputer(DC) throughSIM2, using localMPcoverage. 2. The received message is to be checked whether it is a true message or false message True Message a. Software in DC was prepared to load an action based on value of received messageandperformproperaction. b. Once action is performed an ACK of finishing action is sent to the SIM1 thoughSIM2 c. Go to3 Falsemessage a. AnACK ofwrong messageis senttotheSIM thoughSIM1 2 3. Next:new message?Yesor No 4. Yes:Go to1 5. No:Go to6 6. END Fig(1) shows aflowchartof theproposedsystem. Fig. 1. Flowchart of proposed system 2.2System Configuration The proposed system as in Fig 2, consists of a remote DC, with an integrated SIM card denoted by SIM , a MP configured with SIM card denoted by SIM .Asoft-1 2 ware program written inVBasic language used to explain messages that received by SIM to perform a suitable action, then the DC return anACK to SIM waiting2 1 fornew message. Fig. 2. Equipment of proposed system Copyright© 2016, IEASRJ.This open-access article is published under the terms of the Creative CommonsAttribution-NonCommercial 4.0 International License which permits Share (copy and redistribute the material in anymediumorformat)andAdapt(remix,transform,andbuilduponthematerial)undertheAttribution-NonCommercialterms. 10International Educational Applied Scientific Research Journal (IEASRJ) Computer Science Volume : 2 ¦ Issue : 1 ¦ Jan 2017 ¦ e-ISSN : 2456-5040
  • 2. Fig. 3. shows messages exchange between remote DC and a MP, messages are exchanged through SIM cards integrated in both systems, the MPsend a message wereremoteDC returnanACK. Fig. 3. Messages exchange between remote DC and MP 2.3Messageconfiguration Messages to be send from any HPhave to be configured first in the proposed sys- tem. Few messages are chosen for testing noting that any type of message can work. Menu of configuring the system is shown in Fig. 4. Message id, command anddescriptionshavetogivetothesystem. Fig. 4. Message configuration by proposed system 2.4MP(SIM )connectionto RemoteDC(SIM )1 2 The MP was integrated with the SIM , it works in any local coverage, simply1 information such as dial Remote DC number, message id, the command type for selected message and its description will be shown. Fig. 5. shows sending mes- sagemenuby theMP.Messageis directlysenttotheRemoteDC. Fig. 5. Message to be send by MP 2.5Messagereceivingby remoteDC (SIM )2 The remote DC with an integrated SIM card, it can receive a message and store it2 into a directory prepared for that proposes, that is if and only if the remote DC (SIM2) iswithinthelocalcoverage. 2.6MessageLoading inremoteDC (SIM2) directory A program written in VBasic is used to load a received message and consult a database to select the suitable action. Instruction are written in a VBase code and fill into a data base, each instruction was numbered, once the received number matches the database an action is taken by the remote DC.Actions are numbered (01 to 07). Remote DC peeps if it receives a message code equals to “06”.To per- form action reset DC, the received message must be “01” and so on as described inTable1. Table 1. Messages and corresponded instructions 2.7ACK toMPofactionperformance. Any received message must have its corresponding in data base that easily helps in performing proper action by the remote DC. Then an ACK of performing the requiredactionhavetobesenttotheMP(SIM )anddisplayedonitsscreen.2 2.8ACK toMPofwrong choice In case a DC (SIM ) receives un valid message which means receiving any text or1 number which is not in database anACK of wrong message is prepared and sent backtoMP(SIM ).2 2.9Data Protection Data transferred between DC and MP have to be encrypted when it sent and decrypted at time it received, hens the proposed algorithm uses RC5 for encryp- tion/decryptionof data.In MPapairof publickeyis produced(publickeyandpri- vate key), then send public key to the remote DC. Remote DC uses it to encrypt the RC5 secret key and send it to MP. MPdecrypts the received key and uses it for anyfartherencryption/decryptionbetweenthem. To avoid an authorized access, each command sent by MP to DC is encrypted with a shared key between the two parties and using RC5 algorithm. A replay is received using same procedure. Noting that with use of symmetric encryption algorithmwillprotectdataandwont delaythesystem. 3.RESULTS Testing the proposed system it gives good results. As mentioned in the previous paragraph the received is load in the directory and a written program is consulted to select the proper action. As shows in Fig. 6, the remote DC (SIM ) received a2 messagewithvalue“05”fromMP(SIM )whichmeansrun acalculator.1 Fig. 6 running the calculator in remote DC Similarly in Fig. 7, message with value “04” was received by the remote DC (SIM ) sentbytheMP(SIM )thenitdisplaysthecontrolpanelas shown.2 1 Fig. 7. Displaying control panel by remote DC Another message was shown by the remote DC (SIM2). It shows a note pad as in Fig.8. Fig. 8. Displaying note pad by remote DC 4.RESULTANALYSIS As shown inresultsiteasytoinvokearemoteDC whereitwas locatedinofficeat home to copy to do some work and no need to use internet to do so, just use the MP with a local coverage to perform certain work. Results shows among hun- dred messages, the proposed system recognizes ninety seven of them were by the remote makes 97% were as shown in the field correct and recognized (CR) in the Original Research Paper Volume : 2 ¦ Issue : 1 ¦ Jan 2017 ¦ e-ISSN : 2456-5040 11 International Educational Applied Scientific Research Journal (IEASRJ) No. Message Description 1 01 Reset pc 2 02 Run game 3 03 Control panel 4 04 Note pad 5 05 Run Calculator 6 06 peep 7 07 Display Time
  • 3. Original Research Paper Volume : 2 ¦ Issue : 1 ¦ Jan 2017 ¦ e-ISSN : 2456-5040 12International Educational Applied Scientific Research Journal (IEASRJ) Table 2 and only 3 messages did not recognized due to distortion caused by bad coverage.Table2, shows performanceresultsobtainedby theproposedsystem. Table 2. Proposed system Acceptance and Rejection Where: MT message type, NM number of messages, R recognized, NR non recognized, CR correct and recognized, WR wrong not recognized, DT different type, ST samemessageandTM totalmessages. 5.RELATEDWORK The idea of this work is similar to the work provided by [7] and [8] that is access- ing a remote desktop computer using hand phone. The mentioned works use a Wi-Fi network in establishing a connection between the DC and MP, where in the proposed system uses local MP coverage and this gives the proposed system an advantage in enhancing the mobility by increasing the access range and securedatatransactionbetweentwoparties. 6.CONCLUSION Asecure system of accessing a remote DC using a MPwas presented main while paper investigates similar systems. Paper also shoes how to secure messages sent totheDC remotely. REFERENCES 1. Nield D.(2012). How To Control Your Computer With Your Phone. http://gizmodo.com. 2. Rhee E.(2011).How to control computers remotely with your Android phone http://www.cnet.com 3. Garnett A.(2013). How to control your PC with your Android phone. PC World http://www.pcworld.com 4. Crider M.(2015). Use your PC from the couch – or anywhere – with these smartphone apps.http://www.digitaltrends.com 5. Taichung C. Y, and Kou M.(2005). Remote monitoring and control of PC clusters using mobile phones with J2ME. 3rd International Conference on Information Tech- nology:ResearchandEducation. 6. Mule O, Shaikh N, Shinde P, Wagaskar A, Ramteke S.(2016). Remote Access of Android Smart Phone. International Journal of Computer Science and Information Technologies,Vol.7(2)PP711-714. 7. Bharathi J. C. and Rao T.Y.S. (2012).Remote computer access through Android mobiles. International Journal of Computer Science Issues, Vol. 9, Issue 5, No 3.ISSN (Online):1694-0814. 8. Bhandari K. S., Mandole V. B., Sachin B. Munde T. A. D. (2015). Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser. International Journal of Computer Science and Information Technology Research ISSN 2348-120X.Vol.3,Issue 1,pp:(369-373). 9. Elmadani A. B.(2013).Multiple layer security in protecting Arabic-unicode sensitive information based on stenography and cryptographic algorithms. Proceedings of the second International Conference on Informatics &Applications (ICIA2013). Vol. No. 1.Pp 19-23.LodzPoland.ISBN: 978.1.467305255.0©2013IEEE. No. MT NM R NR CR WR 1 DT 50 49 1 98% 2% 2 ST 50 48 2 96% 4% 3 TM 100 97 3 97% 3%