Skip to main content

i-Shield: A System to Protect the Security of Your Smartphone

  • Conference paper
  • First Online:
Knowledge Science, Engineering and Management (KSEM 2016)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9983))

  • 1682 Accesses

Abstract

Losing smartphones is a troublesome thing as smartphones are playing an important role in our daily lives. As smartwatches become popular, we argue that smartwatches can play a role in smartphone antitheft design. In this paper, we propose i-Shield, a real-time antitheft system that leverages accelerometers and gyroscopes of smartphones and smartwatches to prevent smartphone being stolen. As opposed to existing solutions which are based on Bluetooth, NFC, or GPS tracking, i-Shield follows a practical manner to achieve the goal of real-time antitheft for smartphones. i-Shield recognizes taken-out events of smartphones using a supervised classifier, and applies a dynamic time warping (DTW) scheme to recognize whether the events are caused by users themselves. We conduct a series of experiments on iPhone6 and iPhone4s, and the evaluation results show that our system can achieve 97.4 % true positive rate of recognizing taken-out actions, and classify taken-out actions with misclassification rate of 1.12 %.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Apple. http://www.apple.com/icloud/find-my-iphone.html

  2. Google. https://www.google.com/android/devicemanager

  3. Lookout. https://www.lookout.com/resources/reports

  4. Abbate, S., Avvenuti, M., Bonatesta, F., Cola, G., Corsini, P., Vecchio, A.: A smartphone-based fall detection system. Pervasive Mob. Comput. 8(6), 883–899 (2012)

    Article  Google Scholar 

  5. Chen, X., Jindal, A., Ding, N., Hu, Y.C., Gupta, M., Vannithamby, R.: Smartphone background activities in the wild: origin, energy drain, and optimization. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, pp. 40–52. ACM (2015)

    Google Scholar 

  6. Gouthaman, S., Pandya, A., Karande, O., Kalbande, D.: Gesture detection system using smart watch based motion sensors. In: 2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA), pp. 311–316. IEEE (2014)

    Google Scholar 

  7. Gu, T., Chen, S., Tao, X., Lu, J.: An unsupervised approach to activity recognition and segmentation based on object-use fingerprints. Data Knowl. Eng. 69(6), 533–544 (2010)

    Article  Google Scholar 

  8. Parate, A., Chiu, M.C., Chadowitz, C., Ganesan, D., Kalogerakis, E.: RisQ: recognizing smoking gestures with inertial sensors on a wristband. In: Proceedings of the 12th annual international conference on Mobile systems, applications, and services, pp. 149–161. ACM (2014)

    Google Scholar 

  9. Ren, B., Sun, Y., Lin, Y.: Anti-theft and tracking loop model based on PC and smart phone. In: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS), pp. 1943–1946. IEEE (2013)

    Google Scholar 

  10. Shao, J., Lu, R., Lin, X.: Fine: a fine-grained privacy-preserving location-based service framework for mobile devices. In: IEEE Conference on Computer Communications, IEEE INFOCOM 2014, pp. 244–252. IEEE (2014)

    Google Scholar 

  11. Shu, Y., Shin, K.G., He, T., Chen, J.: Last-mile navigation using smartphones. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking. pp. 512–524. ACM (2015)

    Google Scholar 

  12. Thompson, C., White, J., Dougherty, B., Albright, A., Schmidt, D.C.: Using smartphones to detect car accidents and provide situational awareness to emergency responders. In: Cai, Y., Magedanz, T., Li, M., Xia, J., Giannelli, C. (eds.) MOBILWARE 2010. LNICST, vol. 48, pp. 29–42. Springer, Heidelberg (2010). doi:10.1007/978-3-642-17758-3_3

    Chapter  Google Scholar 

  13. Weiss, G.M., Timko, J.L., Gallagher, C.M., Yoneda, K., Schreiber, A.J.: Smartwatch-based activity recognition: a machine learning approach. In: 2016 IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), pp. 426–429. IEEE (2016)

    Google Scholar 

  14. Whitehead, S., Mailley, J., Storer, I., McCardle, J., Torrens, G., Farrell, G.: In safe hands: a review of mobile phone anti-theft designs. Eur. J. Crim. Policy Res. 14(1), 39–60 (2008)

    Article  Google Scholar 

  15. Wu, W., Dasgupta, S., Ramirez, E.E., Peterson, C., Norman, G.J.: Classification accuracies of physical activities using smartphone motion sensors. J. Med. Internet Res. 14(5), e130 (2012)

    Article  Google Scholar 

  16. Yu, X., Wang, Z., Sun, K., Zhu, W.T., Gao, N., Jing, J.: Remotely wiping sensitive data on stolen smartphones. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 537–542. ACM (2014)

    Google Scholar 

Download references

Acknowledgements

This paper is supported by the National Science Foundation of China under No. U1301256 and 51274202, Special Project on IoT of China NDRC (2012-2766).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhuolong Yu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Yu, Z., Huang, L., Guo, H., Xu, H. (2016). i-Shield: A System to Protect the Security of Your Smartphone. In: Lehner, F., Fteimi, N. (eds) Knowledge Science, Engineering and Management. KSEM 2016. Lecture Notes in Computer Science(), vol 9983. Springer, Cham. https://doi.org/10.1007/978-3-319-47650-6_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47650-6_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47649-0

  • Online ISBN: 978-3-319-47650-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics