Skip to main content

A Security System Based on Door Movement Detecting

  • Conference paper
Intelligent Data analysis and its Applications, Volume I

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 297))

  • 1829 Accesses

Abstract

Recently, the smartphone devices have become the one of the most popular production in the whole world and the price of smartphone have become cheaper and cheaper. Especially, most of the smartphones have embedded lots of sensors such as light sensor, orientation sensor, accelerometer sensor, etc. Thus, our research is implemented a security application called DoorPass which based on smartphone device sensors. By placing the smartphone behind the door, DoorPass can detect the door movement, and provide some protection to the user. We provided three kinds of notification which are sending sms, make a phone call, and send email. Besides, we also provide three different functions for protection which are track phone, video record, and face detection. By implementing on the smartphone, DoorPass not only can provide the protection but also lower down the cost fee of buying the security hardware and provided convenient, simple and security functions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Security company, http://www.boschsecurity.com.tw/content/language1/html/55_CHT_XHTML.asp

  2. Android sensor, http://developer.android.com/reference/android/hardware/Sensor.html

  3. Comparison of smartphones, http://en.wikipedia.org/wiki/Comparison_of_smartphones

  4. Ravindranath, L., Newport, C., Balakrishnan, H., Madden, S.: Improving wireless network performance using sensor hints. In: Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation, p. 21. USENIX Association (2011)

    Google Scholar 

  5. Motorola motox, http://www.motorola.com/us/consumers/Moto-X/moto-x,en_US,pg.html

  6. Wang, E.K., Ye, Y., Xu, X.: Location-based distributed group key agreement scheme for vehicular ad hoc network. International Journal of Distributed Sensor Networks 2014 (2014)

    Google Scholar 

  7. Wei-Chi, K., Chien-Ming, C., Hui-Lung, L.: Cryptanalysis of a variant of peyravian-zunic’s password authentication scheme. IEICE Transactions on Communications 86(5), 1682–1684 (2003)

    Google Scholar 

  8. Chen, C.M., Chen, Y.H., Lin, Y.H., Sun, H.M.: Eliminating rouge femtocells based on distance bounding protocol and geographic information. Expert Systems with Applications 41(2), 426–433 (2014)

    Article  MathSciNet  Google Scholar 

  9. He, B.Z., Chen, C.M., Su, Y.P., Sun, H.M.: A defence scheme against identity theft attack based on multiple social networks. Expert Systems with Applications 41(5), 2345–2352 (2014)

    Article  Google Scholar 

  10. Sun, H.M., Wang, H., Wang, K.H., Chen, C.M.: A native apis protection mechanism in the kernel mode against malicious code. IEEE Transactions on Computers 60(6), 813–823 (2011)

    Article  MathSciNet  Google Scholar 

  11. Wu, T.Y., Tseng, Y.M.: Further analysis of pairing-based traitor tracing schemes for broadcast encryption. Security and Communication Networks 6(1), 28–32 (2013)

    Article  Google Scholar 

  12. Chen, C.M., Wang, K.H., Wu, T.Y., Pan, J.S., Sun, H.M.: A scalable transitive human-verifiable authentication protocol for mobile devices. IEEE Transactions on Information Forensics and Security 8(8), 1318–1330 (2013)

    Article  Google Scholar 

  13. Chen, C.M., Lin, Y.H., Chen, Y.H., Sun, H.M.: Sashimi: secure aggregation via successively hierarchical inspecting of message integrity on wsn. Journal of Information Hiding and Multimedia Signal Processing 4(1), 57–72 (2013)

    Article  Google Scholar 

  14. He, Z.Y., Jin, L.W.: Activity recognition from acceleration data using ar model representation and svm. In: 2008 International Conference on Machine Learning and Cybernetics, vol. 4, pp. 2245–2250. IEEE (2008)

    Google Scholar 

  15. He, Z., Jin, L.: Activity recognition from acceleration data based on discrete consine transform and svm. In: IEEE International Conference on Systems, Man and Cybernetics, SMC 2009, pp. 5041–5044. IEEE (2009)

    Google Scholar 

  16. Bao, L., Intille, S.S.: Activity recognition from user-annotated acceleration data. In: Ferscha, A., Mattern, F. (eds.) PERVASIVE 2004. LNCS, vol. 3001, pp. 1–17. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  17. Casale, P., Pujol, O., Radeva, P.: Human activity recognition from accelerometer data using a wearable device. In: Vitrià, J., Sanches, J.M., Hernández, M. (eds.) IbPRIA 2011. LNCS, vol. 6669, pp. 289–296. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  18. Ravi, N., Dandekar, N., Mysore, P., Littman, M.L.: Activity recognition from accelerometer data. In: AAAI, pp. 1541–1546 (2005)

    Google Scholar 

  19. Shin, S.H., Yeo, J.Y., Ji, S.H., Jeong, G.M.: An analysis of vibration sensors for smartphone applications using camera. In: 2011 International Conference on ICT Convergence (ICTC), pp. 772–773. IEEE (2011)

    Google Scholar 

  20. Xu, Z., Bai, K., Zhu, S.: Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors. In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 113–124. ACM (2012)

    Google Scholar 

  21. Cai, L., Chen, H.: Touchlogger: inferring keystrokes on touch screen from smartphone motion. In: Proceedings of the 6th USENIX Conference on Hot Topics in Security, p. 9. USENIX Association (2011)

    Google Scholar 

  22. Owusu, E., Han, J., Das, S., Perrig, A., Zhang, J.: Accessory: password inference using accelerometers on smartphones. In: Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, p. 9. ACM (2012)

    Google Scholar 

  23. Cai, L., Chen, H.: On the practicality of motion based keystroke inference attack. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 273–290. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  24. Han, J., Owusu, E., Nguyen, L.T., Perrig, A., Zhang, J.: Accomplice: Location inference using accelerometers on smartphones. In: 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS), pp. 1–9. IEEE (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ci-Rong Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Li, CR., Kuan, CY., He, BZ., Wu, WE., Weng, CY., Sun, HM. (2014). A Security System Based on Door Movement Detecting. In: Pan, JS., Snasel, V., Corchado, E., Abraham, A., Wang, SL. (eds) Intelligent Data analysis and its Applications, Volume I. Advances in Intelligent Systems and Computing, vol 297. Springer, Cham. https://doi.org/10.1007/978-3-319-07776-5_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07776-5_17

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07775-8

  • Online ISBN: 978-3-319-07776-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics