Call for Paper - May 2019 Edition
IJCA solicits original research papers for the May 2019 Edition. Last date of manuscript submission is April 20, 2019. Read More

Tracking Smartphone Users using Activity Recognition and Location based Services

IJCA Proceedings on National Conference on Advances in Computing
© 2015 by IJCA Journal
NCAC 2015 - Number 7
Year of Publication: 2015
Vishal Sambyal
Yuvaraj N. N

Vishal Sambyal, Yuvaraj N.n and Abhishek. Article: Tracking Smartphone Users using Activity Recognition and Location based Services. IJCA Proceedings on National Conference on Advances in Computing NCAC 2015(7):14-17, December 2015. Full text available. BibTeX

	author = {Vishal Sambyal and Yuvaraj N.n and Abhishek},
	title = {Article: Tracking Smartphone Users using Activity Recognition and Location based Services},
	journal = {IJCA Proceedings on National Conference on Advances in Computing},
	year = {2015},
	volume = {NCAC 2015},
	number = {7},
	pages = {14-17},
	month = {December},
	note = {Full text available}


The numbers of smartphone users is expected to be 2 billion around the globe by 2016 according to new figure e-Marketer, there is a great need of efficient location tracking system. At the same time the privacy of the users is a prime concern for security. The traditional global positioning system is not able to efficiently track the indoor location of users. This paper is comprehensive survey of various localization techniques and proposes a combined approach of GPS, cellular tower triangulation, Activity recognition, Wi-Fi and Harversine Formula to track the user's location.


  • RagibHasan, Rasib Khan, Shams Zawoad, and MdMunirulHaque "A Witness Oriented Secure Location Provenance Framework for Mobile Devices," IEEE Transactions on Emerging Topics in Computing. 2015. Volume 10. pp. 8-11.
  • Xing Su, Hanghang Tong, and Ping Ji "Activity Recognition with Smartphone Sensors" TSINGHUA SCIENCE AND TECHNOLOGY. Volume 19, Number 3, June 2014 llpp235-249
  • N. O. Tippenhauer, K. B. Rasmussen, C. Popper, and S. Capkun, "iPhone and iPod location spoofing" SysSec Tech. Rep. , ETH Zurich, April, 2008.
  • J. VanGrove, "Foursquare cracks down on cheaters. " Online at http://mashable. com/2010/04/07/foursquare-cheaters/, April 2010
  • Maduako, "Wanna hack a drone? possible with geo-location spoofing!", Online at http://geoawesomeness. com/?p=893,July 2012
  • PornpenRatsameethammawong and M. L. KulthonKasemsan Faculty of Information Technology, Rangsit University, Thailand "Mobile Phone Location Tracking by the Combination of GPS, Wi-Fi and Cell Location Technology. 2010 Volume 566928 pp. 3-7
  • J. Lester, T. Choudhury, and G. Borriello, A practical approach to recognizing physical activities, in Pervasive Computing, Springer, 2006, pp. 1-16.
  • L. Bao and S. S. Intille," Activity recognition from user annotated acceleration data, in Pervasive Computing", Springer, 2004, pp. 1-17.
  • Google Android, Sensors overview, http://developer. android. com/guide/topics/sensors/sensors overview. html,2014, Mar. 01.
  • W. Song, J. Lee, H. G. Schulzrinne, and B. Lee, "Finding 9-1-1 callers in tall buildings", http://academiccommons. columbia. edu/item/ac:156057, 2014.
  • Y. Chon, E. Talipov, H. Shin, and H. Cha, "Mobility prediction-based smartphone energy optimization for everyday location monitoring," in SenSys 2011, 2011, pp. 82–95.
  • P. M. Wightman, M. Zurbaran, M. Rodríguez, M. A. Labrador, at 8th IEEE Workshop on Network Security. 2013. Volume 13 pp. 964-967
  • Y. Liang, X. Zhou, Z. Yu, and B. Guo, "Energy-efficient motion related activity recognition on mobile devices for pervasive healthcare, Mobile Networks and Applications," pp. 1-15, 2013.
  • Y. E. Ustev, O. DurmazIncel, and C. Ersoy, "User, device and orientation independent human activity recognition on mobile phones: Challenges and a proposal," in Proc. 13th Int. Pervasive and Ubiquitous Computing Adjunct Publication Conf. , Zurich, Switzerland, 2013, pp. 1427- 1436.
  • E. Gabber and A. Wool, "How to prove where you are: tracking the location of customer equipment," in Proc. of CCS. ACM, 1998, pp. 142–149.
  • D. E. Denning and P. F. MacDoran, "Location-based authentication: Grounding cyberspace for better security," Computer Fraud & Security, vol. 1996, no. 2, pp. 12–16, 1996.
  • W. Luo and U. Hengartner, "Proving your location without giving up your privacy," in Proc. of HotMobile, 2010, pp. 7–12.