Académique Documents
Professionnel Documents
Culture Documents
on
SYSTEM SECURITY USING MOBILE PHONE
Submitted for Partial Fulfillment of award of
Bachelor of Technology
in
Computer Science and Engineering
by
Aarambh Lawania(1206410001)
Akshay Bhardwaj(1206410009)
Harendra Singh(1206410034)
Alok Kumar Dubey(1206410301)
Aarambh Lawania(1206410001)
Akshay Bhardwaj(1206410009)
Harendra Singh(1206410034)
Alok Kumar Dubey(1206410301)
May, 2016
HCST, Farah, Mathura
ii
CERTIFICATE
Certified that the work contained in the dissertation entitled SYSTEM SECU-
RITY USING MOBILE PHONE , by
Aarambh Lawania(1206410001)
Akshay Bhardwaj(1206410009)
Harendra Singh(1206410034)
Alok Kumar Dubey(1206410301)
for the award of Bachelor of Technology from APJ ABDUL KALAM TECHNI-
CAL UNIVERSITY,LUCKNOW INDIA has been carried out under my supervi-
sion and this work has not been submitted elsewhere for a degree.
iii
Acknowledgements
Finally, We would like to express my sincere and deep gratitude to Mr. Mu-
nish Khanna (HOD) and Dr. Hitendra Garg (Project Coordinator) for their sup-
port and guidance.
Aarambh Lawania
Akshay Bhardwaj
Harendra Singh
Alok Kumar Dubey
Date:
iv
A BSTRACT
Desktop security is primary issue among users when crime is increasing espe-
cially when the administrator is far away from the system. As we all are familiar
to both mobile phones and computers like home PC, laptops etc and also all are
have mobile phones available at high and low budget. We know that a computer
can be controlled by a user by using a client server basis. But in this project
the idea is to control the PC with our own mobile phones. The project involves
interfacing the computer hardware and software and mobile phone so that the
computer could be switched on and off using mobile phone and also to restrict
the guest user to access to particular files into the system .
In this project we are providing the security to our computer system by
controlling system startup ,managing and securing files and folder of the sys-
tem.This window application is provided for the purpose user authentication
,mananing files, making selected folders inaccessible,creating log of the changes
made in all drives of the system etc.,in a very user friendly way. The proposed
work is organized as:
v
In Chapter 3, In this chapter we analysed the technologies that we are
going to use to develop the desired functionalities of the project. The
technologies that are described are GSM architecture, SIM,AT commands
and serial communication.
In Chapter 7, This chapter contains the content which explains the work-
ing procedure of the project.
In Chapter 8,This chapter is dedicated to the software testing and the types
of software testing.
vi
C ONTENTS
Acknowledgements iv
Abstract v
1 Introduction 1
1.1 History of System Security . . . . . . . . . . . . . . . . . . . . 1
1.2 System Security . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3 Objective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.4 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2 Literature Analysis 5
2.1 Analysis of Literature . . . . . . . . . . . . . . . . . . . . . . . 5
2.2 Requirement Analysis . . . . . . . . . . . . . . . . . . . . . . 6
2.2.1 Hardware Interfaces . . . . . . . . . . . . . . . . . . . 6
2.2.2 Software Interfaces . . . . . . . . . . . . . . . . . . . . 7
3 System Description 8
3.1 GSM Modem . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.2 Subscriber Identity Module (SIM) . . . . . . . . . . . . . . . . 9
3.3 AT Commands . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.3.1 AT Commands and there Discription . . . . . . . . . . . 11
3.3.1.1 Basic Commands . . . . . . . . . . 11
3.3.1.2 Extended Commands . . . . . . . . 11
3.4 Serial Communication . . . . . . . . . . . . . . . . . . . . . . 11
3.4.1 Baud rate . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.4.2 Parity . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.4.3 Stop Bit . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.4.4 Data Bits . . . . . . . . . . . . . . . . . . . . . . . . . 12
vii
3.4.5 Port Name . . . . . . . . . . . . . . . . . . . . . . . . 12
5 Documentation Standards 19
5.1 Software Requirment Specification . . . . . . . . . . . . . . . . 19
5.1.1 Features of SRS . . . . . . . . . . . . . . . . . . . . . 19
5.1.2 Inroduction . . . . . . . . . . . . . . . . . . . . . . . . 20
5.1.3 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . 20
5.1.4 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
5.2 The overall Description . . . . . . . . . . . . . . . . . . . . . . 20
5.3 Identification Of Need . . . . . . . . . . . . . . . . . . . . . . 21
5.4 Risk Assessment . . . . . . . . . . . . . . . . . . . . . . . . . 21
5.4.1 Technical Issues Encountered . . . . . . . . . . . . . . 22
5.5 Software Development Practices Adopted . . . . . . . . . . . . 22
5.6 Feasibilty Study . . . . . . . . . . . . . . . . . . . . . . . . . . 23
5.6.1 Technical Feasibility . . . . . . . . . . . . . . . . . . . 23
5.6.2 Economic Feasibility . . . . . . . . . . . . . . . . . . 24
5.6.3 Operational Feasibility . . . . . . . . . . . . . . . . . . 24
5.6.4 Benefits . . . . . . . . . . . . . . . . . . . . . . . . . 24
6 System Modeling 25
6.1 Software Development Life Cycle . . . . . . . . . . . . . . . . 25
6.1.1 Requirment Specification and Analysis Phase . . . . . . 26
6.1.2 Design Phase . . . . . . . . . . . . . . . . . . . . . . . 26
6.1.3 Implemention Phase . . . . . . . . . . . . . . . . . . . 27
6.1.4 Testing Phase . . . . . . . . . . . . . . . . . . . . . . . 27
viii
6.1.5 Delivery and Maintenance Phase . . . . . . . . . . . . . 27
6.2 Advantages of Waterfall Model . . . . . . . . . . . . . . . . . . 28
6.3 Data Flow Diagram . . . . . . . . . . . . . . . . . . . . . . . . 28
6.4 Advantages of Data Flow Diagrams . . . . . . . . . . . . . . . 30
6.5 level 0-DFD . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
6.6 level 1-DFD . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
6.7 Unified Modelling Language (UML) . . . . . . . . . . . . . . . 32
6.7.1 ACTOR . . . . . . . . . . . . . . . . . . . . . . . . . 33
6.7.2 Association . . . . . . . . . . . . . . . . . . . . . . . . 33
6.7.3 Use Case . . . . . . . . . . . . . . . . . . . . . . . . . 34
6.7.4 Generalization . . . . . . . . . . . . . . . . . . . . . . 34
6.7.5 Note . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
6.7.6 System . . . . . . . . . . . . . . . . . . . . . . . . . . 34
6.8 Use Case Of The Project . . . . . . . . . . . . . . . . . . . . . 34
6.9 Flow Chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
6.9.1 Flowline . . . . . . . . . . . . . . . . . . . . . . . . . 36
6.9.2 Terminal . . . . . . . . . . . . . . . . . . . . . . . . . 36
6.9.3 Process . . . . . . . . . . . . . . . . . . . . . . . . . . 37
6.9.4 Decision . . . . . . . . . . . . . . . . . . . . . . . . . 37
6.9.5 Input/Output . . . . . . . . . . . . . . . . . . . . . . . 37
6.9.6 Flowchart of the project . . . . . . . . . . . . . . . . . 37
6.9.6.1 Admin flowchart . . . . . . . . . . 37
6.9.6.2 Guest flowchart . . . . . . . . . . . 37
7 Working Procedure 39
7.1 Module-1(A): Administrator Login . . . . . . . . . . . . . . . 41
7.2 Module-1(B): Guest Login . . . . . . . . . . . . . . . . . . . . 42
7.3 Module-2: Bluetooth Connection . . . . . . . . . . . . . . . . 43
7.4 Module-3: Folder Creation . . . . . . . . . . . . . . . . . . . . 44
7.5 Module-4(A): Folder And File Restriction . . . . . . . . . . . . 44
7.6 Module-4(B): Restriction Removal . . . . . . . . . . . . . . . . 46
8 Software Testing 47
8.1 What is Testing ? . . . . . . . . . . . . . . . . . . . . . . . . . 47
8.2 Types of software Testing . . . . . . . . . . . . . . . . . . . . . 48
8.2.1 Unit Testing: . . . . . . . . . . . . . . . . . . . . . . . 48
8.2.2 Integration Testing . . . . . . . . . . . . . . . . . . . . 49
ix
8.2.3 System testing: . . . . . . . . . . . . . . . . . . . . . . 49
8.2.4 Acceptance Testing: . . . . . . . . . . . . . . . . . . . 49
8.3 Test Cases And Result . . . . . . . . . . . . . . . . . . . . . . 50
References 54
x
L IST OF F IGURES
xi
L IST OF TABLES
xii
C HAPTER 1
I NTRODUCTION
Computer security is a term which also be known with the name cyber security
or information technology security. It is defined as the protection of informa-
tion systems from damage to the hardware or, software, theft, software, and to
information on them, as well as from disruption or misdirection of the services
they provide.[5]
It includes protecting against harm that may come via network access ,as
well as, controlling physical access to the hardware,data and code injection, and
due to malpractice by operators, whether intentional, accidental, or due to them
being tricked into deviating from secure procedures.[7]
System Security Using Mobile Phones is the window application managing and
controlling the file and folders and window authentication.
It include all directories of the operating system. When a user is login on to
the windows, the startup program is play. In all Dos based versions of windows,
except ME, it is also possible to load windows by booting to a Dos , Prompt and
Typing "Win". There are some command line switch is that can be used with
the "Win command": with the /d switch ,window boot to safe mode.
Computer security has existed since the end of the 1960s . Since computers
were small and not broadly used by the public, protection of data was easier.
Today, however, most households in developed nations have at least one com-
puter. File sharing and stealing are much more common. Computers are also
interconnected. As a result, information is more easily accessed by predators.
Landwehr (2001) notes that for many years security systems contained the
following functions:
1
Confidentiality: The ethical duty of confidentiality is defined by the
British Medical Association as the principle of keeping secure and secret
from others, information given by or about an individual in the course of
a professional relationships.
Late 1980s : In 1989, Robert Morris created what is now widely acknowl-
edged as the first computer worm. This self-propagating virus spread so
aggressively and rapidly that it succeeded in closing down much of the
internet.
1990 :From here on viruses went, well, viral and dominated the headlines.
The Melissa and ILOVEYOU viruses infected tens of millions of PCs,
causing email systems around the globe to fail, all with little strategic
objective or clear financial motivation.
2
we cant prevent every incident, we can control how we manage the after-
math so that we are prepared and practiced in the process of response.
System Security is a major issue as if someone tries to access the system in our
absence so everybody wants to take proper measures to prevent the unauthorized
access to the system as well as to files and folders. This project-Secure Desktop
Management Using Mobile Phone represents a model that will provide security
to their desktop via SMS using Mobile Phone and GSM technology.
Basic idea of the project is to prevent unauthorized user access to the system
even if the owner is away from the system and also to restrict the user from cut,
copy and open the files for which they are not authorized. The USB devices will
be deactivated as they are injected into the system. And in case if the owner
forgot to shutdown the system before leaving, the system will be automatically
shutdown as the mobile phone of the owner goes out of the Bluetooth range of
the system.
This system consist of a GSM modem for sending and receiving the SMS as
if any user other then owner tries to log in to the system, he will required to enter
his username and phone number, an SMS will be send to the Mobile Phone of
the owner and if he want he can shutdown the system remotely restricting user
to log in to the system. And to make sure that the user enter his own mobile
number to login an OTP will be send to the user and only after entering that
OTP, the user can log in to the system.
In this system, the owner will have the entire control and he will decide
which people will he be allowed to login the system, type of restrictions to make
on folders and files of the system. The aim of this project is to provide security
3
to the desktop even if the owner is anywhere in the world. For this purpose user
can use any type of Mobile.
1.3 Objective
To Deny any USB device to copy restricted files and folders from the
system.
1.4 Scope
4
C HAPTER 2
L ITERATURE A NALYSIS
Why would any organization need to care about the security of their
desktops? Desktop is the primary access to the organizations re-
sources and business applications. It is the gateway to the organiza-
tions highly valuable and confidential information assets.
To improve the access control and for better security, each of the
5
application accessible from the desktop must be protected by an ef-
fective password system. This include access to the organizations
network, email application, ERP system, office administration sys-
tem, etc. The purpose is to ensure that access to each application is
granted to the authorized users only.
6
2.2.2 Software Interfaces
7
C HAPTER 3
S YSTEM D ESCRIPTION
8
Figure 3.1: GSM- ARCHITECTURE
9
cards are always used on Global System mobile computing
phones; for CDMA phones, they are only needed for newer
LTE-capable handsets. Subscriber Identity Module cards
can also be used in satellite phones.
3.3 AT Commands
10
3.3.1 AT Commands and there Discription
ATD: Dial
ATA: Answer
ATH: Hook Control
ATO: Return to Online Data State
11
which whole information is transferred in the communi-
cation channel. In context to the serial port, "9600 baud"
means that the serial port is capable of transferring a maxi-
mum of maximum baud rate of 9600 bits per second.
3.4.2 Parity
12
C HAPTER 4
4.1 .Net
13
Figure 4.1: Net Framework
4.2.1 Interoperability
14
Figure 4.2: Common Language Runtime Engine
15
4.2.5 Simplified deployment
4.2.6 Security
4.2.7 Portability
16
other Office applications, Access is supported by Visual Ba-
sic for Applications. Visual objects used in forms and re-
ports expose their methods and properties in the VBA pro-
gramming environment, and VBA code modules may de-
clare and call Windows operating-system functions.
17
Figure 4.3: MS Access Table
18
C HAPTER 5
D OCUMENTATION S TANDARDS
19
sets basis for project plans like scheduling and estimation.
5.1.2 Inroduction
5.1.3 Purpose
5.1.4 Scope
20
and growth potential.
21
complex, So be went back to the users requirement for clar-
ification and we were able to get a more idealized descrip-
tion of the function. After studding the IDE we wanted to
use, the coding became less complex and we were able to
figure out How to go about it.
22
system which the sent to other group member. We also
made sure that we coded according to coding standards, the
development codes were consistent and had the same style
throughout.
23
of the proposed system. It is an evaluation of the hardware
and software and how it meets the need of the proposed
system[9].
This project will use the basic hardware configuration as
that used for any windows OS.
5.6.4 Benefits
Security.
Reliability.
Scheduled.
Document.
Document
24
C HAPTER 6
S YSTEM M ODELING
25
Figure 6.1: Software Development Life Cycle
26
the answer to the question " HOW" , Which was created af-
ter the answer to the question "WHAT" from the previous
phase.
After all the modules of the s/w has been developed and
unit tested, system integration phase starts. Once the entire
system has been integrated, system testing is carried out this
test helps in identifying the problem created after the entire
system has been integrated. It is not un common to see
that the a particular module has created a problem for other
module or modules. It is here that the verification is carried
out to know if the system works as per the specification
provided by the stakeholders user. Once the test result are
positive, the process moves to the next phase.
27
Figure 6.2: Waterfall model
28
flowchart, which shows the flow of control through an algo-
rithm, allowing a reader to determine what operations will
be performed, in what order, and under what circumstances,
but not what kind of data will be input to and output from
the system, nor where the data will come from and go to,
nowhere the data will be stored (all of which are shown on
a DFD). When it comes to conveying how information data
flows through systems (and how that data is transformed in
the process), data flow diagrams (DFDs) are the method of
choice over technical descriptions for three principal rea-
sons.
(1) DFDs are easier to understand by technical and non-
technical audiences.
(2) DFDs can provide a high level system overview, com-
plete with boundaries and connections to other systems.
(3) DFDs can provide a detailed representation of system
components.
29
DATA FLOW : A data flow connects the output of an ob-
ject or process to the input of another object or process.
Data Flow is drawn as an arrow.
ACTOR : An actor is an active object that drives the data
flow graph by producing values. Actor attached to the input
and output of data flow graph. Actor is drawn as a rectangle.
DATA STORES : A data store is a passive object within
a data flow diagram that store data for later access. A data
store does not generate any operations on its own but merely
responds to requests to store an access data. Data store
drawn as to parallel line containing the name of the store.
30
Figure 6.3: level 0 DFD
31
6.7 Unified Modelling Language (UML)
32
word, or they have had a sliver of exposure to UML. This
lack of understanding inspired me to write this quick in-
troduction to UML, focused on the basic diagrams used in
visual modeling. When you are finished reading you will
not have enough knowledge to put UML on your resume,
but you will have a starting point for digging more deeply
into the language.
6.7.1 ACTOR
6.7.2 Association
33
6.7.3 Use Case
6.7.4 Generalization
6.7.5 Note
6.7.6 System
34
Figure 6.5: Use Case
35
out. Flowcharts are often used in complex situations such
as the steps in programming code or troubleshooting a com-
puter. A flowchart is a type of diagram that represents an
algorithm, workflow or process, showing the steps as boxes
of various kinds, and their order by connecting them with
arrows. This diagrammatic representation illustrates a so-
lution model to a given problem. Flowcharts are used in
designing and documenting simple processes or programs.
Like other types of diagrams, they help visualize what is go-
ing on and thereby help understand a process, and perhaps
also find flaws, bottlenecks, and other less-obvious features
within it. There are many different types of flowcharts,
and each type has its own repertoire of boxes and nota-
tional conventions. The two most common types of boxes
in a flowchart are: " a processing step, usually called ac-
tivity, and denoted as a rectangular box " a decision, usu-
ally denoted as a diamond. A flowchart is described as
"cross-functional" when the page is divided into different
swimlanes describing the control of different organizational
units. A symbol appearing in a particular "lane" is within
the control of that organizational unit. This technique al-
lows the author to locate the responsibility for performing
an action or making a decision correctly, showing the re-
sponsibility of each organizational unit for different parts
of a single process.
6.9.1 Flowline
6.9.2 Terminal
36
another phrase signaling the start or end of a process, such
as "submit inquiry" or "receive product".
6.9.3 Process
6.9.4 Decision
6.9.5 Input/Output
37
Figure 6.6: Admin Flowchart
38
C HAPTER 7
W ORKING P ROCEDURE
39
so everybody wants to take proper measures to prevent the
unauthorized access to the system as well as to files and
folders. This project-Secure Desktop Management Using
Mobile Phone represents a model that will provide security
to their desktop via SMS using Mobile Phone and GSM
technology. Keeping in view the rapid growth of wireless
communication inspired to work on this project. There are
many real life situations that require control of different de-
vices remotely and to provide security. There will be in-
stances where a wired connection between a remote appli-
ance/device and the control unit might not be feasible due
to structural problems. In such cases a wireless connection
is a better option.
In this system, the owner will have the entire control and
he will decide which people will he be allowed to login the
system, type of restrictions to make on folders and files of
40
Figure 7.1: Admin login
41
Figure 7.2: Guest login interface
The next part of the first module is the guest login mod-
ule i.e., a user which is not the authorized user (administra-
tor). In this module the guest user firstly has to enter his/her
name and his/her phone number as depicted. On the very
same phone number entered by the guest an OTP (one time
password) of four digits will be generated which should be
entered on the login page in order to enter into the system
simultaneously another message will be generated contain-
ing the details of the guest user i.e. his/her name and a
phone number delivered to the administrator who can be at
a very far away remote place for the guest users authenti-
cation as an authorized guest user. If the administrator does
not want the guest user to access his/her system, for that
purpose we have provided a facility for the administrator
to remotely send a "shutdown" message which will be re-
ceived by the system and will act as a command for system
to automatically shutdown the system. This facility pro-
vided in the project is also very helpful in case of theft of
your whole system because when the user will try to access
42
the system then its details will be delivered to the admin-
istrator and the system can then easily be tracked down as
shown in Figure-7.2. For sending and receiving messages
to and from the system we have used AT (ATtention) com-
mands using a GSM module or a dongle and also a SIM
card (subscriber identity module).
7.3 Module-2: Bluetooth Connection
43
Figure 7.3: folder creation interface
44
Figure 7.4: restriction interface
45
7.6 Module-4(B): Restriction Removal
46
C HAPTER 8
S OFTWARE T ESTING
47
Figure 8.1: Testing Strategy
48
Figure 8.2: Types of software Testing
performs as designed.
49
the systems compliance with the business requirement and
assesses whether it is acceptable for delivery.
Test Result : Hence after going through all the test cases in
table8.1 we conclude that our application passed all the test
cases .
50
Table 8.1: Test Case Evaluation
Expected Actual Re-
No. Test Cases Module Test Result
Result sult
After entering
On startup we have to enter the
3 invalid
valid login character if not doing In this con-
Window character the
1 so "invalid user" will be shown dition system Pass
startup system should
and system gets automatically shut- gets shutdown
automatically
down.
gets shutdown
User id
After the registration the user id is should be
Window User id is gen-
2. automatically entered by using the generated Pass
startup erating
first name of the person. Using the first
name.
In file watcher module on clicking
Log should
start button log of the changes made
be created if Log is creat-
3. in any of the folder of any of drive File Watcher Pass
any changes ing
is created whether it is creation, re-
is made.
naming or deletion.
Secured
By the help of folder security mod- folder
Secured
ule,the folder secured is saved in Folder Secu- shouldnt be
4. folder cant Pass
database and that folder cant be ac- rity cut or copied
be accessed
cessed,cut or copied. or cant be
accessed.
The text files
In the compress file module the text should be
files can be compressed up to 1/3rd File Compres- compressed Text files are
5. Pass
of its original size and can be en- sion up to 1/3rd compressed
crypted also. of its original
size
Only files of
Folder allows
The folder created for a particular the particular
Single Exten- only the given
6. type of files will only Stores the type can be Pass
sion Folder type of files to
files of that type only. saved in the
save.
created folder.
If any re-
movable disk
is found in
Data is not
On clicking on USB locker module ready Sate
showing until
if any removable disk is found in then all the
7. USB Locker the right Pass
ready state then only after providing data of the
password is
the right password one can access disk is super
Provided
hidden only
after giving
the right
51
C HAPTER 9
ITATIONS
9.2 Conclusion
52
very user friendly and efficient way. As we all know in
todays era of information technology maximum work is
done with the help of computer systems only. So it was
very important and necessary to provide maximum security
to our system, so that anyone who is not authorized to ac-
cess our data using our system will not be able to access our
system without our permission even if we are present at a
very far away remote place. So in this way we can see that
how much useful and important this software is going to be
proved in todays "fast moving computer world".
9.3 Limitations
53
R EFERENCES
54