CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Tracking Smartphone Users using Activity Recognition and Location based Services

Published on December 2015 by Vishal Sambyal, Yuvaraj N.n, Abhishek
National Conference on Advances in Computing
Foundation of Computer Science USA
NCAC2015 - Number 7
December 2015
Authors: Vishal Sambyal, Yuvaraj N.n, Abhishek
2fddc337-1de5-4ffa-a145-2483474f0205

Vishal Sambyal, Yuvaraj N.n, Abhishek . Tracking Smartphone Users using Activity Recognition and Location based Services. National Conference on Advances in Computing. NCAC2015, 7 (December 2015), 14-17.

@article{
author = { Vishal Sambyal, Yuvaraj N.n, Abhishek },
title = { Tracking Smartphone Users using Activity Recognition and Location based Services },
journal = { National Conference on Advances in Computing },
issue_date = { December 2015 },
volume = { NCAC2015 },
number = { 7 },
month = { December },
year = { 2015 },
issn = 0975-8887,
pages = { 14-17 },
numpages = 4,
url = { /proceedings/ncac2015/number7/23403-5073/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computing
%A Vishal Sambyal
%A Yuvaraj N.n
%A Abhishek
%T Tracking Smartphone Users using Activity Recognition and Location based Services
%J National Conference on Advances in Computing
%@ 0975-8887
%V NCAC2015
%N 7
%P 14-17
%D 2015
%I International Journal of Computer Applications
Abstract

The numbers of smartphone users is expected to be 2 billion around the globe by 2016 according to new figure e-Marketer, there is a great need of efficient location tracking system. At the same time the privacy of the users is a prime concern for security. The traditional global positioning system is not able to efficiently track the indoor location of users. This paper is comprehensive survey of various localization techniques and proposes a combined approach of GPS, cellular tower triangulation, Activity recognition, Wi-Fi and Harversine Formula to track the user's location.

References
  1. RagibHasan, Rasib Khan, Shams Zawoad, and MdMunirulHaque "A Witness Oriented Secure Location Provenance Framework for Mobile Devices," IEEE Transactions on Emerging Topics in Computing. 2015. Volume 10. pp. 8-11.
  2. Xing Su, Hanghang Tong, and Ping Ji "Activity Recognition with Smartphone Sensors" TSINGHUA SCIENCE AND TECHNOLOGY. Volume 19, Number 3, June 2014 llpp235-249
  3. N. O. Tippenhauer, K. B. Rasmussen, C. Popper, and S. Capkun, "iPhone and iPod location spoofing" SysSec Tech. Rep. , ETH Zurich, April, 2008.
  4. J. VanGrove, "Foursquare cracks down on cheaters. " Online at http://mashable. com/2010/04/07/foursquare-cheaters/, April 2010
  5. Maduako, "Wanna hack a drone? possible with geo-location spoofing!", Online at http://geoawesomeness. com/?p=893,July 2012
  6. PornpenRatsameethammawong and M. L. KulthonKasemsan Faculty of Information Technology, Rangsit University, Thailand "Mobile Phone Location Tracking by the Combination of GPS, Wi-Fi and Cell Location Technology. 2010 Volume 566928 pp. 3-7
  7. J. Lester, T. Choudhury, and G. Borriello, A practical approach to recognizing physical activities, in Pervasive Computing, Springer, 2006, pp. 1-16.
  8. L. Bao and S. S. Intille," Activity recognition from user annotated acceleration data, in Pervasive Computing", Springer, 2004, pp. 1-17.
  9. Google Android, Sensors overview, http://developer. android. com/guide/topics/sensors/sensors overview. html,2014, Mar. 01.
  10. W. Song, J. Lee, H. G. Schulzrinne, and B. Lee, "Finding 9-1-1 callers in tall buildings", http://academiccommons. columbia. edu/item/ac:156057, 2014.
  11. Y. Chon, E. Talipov, H. Shin, and H. Cha, "Mobility prediction-based smartphone energy optimization for everyday location monitoring," in SenSys 2011, 2011, pp. 82–95.
  12. P. M. Wightman, M. Zurbaran, M. Rodríguez, M. A. Labrador, at 8th IEEE Workshop on Network Security. 2013. Volume 13 pp. 964-967
  13. Y. Liang, X. Zhou, Z. Yu, and B. Guo, "Energy-efficient motion related activity recognition on mobile devices for pervasive healthcare, Mobile Networks and Applications," pp. 1-15, 2013.
  14. Y. E. Ustev, O. DurmazIncel, and C. Ersoy, "User, device and orientation independent human activity recognition on mobile phones: Challenges and a proposal," in Proc. 13th Int. Pervasive and Ubiquitous Computing Adjunct Publication Conf. , Zurich, Switzerland, 2013, pp. 1427- 1436.
  15. E. Gabber and A. Wool, "How to prove where you are: tracking the location of customer equipment," in Proc. of CCS. ACM, 1998, pp. 142–149.
  16. D. E. Denning and P. F. MacDoran, "Location-based authentication: Grounding cyberspace for better security," Computer Fraud & Security, vol. 1996, no. 2, pp. 12–16, 1996.
  17. W. Luo and U. Hengartner, "Proving your location without giving up your privacy," in Proc. of HotMobile, 2010, pp. 7–12.
Index Terms

Computer Science
Information Sciences

Keywords

Activity Recognition Cellular Tower Triangulation Mobile Sensors