Skip to main content


Prevention Techniques for Unauthorized Access in Cellular Device

Issue Abstract

Abstract
Now-a-days cellular device is a part of our daily life activities. In general, cellular device is basically used for communication purpose. We do have a additional features in cellular device to store important data like contacts, images, videos, login id’s and passwords, money related transactions. Sometimes, we use to lose our important data by providing access to the unauthorized user. In this fast growing technology Prevention and avoidance of unauthorized access is being a biggest task. In recent days, hackers are using different platforms like smart phones, computers, or any other electronic device to spread their wings in the real world. Most of the attackers are targeting the mobile devices is the one best platform for gathering the important details. After getting the authentication from the targeted user, remotely they will get the complete access on the targeted device. They will do different malfunctions by using our data. In this paper, we will explore more details on unauthorized access of attackers in targeted mobile using some of the major way i.e., voice assistant. We will enhance the authentication and security to the mobile device by using the prevention techniques which where useful for all smart phone users.
Keywords: Cellular Device, Unauthorized user, Authentication.


Author Information
Mohana Lakshmi
Issue No
5
Volume No
2
Issue Publish Date
05 May 2020
Issue Pages
1-11

Issue References

References 
[1] Mathew A. Timmis, Herre Bijl, (2017). “The impact of mobile phone use on where we look and how we walk when negotiating floor based obstacles”. PLoS ONE.
[2] Subramani Parasuraman, Aaseer Thamby Sam, Lee Yu Ren, (2017). “Smartphone usage and increased risk of mobile phone addiction: A concurrent study”. International Journal of Pharmaceutical Investigation
[3] Matthew N.O.Sadiku, Sarhan M. Musa, (2018). “Tablet Computers”. International Journal of Trend in Scientific Research and Development, Vol. 2, ISSN No. 2456-6470.

[4] Raghav Arora, Rana Rahul Sathyaprakash, Shrey Jakhetia, (2014). “Mobile Operating system”. International Journal of Computer science and Information Technology Research, Vol. 2, PP. 483-489.
[5] V.V.Subramanyam, Kailasam Swathi, (2011). “A study on Mobile Operating Systems and their Recent Advances”. National Conference on Networking & Data management Technologies.
[6] Zwass, Vladimir, Z, (2016). "Speech recognition technology". Encyclopedia Britannica Online. Britannica.com.
[7] "What is Google Assistant, how does it work, and which devices offer it" . Pocket-lint. Retrieved 2017.
[8] Hoy, Matthew B, (2018). "Alexa, Siri, Cortana, and More: An Introduction to Voice Assistants". Medical Reference Services Quarterly, Vol. 37, No. 1, pp. 81–88.
[9] Kluwer, Tina, (2011). “Conversational agents and natural language interaction: Techniques and Effective Practices”. IGI Global, Vol. 26, No.6, pp. 1-22.
[10] Dr. Liu and Dr. Yan “Surfing Attack Interaction hidden Attack on Voice Assistants using Ultrasonic Guided Waves”, Network and Distributed Systems Security, 26 February 2020, San Diego, CA, USA, ISBN 1-891562-67-4.
[11] NANDAKUMAR, R., TAKAKUWA, A., KOHNO, T., GOLLAKOTA, S. Covertband, (2017). “Activity information leakage using music”. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies.
[12] Takeshi Sugawara, Benjamin Cyr, (2019). “Light Commands: Laser- Based Audio Injection Attacks on voice Controlled Systems”. Light commands.
[13] "Alexa and Siri Can Hear This Hidden Command. You Can't". The New York Times. 2018. ISSN 0362-4331.
[14] R. Mayakkannan (2019) A Study on Green Marketing Practices in India; Emperor International Journal of Finance and Management Research; ISSN:2395-5929, Volume-05 Issue-04 April-2019; DOI - http://dx.doi.org/10.35337/EIJFMR.2019.5401
[15] R.Mayakkannan (2018) Impact of Buying Behavior of Consumers towards Instant Food Products in Chennai District; International Journal of Pure and Applied Mathematics Volume 119 No. 12 2018, 16279-16286; ISSN: 1314-3395 (on-line version)url:http://www.ijpam.eu Special Issue (PDF) Impact of Buying Behavior of Consumers towards Instant Food Products in Chennai District. Available from:
[16] https://www.researchgate.net/publication/340633912_Impact_of_Buying_Behaviour_of_Consumers_towards_Instant_Food_Products_in_Chennai_District [accessed May 02 2020].
[17] R.Mayakkannan (2020) Impact On Emerging Challenges Of Micro Finance In India; Mukt Shabd; ISSN 2347-3150 Vol-06-Issue-04 April-2020 Impact On Emerging Challenges of Micro Finance In India. Available from: https://www.researchgate.net/publication/340738784_Impact_On_Emerging_Challenges_Of_Micro_Finance_In_India [accessed May 02 2020].
[18] R. Mayakkannan (2018) Investment Pattern of Investors in Chennai- An Empirical study, Emperor International Journal of Finance and Management Research; ISSN:2395-5929; Vol 4, Issue 2, Feb 2018, Pp 1-10

19] R. Mayakkannan(2018) Customer satisfaction towards life insurance corporation with special reference to Chennai City; International Journal of Development and Sustainability; ISSN; 2186-8662; Vol 7, Issue 4, Pp 1264-1272
[20] Aravindha Kugan .M .S (2020) The Burden of Diabetes and its Impact on India’s Economic Growth Major Problems of Agricultural Laborers in India; Emperor Journal of Applied Scientific Research; Volume - II Issue - 4 March – 2020 Pp 21-27
[21] Dr. S. Praveen Kumar, Gowtham Chakravarthy .C (2019) Impact on Consumer Behaviour Towards Selected Fast Moving Consumer Goods in Thiruvallur District; Emperor Journal of Applied Scientific Research; Volume - I Issue - 9 September – 2019 pp 1-8
[22] I. Anju (2019) A Study on the Awareness of Health Tourism in Digital ERA; Emperor Journal of Economics and Social Science Research [EJESSR] - ISSN No. 2581-8643; Volume - I Issue - 8 2019 pp 1-8