Smartphone Confrontational Applications and Security Issues

Smartphone Confrontational Applications and Security Issues

Abhishek Kumar, Jyotir Moy Chatterjee, Pramod Singh Rathore
DOI: 10.4018/978-1-7998-8545-0.ch017
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In today's society, there is a high volume of smartphones, with Android being the most popular and most commonly used smartphones. In the last few years, the Android market has been booming, making lots of developers join the industry so as to create various mobile applications that are a benefit to people's lives. However, its over-popularity has brought many crime issues, including security. One of the major common incidents to mobile users is having their mobile phones lost or stolen. Since most mobile users want to find their lost phones, they are looking for the most reliable features that can help them locate their smartphones. Luckily, there are some developed applications and services that have been designed to track down and locate lost or stolen smartphones. In this work, the authors tried to identify a collection of these applications and the information they send to the user in aiding them to find their phone. Since some applications are able to send location information or a photo, this work will look at what metadata is usually sent with the message.
Chapter Preview
Top

Introduction

In present days, the quantity of smart phones was expanding drastically because of the significance they have on individuals’ day to day lives. Its ubiquity is developing quick every single day controlling a huge number of clients in excess of 200 countries (Zhang et al., 2017). Clients are introducing more recreations, apps and other advanced substance on their cell phones. Accordingly, it is expanding trustworthiness and dependability to numerous cell clients in noteworthy zones, for example, web-based banking, business, information stockpiling, and in all spaces of human services. In any case, practically all cell phone clients are terrified of losing significant information or records whenever the devices get lost or stolen. Insights were gathered from power from Cell towers demonstrates practically more than 12,000,000 devices were lost each academic year with 700,000 of devices got theft (Broida, 2011).

Therefore, this situation causes clients to endure a great deal financially, yet additionally they get the chance to lose significant information incorporating contact subtleties put away over the devices as well as memory card storage. Because of this, it ends up critical for a cell phone client to get back their smart cells. Nearly everybody may have encountered lost or stolen cell phones. Along these lines, it is principal to have an application in the gadget that can help distinguish a stolen phone. This paper highlights different apps with particular highlights, for example, discovery, call checking, area bringing through GPS, email notice, SMS notices and so on which helps in identifying the accurate location of the lost phone or theft phone.

Dominant part of cellphone clients for all time loses their smart cells as well as their own information. As a cure, the reason for the exposition is to feature a portion of the definite gathering of apps which helps cell phone client to identify the smart cells. The hugeness scenario of this concept is to reuse engineers in growing increasingly powerful and productive application frameworks for Android gadgets. Likewise, it will enable cellphone clients to be associated with the most recent innovation that can enable them to follow their stolen or lost phones. Which unmistakable highlights in an application helps in identifying the lost or stolen device? The general target of this thesis is to feature a portion of the apps that can help serve individuals viably whenever the smart cells are theft or lost. The apps are loaded up with different highlights and the objective of the thesis is to bring up different highlights on every application and how successful they can be on tracking gadgets and individual information. Android phones Operating System has caught over 75% of the all-out piece of the pie, leaving its rivals iOS, Windows Phone and Blackberry a long way behind. Despite the fact that cell phones were utilized in the earlier decade, dispatch of iOS and Android has changed the scene by creating a connectivity fascination globally among shoppers and engineers alike. Cell phones have turned out to be omnipresent because of wide scope of network alternatives, for example, GSM, CDMA, Wi-Fi, GPS, Bluetooth and NFC (G. Inc., 2013) demonstrated an expansion of 42.3% in cell phone deals from 2012.

Android does not prescribe, however permits establishment of outsider apps on gadget, which has worked up many territorial just as global application stores (Pandaapp, Baidu, Opera Cell App Store, AppChine, GetJar). Be that as it may, assurance and nature of apps accessible in outsider application stores involves concern (Zhou et al., 2012).

As portable apps are increasing expanding prominence among clients, the protection and security of cell phone clients become a worry. Because of the huge client base, keen gadgets are utilized to store touchy individual data more much of the time than PCs and work areas. As a result, a malignant outsider application cannot just take private data, for example, the contact list, instant messages, and area from its client, yet can likewise cause money related loss of the clients by making shrouded premium-rate phone calls and instant messages (Rothman). In the meantime, the quick development of the quantity of utilizations on Android markets makes it hard for application commercial centers, for example, Google App Store for instance, to altogether check if an application is genuine or malignant.

Complete Chapter List

Search this Book:
Reset