View
2
Download
0
Category
Preview:
Citation preview
Lecture Notes on Software Engineering, Vol. 3, No. 4, November 2015
325DOI: 10.7763/LNSE.2015.V3.213
Abstract—The mobile phones have become undeletable part
of human’s daily life, it has created a huge wireless network across the world. Android has carried a wide attention in mobile operating system era due to its features like Open Source, free of cost, customizable and large number of applications. Android’s Cloud to Device Messaging (C2DM) is a project for androids; it provides a service that helps in sending data from servers to their android devices and vice-versa. This paper presents a framework that uses C2DM server to identify suspicious persons or object and terrorist activities. Whenever any suspicious activity is recorded by any registered device it sends the data or the alert to the crime branch through C2DM server and an alert can be generated to the Police and persons present at nearby area. This framework can also be used in sending alert messages on the event of natural disasters like earthquake, Tsunami, Heavy rain etc.
Index Terms—Android devices, cloud to device messaging service (C2DM), platform-as-a-service (PaaS), polling/push services, terrorist activity detection.
I. INTRODUCTION In recent times terrorist groups, terrorist activities and
terrorist attacks have taken place in every corner of the world [1], [2]. Detection of suspected person or suspicious activity may save no. of catastrophic events [3]. In a country with large population, monitoring for suspicious activities becomes a very difficult task for the police or the crime branch authorities. With the advancing technology responsible citizens may also be involved for detecting such threats and for a widespread message communication. In this paper, we are designing a push notification system between an intelligence bureau server and android Smartphone (popular and commonly in use today) using Google's cloud to device messaging service (C2DM) [4]. To use it for a real life problem of terrorism, push alerts can be generated on the registered android devices in the terrorist prone region. The citizen on receiving the alert can send the image of possible suspect if found in vicinity. The image can be further scrutinized and appropriate action can be taken by the Crime Branch. The application also provides a messaging option and IMEI tracing which helps the bureau experts to keep track of the situation near the concerned informer. Thus, this system will be helpful in controlling the terrorist activities and reducing life threat in critical scenarios.
Manuscript received August 10, 2014; revised October15, 2014. Rajesh Doriya and K. Suraj are with the National Institute of Technology,
Raipur, India (e-mail: rajeshdoriya.it@nitrr.ac.in, k.suraj1993@gmail.com). Pavan Chakraborty is with the Indian Institute of Information Technology,
Allahabad, India (e-mail: pavan@iiita.ac.in).
A. Importance of Using Push Service C2DM Push Notifications [5] is a web service that will
enable bureau authorities to send a notification to an application on a citizen's device, even when the application isn't running. They can send a notification to a single citizen, multiple citizens, or you can broadcast it to a predefined group of citizens. Depending on the device platform, a notification can include a badge, text alert, or sound, or a combination of these.
Push Service offers several other advantages over polling mechanism [6]. The traditional method of keeping the data fresh on the end-user side is to run a long process that updates after a predefined interval via polling. The factors like cost of tuning up, performing requests and ripping down a connection is less than the cost of upholding a connection on the server. But as a result, it introduces several problems [7]. The first observable problem is, the total number of bytes desirable to accomplish the requests on the server typically ends up being a greater than the total bytes required to produce replies to direct that no new data is obtainable since last poll. And the other noticeable problem is that, limiting number of requests as per the server capacity is much harder. As the population is big and client processes are also large and so the number of simultaneous polls that contact the server at the same time grow at the same rate. Using push, we can provide updates to citizens at a rate that the server system can handle since the server is accountable for communicating the end users device.
Some of the practical usage that can be implemented using proposed approach are listed below: 1) Many terrorist activities takes place in all over the world,
with the android devices they can be notified and send useful data like GPS location, images etc. to the main server of the intelligence so that the precautionary measures can be taken [8].
2) Event like burglary or any emergency can be handled quite effectively. Suppose we have the application server which keeps track of the CCTV camera at a certain high alert place that can be used to generate the messages to the concerned users.
3) As android is widely popular we can’t ignore its importance in medical filed. Patients suffering with some serious can be monitored using the messaging service.
The rest of the paper is organized as follows: Section II describes the details of android platform and Google’s C2DM system for notification. Section III states the life cycle and working of notification system. Section IV describes the framework for terrorist activities detection. Section V concludes our work and introduces the possible application areas.
A C2DM Based Framework for Detection and Notification of Terrorist Activities on Android Platform
Rajesh Doriya, K. Suraj, and Pavan Chakraborty
A
deprmefmpestFivadrSuanthfrpain
heapprcaseda
mtabiachachw
Plfranse1)
Fig. 1. Softwar
II. ANDROID
A. Android PAndroid is
esigned for mrogrammed in
mechanisms anfficient sha
multitasking, ermissions wack of androidig. 1. First layarious driversriver etc. Secourface Managndroid runtimhat contains pramework it cackage managnterface option
B. Google’s Android Clo
elps developpplications onrovides a lighan practice toerver directly ata.
The C2DM messages and darget device. Iig challenge ctivities are darm human hallenges whic
warnings are isThe C2DM
latform-as-a-Samework conndroid supporervers. ) Android s
re stack’s layered
D PLATFORM &
Platform an open sour
mobile devicesn Java. It hnd other featuared memorUNIX user ith Java's typd is a four layyer is consists like keypadond layer consger, Media fra
me core librarirocesses. Thicontains activger etc. The ns such as hom
C2DM Servicoud to Devicers to send n Android d
htweight and o communicatand that can f
service handdelivery to the In recent timeto detect, it
detected or sobeings. Nat
ch can be ovesued within ti
M service Service (Pansists of thrrted device, c
supported dev
d architecture of a
& GOOGLE’S
rce operatings and tablets
has its own ures of an opery utilizati
identifiers pe safe mech
yered architectts of Linux kd driver, Wi-sists of commoamework SQLies and Dalvikird layer cons
vity manager, top layer is
me, browser, p
ce ce Messaging
data from devices (Fig.modest mechte mobile appfetch updated
dles all aspectarget applica
e terrorist activwould be v
ome suspicioutural disasterercome or can ime.
of Google aaS) deliverree main cocrime branch
vice — the
android devices [9
C2DM SERVI
g system specwith Linux kenhanced secerating systemon, pre-em(UIDs) and
hanisms. Softture as describernel that con-Fi driver, dion libraries su
Lite etc. alongk Virtual Masists on applic
window mans consists of phone, contact
g (C2DM) seservers to
2). The sehanism that seplications witapplication or
cts of queuination running ovities is one overy useful ius object thars are the reduce the ha
is based ry model. mponents naserver and C
device carrie
9].
CE
cially kernel curity
m like mptive
file ftware bed in ntains isplay uch as g with achine cation nager
f user ts etc.
ervice their
ervice ervers th the r user
ng of on the of the if the at can
other arm if
on The
amely C2DM
ed by
2)
3)
Thcloud
EnregisbrancitizecitizeThes
A.Th
Andrregis
StserviRegiintencertiID o
StREGgenestorerefresuchseve
Ststore
citizen and incorporates android 2.2 orCrime Branchup as a part oThe crime braC2DM serverC2DM serverframework aslocating the dused in dissimlisted device information is
Fig. 2. Bas
III. LIF
here are thd-to-device mnabling C2Dsters to receiv
nch applicatioens. Receivinen’s device rse processes a
Enabling C2his is the seroid applicatisters to receivtep 1: At the ices, it sendsistration nt.REGISTERfied to send m
of the applicatitep 2: On GISTRATIONerates the apped for later useeshed by Googh a way so thatral times.
tep3: At the laed in the datab
is running aC2DM servi
r advance verh server — anof employing anch server ser with androidr — Authentis it identifies thdevice. The comilar phases ocarriers have
s being passed
sic working archit
FE CYCLE FLOW
hree main messaging [10]DM-Citizen uve messages.
on server senng a messagereceives a meare described i
2DM equence of evion running oe messages: first step app
a registratioIntent
R) comprises omessages to theion's develope
account oN Intent is broaplication a ree. Here, the reggle, therefore at the REGISTR
ast step, registbase of the app
an android aice. The devsion.
n application sC2DM in th
ends and receivd devices. icity plays a vhe android devoncept of Ids of C2DM to
e been authend to the authen
tecture of C2DM
W OF NOTIFIC
processes ]: sing the andr Sending a nds message
e-The Androidessage from ain more detail
vents that ocon a citizen’s
plication useson Intent to a
(com.googleof the sender e application, ner), and the apof successfuadcasted by C2egistration ID gistration ID mapplication haRATION Inten
tration ID of thplication serve
application thvice must ha
server that is eir applicationves data throu
vital role in tvice and helpsand Tokens aconfirm that
nticated, and tnticated user.
M service.
CATION convoluted
roid applicatimessage-Crims to registerd application a C2DM servbelow:
ccurs when ts mobile devi
s the messagia C2DM serve.andr-oid.c2dm
ID (the accounamely an em
pplication ID.ul registratio2DM server thand this ID
may periodicaas to be designnt may be call
he applicationer.
hat ave
set ns.
ugh
the s in are all the
in
ion me red on
ver.
the ice
ing ver. m- unt
on, hat
is ally ned led
n is
Lecture Notes on Software Engineering, Vol. 3, No. 4, November 2015
326
This registration ID persists until the application unregisters itself, or Google restores the new registration ID for application.
B. Sending a Message For this crime branch will use an application server to send
a message, which requires the following prerequisites: 1) The application contains registration ID of citizen’s
device that permits it to receive messages for a particular citizen.
2) The registration ID has been stored by the crime branch application server.
To send messages a ClientLogin authorization token is also required for the application server and it is the mandatory requirement at the application server. This enables sending messages to the device. The ClientLogin token ID approves the application server to direct messages to a particular Android application. An application server contains only one ClientLogin token ID for the third party application, and multiple registration IDs. Each registration ID characterizes a specific device that has been listed to use the messaging service for a specific third party application.
The following events occur when the application server directs a message: 1) The crime branch authorities use the application server
to send a message to C2DM servers. 2) Google put in queues and stores the message in case the
citizen's device is inactive. 3) When the device is online, Google sends the message to
the device via Intent broadcast this enables the application to wake up.
4) At the device, the message is broadcasted by the system to specified application through Intent broadcast with adequate authentication, so that only intended application acquires the message. This stirs the application up. It is not necessary to run the application to get the message.
5) The message is processed by the application.
C. Receiving a Message Some events occur in specified order when a message is
received at the user’s device: 1) The C2DM system receives the message from crime
branch and extracts the raw key/value sets from message payload.
2) The system permits the key/value sets to the Android application on citizen’s device in a com.google.android.c2dm.intent.RECEIVE Intent as a set of extras.
3) The application excerpts the raw data from RECEIVE Intent by key and processes the data so that citizen can view the message.
Fig. 3. Framework for suspicious terrorist activity detection using Google’s C2DM service.
The following C2DM credentials are used to ensure the
working: 1) Sender ID — the sender ID is used during registration
process to validate the android application that can send messages to the android device.
2) Application ID — this ID facilitates the application in registration to receive messages; the application is identified via manifest which provide the package name. This ensures proper routing of messages to the right application. An application ID is issued by the C2DM server to android application. Once the application has the registration ID, it sends to the crime branch application server that in turn identifies each android device with registration ID.
3) Google user account — C2DM needs a Google user account, therefore an android device must include
logged in Google account. 4) Server Authorization Token — a token of client login
authorization is stored on the third party server that enables authorized access to Google’s services.
IV. WORKING OF OVERALL SYSTEM In this paper, we are proposing a framework which can be
used by an intelligence department or natural disaster management department. In our work we have made the assumption that all the users are carrying android devices and later on it can be incorporated on other platforms. In the proposed work, an intelligence bureau acts as an application or third party server while the member of the squad recruited at different terror prone regions carries android devices. This way the system has all the details of the member along with
Lecture Notes on Software Engineering, Vol. 3, No. 4, November 2015
327
th
seSeSeC2wdebrthtodacrteconotepeis
geseC2thbeno
ondi
T
obimreac
he IMEI numbFig. 3 descri
ervice. In thender_Auth_Tender_Auth_T2DM server. T
which providesevice registraranch is suspichrough the C2Do send data to ata from citizerime branch sechniques and orrect, they caotification anderrorist in someople may alsorequired. The citizens
ets some suspierver. The da2DM server f
hird party intee checked to dotification to t
Furthermore,n other situatiisasters and al
F
TABLE I: THE INFOR GETTIN
S. No. Index
1 Re
[em[packa
2 [re
3 Reg[re
4 HTTP[de
5 s
When a perbject/person/ammediately seesponse the ccordingly. Th
ber of the deviibes the overahis a requesToken thenToken and a rThe registratios the sender
ation id and acious they wilDM server whthe authoritieen’s device wserver where t
validate the dan alert all the d responsible me particularo seek help fro
will send the icious persons
ata may be imforwards the dlligence bureadraw the concthe user. , In future thisions like in plerting accordi
ig. 4. Flow diagra
NDEX LISTING OF WNG PUSH MESSAG
x Table 1 Inegister mail id] age name]
[
eg. id] [a
gistered eg. id] P [reg. id] ev. id]
store
rson capturesactivity througend it to the notifications
his helps in g
ice and his resall working ost to C2DMn sender
registration id on id is sent thauthenticationapp data. Whll send a messhich will thens is he/she fin
will directly bethey can examdata. If the inpeople in thaenough to he
r threat pronom them if ex
data after regs/objects/activmage, video odata in form oau server, wheclusion. C2DM
s framework credicting natuingly.
am of overall wo
WHITE LISTED ANGES ON THEIR AN
Index Table ndex Table 2 [white listed
email id] [password] authorization
token]
[store]
---
---
s an image ogh an andro
intelligence are fired t
getting alert fo
siding addressof google’s C
M is sent toreplies
is provided bhe third party sn token contahenever the csage to the cit
n enable any cinds somethinge transferred tmine it using formation is f
at region by firelp in trackinne region. Buxhaustive searc
gistration, if hvities, to the Cor any sound of messages tere the recordM also sends
an be implemural calamitie
rking.
ND REGISTERED UNDROID DEVICE
Index Table
Message trigg
[reg. id] [toke[message]
[message]
[message]
Wake-up notification
of any suspiid device, pbureau serve
to take decifor registered
. C2DM o get
with by the server aining crime tizens itizen
g. The to the their
found ring a
ng the ureau ching
he/she C2DM
clip. to the d may
push
mented s and
USER
e 3
ger
en]
n
icious erson er. In isions users
and rI desfor g
Thservestep:
A.1)
2)
3)
4)
5)
6)
B.1)
2)
3)
C.Th
wakiseeincaptucontr1)2)
3)4)5)
WFig. a largthe pchunpackdecoapplicitizerecogdatabMulttransdata,that transthe f
responsible enscribes the indgetting push mhe stepwise floer and device :
RegistrationFiring the r[package namThe device seC2DM serverThe C2DM sapplication ([Once the devC2DM applicuse (RegistereTo register withe intelligen(HTTP [reg IdThe server remor sending no
Setting up SeSending the([whitelisted The C2DM Token]). The server stauthorized ac
Sending the he notificationing up the dedng any suspeure the imagrol room. The squad meThe message for notificatioThe C2DM seThe message The C2DM Application wpost the data a
Working of the 5. When an imge image in sipackets of sm
nks through mkets are colleoding. Where ied for taking en encountersgnition algoribase etc. Andrtipurpose Intsfer encoding , when they nethe data rem
sport. Androidfollowing wor
nough in trackdex listing of wmessages on thow of data amis shown in F
n Process (Enaegistration re
me]). ends the [Emar. server broadcareg Id]).
vice gets a succation on the ded [reg Id]). ith our terrorice bureau it md][dev Id] ). members the
otification.
erver Authorize credentialsemail id] [pas
server repli
tores the Cliencess to Googl
Alert and Wan fired by the bdicated applicaected activitiee immediatel
ember triggerswith the regis
on is passed toerver sends thwakes up the
application which with thand image to uploading an
mage in sent frize so the imagmall sizes an
multipart HTTPected and sto
various imagdecision. Lik
s a suspiciouthms for checroid device usternet Mail E
scheme commeed to transfer
mains intact wd device sendsrkflow describ
king threat prowhite listed andheir android de
mong C2DM seFig. 4 is given
abling C2DM)equest (Regis
ail id] [packa
asts the regist
ccessful registdevice stores
st detection semust send the
[reg Id] [dev I
zation Token s required fssword]). ies with a
ntLogin Authle services.
aking up the Ubureau will haation for the v
es or person ly and send
s a message attration ID, tok
o C2DM servehe message to
C2DM applicwill start
he help of HTserver.
n image in andfrom the androge if encoded
nd then conveP request. At thored into thege processingke object recogus briefcase ocking against eses base64 whExtensions (Mmonly used tor. This base64without modifs an image to bed in Fig. 3:
ne region. Tabd registered usevice. erver, third parin the followi
M) ster [Email i
age name] to t
tration ID to t
tration reply, t[reg Id] for la
erver handled e registration
Id] for receivi
for the tok
([Authorizati
h token and g
Upload App ave the abilityvery purpose. Othe citizen wit to the serv
t the server.ken and messaer. devices. cation.
the uploadiTTP request w
droid is shownoid user it mayinto strings th
erted into smhe receiver ha
e database afg algorithms agnition for if t
or package, faexisting terrorhich is a speciMIME) conteo encode bina scheme ensurfications durithe server usi
ble ser
rty ing
id]
the
the
the ater
by ID
ing
ken
ion
ets
y of On
will ver
age
ing will
n in ybe hen
mall and fter are the ace rist ific ent ary res ing ing
Lecture Notes on Software Engineering, Vol. 3, No. 4, November 2015
328
Step 1: Capture the image using device camera. Step 2: Convert image into a bitmap, which then converted
into ByteArrayOutputStream using base64. Step 3: Pass the stream array to the server side using
multipart HTTP request. Step 4: Decode thebase64 array and reform the image Step 5: Process the image to take decisions.
Fig. 5. Flow of Image capturing from android device.
V. CONCLUSION AND FUTURE WORK We have proposed a Google’s C2DM based framework for
notification of any suspicious activity/person/object for the social welfare of human beings. In the framework user makes the use of android 2.2 or latest version device to capture the image, video or any audio clip and forward it the third party intelligence bureau server via C2DM service with base64 encoding. Third party server takes the decisions accordingly and sends the notifications to the registered recruiters. This framework can be easily extended to other applications like predicting natural calamities and disasters and alerting accordingly etc.
REFERENCES [1] T. Maksim and K. M. Carley, “Structural knowledge and success of
anti-terrorist activity: The downside of structural equivalence,” Institute for Software Research, vol. 43, 2005.
[2] J. Yin, Q. Yang, and J. J. Pan, “Sensor-based abnormal human-activity detection,” IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp. 1082-1090, Aug. 2008.
[3] S. Singh, J. Allanach, T. Haiying, K. Pattipati, and P. Willett, “Stochastic modeling of a terrorist event via the ASAM system,” in Proc. 2004 IEEE International Conference on Systems, Man and Cybernetic, vol. 6, pp. 5673-5678, Oct. 2004.
[4] A. C. Davies, Y. J. Hong, and S. A. Velastin, “Crowd monitoring using image processing,” Electronics & Communication Engineering Journal, vol. 7, no. 1, pp. 37-47, Feb. 1995.
[5] Z. Hai, Q. Li, and H. Qiu, “Research and implementation of cloud pushing based on Android C2DM service,” Computer Technology and Development, vol.7, 2012.
[6] P. Bahl, R. Y. Han, L. E. Li, and M. Satyanarayanan, “Advancing the state of mobile cloud computing,” in Proc. the Third ACM Workshop on Mobile Cloud Computing and Services (MCS '12), ACM, pp. 21-28, New York, USA, 2012.
[7] M. Ongtang, K. Butler, and P. McDaniel, “Porscha: Policy oriented secure content handling in Android,” in Proc. the 26th Annual Computer Security Applications Conference (ACSAC '10), ACM, pp. 221-230, New York, USA, 2010.
[8] M. L. Wein and M. Baveja, “Using fingerprint image quality to improve the identification performance of the US visitor and immigrant status indicator technology program,” in Proc. the National Academy of Sciences of the United States of America, pp. 7772-7775, vol. 102.21, 2005.
[9] B. Patrick, “Anatomy & physiology of an android,” presented at Google I/O Developer Conference, 2008.
[10] Developers. (October 2014). [Online]. Available: https://developers.google.com/android/c2dm
Rajesh Doriya received his BE in information technology in 2006 from Madhav Institute of Technology and Science, Gwalior, India and his MTech in information technology (with specialization in robotics) in 2009 from Indian Institute of Information Technology, Allahabad, India. Presently, he is pursuing his PhD in the area of cloud enabled robots from IIIT Allahabad. His research interests include distributed and
cloud computing, AI & robotics, machine learning, data mining, and soft computing techniques. He has got teaching experience of around 4 years and presently he is working as an assistant professor in the Department of Information Technology, National Institute of Technology, Raipur, India. He is the member of IEEE and ACM. He has also done some research at DRDO-India and BARC-India.
K. Suraj is pursuing his B. Tech. degree in information technology from National Institute of Technology, Raipur, India. He secured 1st prize in National Science Exhibition at Aavartan-Annual Tech Fest of National Institute of Technology, Raipur, India. His research interests include computer networks, machine learning, soft computing algorithms and AI. He is the member of IEEE and IEEE student branch of the institute. He is
also one part of problem setter team for CodeAthon: a weekly coding contest.
Pavan Chakraborty obtained his MSc degree from Indian Institute of Technology, Kanpur, India in the year 1993 and PhD degree from Institute of Astrophysics (IIA), Banglore India in the year 2001. Currently, he is serving as an associate professor in the Department of Information Technology, at Indian Institute of Information Technology, Allahabad, India. His research interests include artificial intelligence,
robotics and instrumentation.
Lecture Notes on Software Engineering, Vol. 3, No. 4, November 2015
329
Recommended