Touch and Track: An Anti-theft and Data Protection Technique for Smartphones

  • Sohini RoyEmail author
  • Arvind Kumar Shah
  • Uma Bhattacharya
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 625)


At present, the use of smartphones has reached a boom. With the increase in the use of smartphones, the need for protecting such devices from theft has also come up. A number of anti-theft mechanisms are designed so far to protect the smartphones from being stolen away. However, only anti-theft mechanisms are not enough. A good data protection technique should be coupled with a strong anti-theft mechanism such that, even if the device is stolen, the confidential data does not go into the wrong hands. In this paper, a new anti-theft mechanism combined with a robust data protection technique is designed for smartphones. In this work, context-awareness is used as a decision-making technique to automatically determine a theft of the device and as a consequence data protection technique, tracking mechanism and recovery system are initiated. So that, not only the device is recovered in a re-usable form but also the thief is caught easily. The work proposed in this paper has been compared with Where’s My Droid app and AndroidLost Free. The outcome of the comparison shows the novelty of our approach in terms of automatic theft detection, device tracking (including indoor location detection) and data protection.


Smartphones Anti-theft application Data protection Data backup Device tracking Theft-detection Wi-Fi interface 


  1. 1.
    Chourabi, H., Nam, T., Walker, S., Gil-Garcia, J.R., Mellouli, S., Nahon, K., Pardo, T.A., Scholl, H.J.: Understanding smart cities: an integrative framework. In: Proceedings of 45th Hawaii International Conference on System Sciences, pp. 2289–2297. IEEE (2012)Google Scholar
  2. 2.
    Khan, A.U.S., Qureshi, M.N., Qadeer, M.A.: Anti-theft application for android based devices. In: 2014 IEEE International Advance Computing Conference (IACC), pp. 365–369. IEEE (2014)Google Scholar
  3. 3.
    Kumar, C.L., Arunachalam, P., Sandhya, S.: Biometric anti-theft and tracking system for mobiles–BATS. Int. J. Recent Trends Eng. 1(1), 237–242 (2009)Google Scholar
  4. 4.
    Sonia, C.V., Aswatha, A.R.: SAPt: a stolen android phone tracking application. ITSI Trans. Electr. Electron. Eng. 1(6), 111–115 (2013)Google Scholar
  5. 5.
    Malkani, Y.A., Dhomeja, L.D.: Location aware device discovery for physically constrained environments. In: Proceedings of 2nd International Conference on Computer, Control and Communication, pp. 1–5. IEEE (2009)Google Scholar
  6. 6.
    Bayir, M.A., Demirbas, M., Cosar, A.: Track ME! a web based location tracking and analysis system for smart phone users. In: Proceedings of 24th International Symposium on Computer and Information Sciences (ISCIS 2009), pp. 117–122. IEEE, September 2009Google Scholar
  7. 7.
  8. 8.
  9. 9.
    Roy, S., Sinha, D.: CBSRP: cluster based secure routing protocol. In: Proceedings of First International Conference on Networks and Soft Computing (ICNSC 2014), pp. 82–86. IEEE (2014)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2016

Authors and Affiliations

  • Sohini Roy
    • 1
    Email author
  • Arvind Kumar Shah
    • 2
  • Uma Bhattacharya
    • 1
  1. 1.Indian Institute of Engineering Science and Technology ShibpurHowrahIndia
  2. 2.Microsoft Global Delivery Services India Pvt. Ltd.HyderabadIndia

Personalised recommendations