帳號:guest(3.22.248.177)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目
作者(中文):洪偉誠
作者(外文):Ang, Wei Cheng
論文名稱(中文):利用未接來電來達到遠端監控之研究
論文名稱(外文):A Study of Remote Surveillance using Multiple Missed Calls
指導教授(中文):孫宏民
指導教授(外文):Sun, Hung-Min
口試委員(中文):顏嵩銘
洪國寶
口試委員(外文):Yen, Sung-Ming
Horng, Gwoboa
學位類別:碩士
校院名稱:國立清華大學
系所名稱:資訊系統與應用研究所
學號:100065424
出版年(民國):102
畢業學年度:101
語文別:英文
論文頁數:39
中文關鍵詞:未接來電監控
外文關鍵詞:AndroidLocationMissed CallSurveillance
相關次數:
  • 推薦推薦:0
  • 點閱點閱:573
  • 評分評分:*****
  • 下載下載:0
  • 收藏收藏:0
智慧型手機日漸普及。大部分的手機都含有各式各樣的感應器。手機上的定位系統、相機、錄音功能等等都可能被當成監控的工具。我們提出一個利用未接來電來傳達坐標的位置追蹤系統。監控端會用收到的未接來電的資料來解出發送出來的坐標。由於不可避免的基地台和手機系統的時間延誤,有時候會有解碼錯誤的情況。調整參數與加入能夠修補資料或偵測錯誤的編碼預計能提高資料傳輸的準確率。
Smartphones and tablets are getting more accessible to the common people with affordable price and wide selection of hardware specifications. Most of the mobile devices come with built-in cameras, microphones and GPS sensors that can be used as surveillance device. We propose a location tracking system that would track and send user's geographical coordinates stealthily in the background using multiple missed calls to a predefined phone number. The receiver would decode the location data using an agreed format of the duration of the missed calls. Delay in the internal message passing of Android and the latency of mobile cellular network base stations reduces the bandwidth that can be achieved by our prototype and also causes errors. There are cases where duration of a missed call is mis-categorized into unintended group. The grouping is used for coding of location data. We are able to send data up to 0.12bit/s with a modified phone application on Android operating system. The location of the user can be transmitted in 5 minutes. Subsequent location notification costs less time as only the changes in coordinates compare to previous update are sent. The proposed method of data transmission using missed calls can be easily replaced by internet connection or Short Message Service(SMS) but typically it would cost money to do so. Further fine-tuning of the missed call duration parameter should increase the bandwidth of the system. Inclusion of data detection or correction code should reduce the interpretation errors.
Chapter 1 Introduction ............................................................................. 1
Chapter 2 Background............................................................................... 3
2.1 Mobile Cellular Phone Network .......................................................... 3
2.1.1 Global System for Mobile Communications.......................... 4
2.2 Longitude and Latitude....................................................................... 6
2.3 Location Technologies ......................................................................... 7
2.3.1 Global Positioning System.................................................... 7
2.3.2 Wireless Positioning.............................................................. 7
2.3.3 IP Location........................................................................... 7
2.3.4 Cellular Identification ........................................................... 8
2.4 Android............................................................................................... 8
2.4.1 Platform Architecture........................................................... 9
2.4.2 Intents................................................................................... 10
2.4.3 Service................................................................................... 10
2.5 CyanogenMod...................................................................................... 11
Chapter 3 Related Work........................................................................... 12
3.1 Side Channel Spying............................................................................ 12
3.2 Location Tracking ............................................................................... 13
Chapter 4 Design........................................................................................ 14
4.1 Proposed System................................................................................. 14
4.2 Missed Calls Approach........................................................................ 15
4.2.1 Variable hangup duration ..................................................... 15
i
4.2.2 Binary form........................................................................... 16
4.2.3 Multiple phones .................................................................... 16
4.3 Coding of Geographical Coordinates................................................... 17
4.3.1 Conversion into Decimal Degree form................................... 18
4.3.2 Accuracy of Decimal places .................................................. 18
4.3.3 Fractions Representations..................................................... 19
4.3.4 Movement Representation..................................................... 20
4.3.5 Coding Approach.................................................................. 21
Chapter 5 Implementation........................................................................ 23
5.1 Explicit Tracking System .................................................................... 23
5.1.1 Client.................................................................................... 23
5.1.2 Server.................................................................................... 25
5.1.3 Incoming call state................................................................ 25
5.1.4 Outgoing call state................................................................ 26
5.1.5 Initiate outgoing call............................................................. 27
5.1.6 Terminate outgoing call........................................................ 28
5.1.7 User Interface........................................................................ 28
5.2 Stealth Tracking System ..................................................................... 30
5.2.1 Modified Phone App............................................................. 31
5.2.2 Stealth Client App................................................................ 31
5.2.3 Extra Outgoing Call State.................................................... 31
Chapter 6 Discussion ................................................................................. 34
Chapter 7 Conclusion ................................................................................ 36
7.1 Future Work........................................................................................ 37
[1] Rakesh Agrawal and Ramakrishnan Srikant. Privacy-preserving data mining.
ACM Sigmod Record, 29(2):439–450, 2000.
[2] Erika Chin, Adrienne Porter Felt, Kate Greenwood, and David Wagner. An-
alyzing inter-application communication in android. In Proceedings of the 9th
international conference on Mobile systems, applications, and services, pages
239–252. ACM, 2011.
[3] Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, and David Wagner.
Android permissions demystified. In Proceedings of the 18th ACM conference
on Computer and communications security, pages 627–638. ACM, 2011.
[4] Google. Android developers. https://developer.android.com/, 2013. Ac-
cessed: 2013-06-27.
[5] U.S. Government. Official u.s. government information about the global posi-
tioning system (gps) and related topics. http://www.gps.gov, 2013. Accessed:
2013-06-29.
[6] L.J. Harte, R. Levine, and G. Livingston. GSM SuperPhones. McGraw-Hill
Telecommunications. McGraw-Hill Osborne Media, 1999. ISBN 9780070381773.
[7] Nathaniel Husted and Steven Myers. Mobile location tracking in metro areas:
malnets and others. In Proceedings of the 17th ACM conference on Computer
and communications security, pages 85–96. ACM, 2010.
[8] NN Katugampala, KT Al-Naimi, S Villette, and AM Kondoz. Real time end
to end secure voice communications over gsm voice channel. In 13th European
signal processing conference, pages 27–31, 2005.
[9] John Krumm. Inference attacks on location tracks. In Pervasive Computing,
pages 127–143. Springer, 2007.
[10] Reto Meier. Professional Android 4 application development. Wrox, 2012.
[11] Machigar Ongtang, Stephen McLaughlin, William Enck, and Patrick McDaniel.
Semantically rich application-centric security in android. Security and Commu-
nication Networks, 5(6):658–673, 2012.
[12] Oracle. The reflection api. http://docs.oracle.com/javase/tutorial/reflect/,
2013. Accessed: 2013-07-02.
[13] Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig, and Joy Zhang. Acces-
sory: password inference using accelerometers on smartphones. In Proceedings
of the Twelfth Workshop on Mobile Computing Systems & Applications, page 9.
ACM, 2012.
[14] S.H. Redl, M.K. Weber, and M.W. Oliphant. An Introduction to Gsm.
Mobile communications series. Artech House, Incorporated, 1995. ISBN
9780890067857.
[15] PA Roberts and S Challinor. Ip address management. BT technology journal,
18(3):127–136, 2000.
[16] Shobhank Sharma, Rajmohan Rajanayagam, Sagar Chinchani, Neel Sheth, and
Prathyusha Vadlamudi. Multihop internet access using android. ECE-575
Introduction to Wireless Networking, 2011.
[17] Xianhua Shu, Zhenjun Du, and Rong Chen. Research on mobile location ser-
vice design based on android. In Wireless Communications, Networking and
Mobile Computing, 2009. WiCom’09. 5th International Conference on, pages
1–4. IEEE, 2009.
[18] Nirmali Sivapragasam, Ayesha Zainudeen, and Dimuthu Ratnadiwakara. Hit
me with a missed call: The use of missed calls at the bottom of the pyramid. In
3rd Communication Policy Research South Conference (CPRsouth3) Beijing,
China, 2008.
[19] Janice Tsai, Patrick Kelley, Lorrie Cranor, and Norman Sadeh. Location-
sharing technologies: Privacy risks and controls. TPRC, 2009.
[20] Zhi Xu, Kun Bai, and Sencun Zhu. Taplogger: Inferring user inputs on smart-
phone touchscreens using on-board motion sensors. In Proceedings of the fifth
ACM conference on Security and Privacy in Wireless and Mobile Networks,
pages 113–124. ACM, 2012.
[21] Hyeon-Ju Yoon. A study on the performance of android platform. International
Journal on Computer Science and Engineering, 4(4):532–537, 2012.
[22] Paul A Zandbergen. Accuracy of iphone locations: A comparison of assisted
gps, wifi and cellular positioning. Transactions in GIS, 13(s1):5–25, 2009.
(此全文未開放授權)
電子全文
摘要
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *