Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

Technical Seminar Report

On

SNIFFER FOR DETECTING LOST MOBILES


Submitted to
Jawaharlal Nehru Technological University, Hyderabad
In Partial Fulfillment of the requirements for the Award of Degree of

BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING

Submitted
By

Rudra Haritha
(198R1A05M3)

Under the Esteemed guidance of


Mr D.NAGESH
Assistant Professor, Department of CSE

Department of Computer Science & Engineering

CMR ENGINEERING COLLEGE


(Approved by AICTE, NEW DELHI, Affiliated to JNTU, Hyderabad)
Kandlakoya, Medchal Road, R.R. Dist. Hyderabad-501 401

2022-2023
CMR ENGINEERING COLLEGE
(Accredited by NBA, Approved by AICTE NEW DELHI, Affiliated to JNTU, Hyderabad)

Kandlakoya, Medchal Road, Hyderabad-501 401

Department of Computer Science & Engineering

CERTIFICATE

This is to certify that the seminar entitled “SNIFFER FOR DETECTING


LOST MOBILES” is a bonafide work carried out by

Rudra Haritha 198R1A05M3


In partial fulfillment of the requirement for the award of the degree of BACHELOR OF
TECHNOLOGY in COMPUTER SCIENCE AND ENGINEERING from CMR Engineering
College, affiliated to JNTU, Hyderabad, under our guidance and supervision. The results presented in this
seminar have been verified and are found to be satisfactory. The results embodied in this seminar have
not been submitted to any other university for the award of any other degree or diploma.

Internal Guide Seminar Coordinator Head of the Department


Mr D.NAGESH Mr Mrutyunjaya Yalawar Dr. Sheo Kumar
Assistant Professor Assistant Professor Prof & H.O.D
Department of CSE Department of CSE Department of CSE
CMREC, Hyderabad CMREC, Hyderabad CMREC, Hyderabad.
ACKNOWLEDGMENT

We are extremely grateful to Dr. A. Srinivasula Reddy, Principal and Dr.Sheo Kumar,
HOD,
Department of CSE, CMR Engineering College for their constant support.

I am extremely thankful to Mr D.Nagesh, Assistant Professor, Internal Guide, Department of


CSE, for his constant guidance, encouragement and moral support throughout the project.

I will be failing in duty if I do not acknowledge with grateful thanks to the authors of the
references and other literatures referred in this Project. I express my thanks to all staff
members and friends for all the help and co-ordination extended in bringing out this Project
successfully in time.

Finally, I am very much thankful to my parents who guided me for every step.

Date: Rudra Haritha


Place:Hyderabad (198R1A05M3)
CONTENTS

TOPIC PAGE NO

ABSTRACT i
LIST OF FIGURES ii

1. Introduction
1.1 Introduction 1
1.2 History 1
1.3 Objective 2-6
2. Literature survey 4-5
3. Methodology
3.1 Introduction 6
4. Software Configuration

4.1 designing for the sniffer 7

4.2 sniffer base station 7

4.3 design of unidirectional antenna 8-10

4.4 software for tracking 10-11


5. Implementation 11-15

6. Result, Advantages, Disadvantages and Applications


6.1 Result 16
6.2 Advantages 16
6.3 Applications 17
7. Conclusion
7.1 Conclusion 18

8. References 19
ABSTRACT

Each and every day thousands of mobiles get misplaced or lost, though effective way for the
blocking of the lost mobile to prevent unauthorized person from making and receiving the
calls has been done by the manufacturers of the mobile with the help of International Mobile
Equipment Identifier (IMEI) has been done but however there has been no development or
very little progress for the detection of the misplaced mobile phone. For the detection of lost
mobile SNIFFER plays a vital role. The sniffer device has to be designed precisely and size
should be reduced for easy mobility for the purpose of detection .The device can be called as
a mobile Base station that includes Sniffer Base station, Unidirectional antenna. Tracking
software. The sniffer is a small base station that includes transceiver section. It should operate
at a frequency which is much different from the frequency of the current cell in which the
operation of detection is being carried out. The directional antenna is an important device that
is to be designed and used as it plays a major role.

i
LIST OF FIGURES

S.No DESCRIPTION PAGE NO.

1.3.1 Structure of GSM 3

4.2.1 Sniffer base station 7

4.3.1 Unidirectional 8
Antenna

4.4.1 Tracking software 10

4.4.2 Tracking software 11

5.1 Before frequency 12

5.2 Increased frequency 13

5.3 Framework 14

ii
CHAPTER 1

1. INTRODUCTION

1.1 Introduction

Mobile telephone is considered as better strategy for correspondence framework that is


being utilized by step by step correspondence. One of the intriguing thing about cell phones
is that it is radio which utilizes some band of recurrence, In the mid 70's versatile cell
Correspondence has been valued. In this the VLSI has helped in the structuring less power
and littler size effective handset with the end goal of correspondence. Today, the utilized of
PDAs has expands the issue of getting it lost or lost. Anyway innovation has not yet offered
an explanation to the lost or lost cell phones which is fundamentally expanding .The
misfortunes of cell phones is step by step expanding. In this exploration paper we talking
about the issue and the arrangement should be possible. As an answer sniffer for cell phones
has been made into reality and The IMEI number which is implanted to the cell phones will
hinder the calls and aides in the identification reason.

1.2. Background History

The Sniffer was the first product of Network General Corporation, founded on May 13,
1986 by Harry Saal and Len Shustek to develop and market network protocol analyzers.
The inspiration was an internal test tool that had been developed within Nestar Systems, a
personal computer networking company founded in October 1978 by Saal and Shustek
along with Jim Hinds and Nick Fortis. In 1982 engineers John Rowlands and Chris Reed at
Nestar’s UK subsidiary Zynar Ltd developed an ARCNET promiscuous packet receiver
and analyzer called TART (“Transmit and Receive Totaliser”) for use as an internal
engineering test tool. It used custom hardware, and software for an IBM PC written in a
combination of BASIC and 8086 assembly code. When Nestar was acquired by Digital

1
Switch Corporation (now DSC Communications) of Plano, Texas in 1986,[11] Saal and
Shustek received the rights to TART

1.3 Objectives
My aim is to find the lost mobile using IMEI number of phones.
A Brief Introduction to GSM: Global System for Mobile Communications (GSM) is the
most popular mobile phone system in the world. The Cellular Operators Association of
India (COA) has released its GSM subscriber figures for the month of February 2013. As
per the figures, the total number of GSM subscribers at the end of February 2013 stood at
655.59 million. It notes that the number of subscribers in this segment fell by 1.97 million
in February 2013, thereby registering a drop of 0.30 percent from the previous month. The
name GSM fint comes from a group called Group Special Mobile (GSM), which was
formed in 1982 by the European Conference of Post and Telecommunications
Administrations (CEPT) to develop a pan European cellular system that would replace the
many existing incompatible cellular systems already in place in Europe. But when GSM
service started in 1991, the abbreviation "GSM" was renuned to Global System for Mobile
Communications from Group Special Mobile. The typical architecture of GSM network
was shown in figure:

2
Fig:1.3.1 structure of GSM
The GSM network can be divided into three parts.

1. The Mobile Station carries the subscriber.


2. The Base Station Subsystem controls the radio link with the Mobile Station.
3.The Network Subsystem, the main part of which is the Mobile services Switching Centre,
performs the switching of calls between the mobile and other fixed or mobile network users,
as well as management of mobile services, such as authentication. Not shown is the
Operations and Maintenance centre, which oversees the proper operation and setup of the
network. The Mobile Station and the Base Station Subsystem communicate across the air
interface or radio link. The Base Station Subsystem and the Network Subsystem are also
called the fixed network.

a) Mobile Station:
The mobile station (MS) consists of mobile equipment and a Subscriber Identity Module
(SIM) card. The most common mobile equipment is the mobile phone. By inserting the SIM
card into a cellular phone, the user is able to receive calls at that phone, make calls from
that phone, or receive other subscribed services. The mobile equipment uniquely identifies
the International Mobile Equipment Identity (IMEI).

3
CHAPTER-2
LITERATURE SURVEY

The proper studies on this research paper of "Sniffer For Tracking Lost MobilPhonesin this the
literature revealed the following: Abdelallah and Elhad (2002) in their research paper they
concluded that the sniffer combines searching for machine in promiscuous mode and using the
honey pot to detect the use of sniffer information. Sniffer covers all online detection as well as
after the information replay detection r of the platform. In addition, detection based on MAC
addressing makes it possible to detect any machine of the network which is in promiscuous
mode for the entire Windows platform or on Linux platforms.
Remo and Ogun in this research paper concluded that there are many available tools which are
used to capture network traffic, but some of the tools contain limitations. Without analysis
some tools only capture network traffic, or some require large memory size for the installation
therefore for analysis researcher has to use other tools to get traffic features as required and
also consider memory size of the system which is in use. This system captures network traffic
and analyzes its and allows to the user to take features what he needs. In this system requires
little memory size for the installation and enables user to store selected features in a file or
document for later use in work. This will reduce the memory which is used to store the data.
Finally, Sniffer contains some Functionality like 3D pie chart statistics and possible malicious
IP address detection. Patil at el. (2014) in their exploration paper inferred that this paper
android application for following the or lost cell phones which is made and introduced in cell
phones framework. This application works with assistance in constructed GPS in the cell
phones. The present longitude and scope data is sent as SMS when the obscure client endeavors
to change SIM card of wireless to the predetermined portable number without the knowing
about client. The precise area can be discovered utilizing Google maps Using the longitude and
scope esteems. Lomet at el. (2001) gave their view that If you are as of now a Sniffer client,
you haven't known about extra security highlights which can be utilized to compliment your
security safeguards. Furthermore, ability of influence existing advances in new ways offers an
amazing keeps an eye on of improving system security execution without affecting spending
plans. Previously, amid and after an assault Portable and Distributed Network Associates can
offer clients something beyond expanding system execution and up time - they can help secure
your system infrastructure. Sniffer Technologies, we are apply arrange examination aptitude

4
to furnish clients with arrangements of their system the board and security. Arvind and Negi
(2012) have the assistance of Sniffer Program in their examination paper that a software
engineer can tune in to a discussion with a PC. It's the most ideal approach to recognize portable
lost or lost. When all is said in done, 42% of lost cell phones have no information assurance
security.20% of the gadgets lost approached work messages • 20% contained delicate
individual data, for example, national protection numbers, locations and birth dates, 35%
approached long range informal communication accounts by means of applications or web
browsers. Period 2004-2011, concentrating on abnormal state assaults, for instance on
applications for clients. We bunch existing ways to deal with shield cell phones from these
sorts of assaults into various classifications, in view of the standards of recognition,
architecture, Data accumulation and working frameworks, with specific spotlight on models
and instruments dependent on IDS. With this classification we intend to give a simple and
compact perspective on each methodology's fundamental model. Shankar and Mahesh (2013)
deduce in their exploration paper that Distributed registering includes different PCs in the
system that can be cultivated by passing message or remote strategy calls (RPC). Adding new
measurement to appropriated processing is the recently created versatile operator technology.
Experts proposed the utilization of specialists in numerous web applications in the years to
come. Nonetheless, there are as yet numerous specialized obstacles that should be tended to,
with security being the most significant of them. The versatile operator Technology may be
generally acknowledged when security issues are legitimately tended to. Be that as it may, in
the event that the interloper changes our portable specialist stage or versatile operator, at that
point the whole procedure may fail.For the ensured security, along these lines, a couple of
greater safety efforts ought to be taken later on. Versatile specialist haphazardly chooses any
hub and researches that hub in the event that the system interface card finds exorbitant
approaching traffic, at that point report back to the system manager. So it is conceivable to
identify the sniffer.
Gupta (2013) inferred that catching or sniffing system traffic is precious to organize heads
investigating system issues, security engineers exploring system security issues, designers
troubleshooting the usage of correspondence conventions, or anybody attempting to figure out
how their systems work. Because aggressors use arrange acknowledgment sniffers and capture
transmitted accreditations and information, finding out about bundle sniffer abilities and
impediments is a significant feature of understanding security dangers.

5
CHAPTER 3
METHODOLOGY

3.1 Introduction
The GSM Module's IMEI (International Mobile Equipment Identity) numbering system is
a 15 digit unique code. It is used to identify the GSM (Global System Mobile) phone. When
your phone is switched on, then this unique IMEI number is transmitted and checked against
a data base of black listed or Grey listed phones in the network's EIR.

3.2 Blacklist of Stolen Devices


In the event that somebody has stolen or lost their portable gear, they can request that their
specialist organization obstruct the telephone from their system, and whenever legally
necessary, the administrator will do as such. On the off chance that an Equipment Identity
Register (EIR) is kept up by the neighborhood administrator, it includes the gadget IMEI.
Optionally, It additionally adds the IMRI to shared registers, for example, the Central
Equipment Identity Register (CEIR), which boycotts the gadget with other CEIR
administrators. This boycott makes the gadget unusable for any administrator utilizing the
CEIR, which makes robbery of cell phones futile, aside from parts.

6
CHAPTER 4
SOFTWARE CONFIGURATION

4.1 DESIGNING FOR THE SNIFFER


As stated this proposal is about the detection of lost mobile phone and for this
purpose we are designing a new device called the Sniffer. The sniffer device has to be
designed precisely and size should be reduced for easy mobility for the purpose of
detection. The device can be called as a mobile base station that includes the following
important components:

1. Sniffer base station


2 .Unidirectional antenna
3 .Tracking software

4.2 SNIFFER BASE STATION:

Fig:4.2.1
The sniffer is a small base station, it includes transceiver section. It should operate at a
frequency that is much different from the frequency of the current cell in which the
operation of detection is being carried out. Some of the main important things are the
frequency that has to be generated by the transceiver section is around 900MHz range
which is a VHF range and it is necessarily to design the oscillator circuit for that
frequency range .Another important is the cooling that has to be provided to the circuit
while designing the circuit that is to be operated at 900MHz range of frequency. Hence

7
proper design of base station is an important thing in the design of the sniffer. Mobile
phones as well as the base station has low power transmitter is also transmitting at low
power. The transmitter of the sniffer has to be a low power transmitter. This helps in
the process of reducing the interference of the device with the devices that are in the
other cells.

4.3 DESIGN OF UNIDIRECTIONAL ANTENNA:


Though the transceiver in a sniffer plays an important role in the detection of the mobile
phone but however it is the directional antenna that has a major role in the design of the
transmitter. The directional antenna acts as the eyes for the sniffer for the purpose of
the detecting the lost mobile phones. Hence the proper design of the directional antenna
is required. Antenna is a device which works at specified frequencies range for
transmitting or receiving the data signal. In general, antennas transmit power depending
on lobe pattern which varies from one antenna to the other. The lobe pattern is a two
dimensional diagrams that is used to show radiation pattern. Radiation pattern of
directional antenna is shown in fig1.

Fig:4.3.1
In addition to this it is necessary that the transmitter should be a low power transmitter.
The Gain and directivity are intimately related in antennas. The directivity of an antenna
is a statement of how the RF energy is focused in one or two directions. Because the
amount of RF energy remains the same, but is distributed over less area, the apparent
signal strength is higher. This apparent increase in signal strength is the antenna gain.
The gain is measured in decibels over either a dipole (dBd) or a theoretical construct
called an Isotropic radiator (dBi).

8
The isotropic radiator is a spherical signal source that radiates equally well in all
directions.One way to view the omni directional pattern is that it is a slice taken
horizontally through the three dimensional sphere. The graphical representation of
Radiation pattern of the unidirectional antenna is shown in figure. The spherical co-
ordination system has three main components for the pattern representation and they
are (R, _ , _ ) .The shape of the radiation system is independent of R, as long R is chosen
to be sufficiently large and much greater than the wavelength as the largest dimension
of the antenna. The magnitude of the field strength in any direction varies inversely with
R. A complete radiation pattern requires the three dimensional representation.

The other factors that are to be taken into account during the development of the antenna
for the sniffer should be the gain and the directivity .As these features have a greater
effect while designing the antenna. The gain of the antenna is defined as the ability of
the antenna to radiate the power in a particular direction. The power radiated per unit
area in sany direction is given by the pointing vector and is equivalent to E2/_2 W/m2

Total of the power that is being radiated by the antenna is given as

W=_d

The average power that gets radiated is given as (avg)=W/4 (watts per steradian) The
Directivity of the antenna is the direction in which there is maximum gain for the
radiation that is being radiated, the gain of the antenna is given as a function of the
angles. The directivity value is constant for a particular direction. In addition to the
directivity and the gain of the antenna the other important thing that has to be taken into
account is the power that is being radiated by the antenna. The total power is given as
W and is the summation of the radiated power and the ohmic loss of the antenna. Here
the Wl represents the ohmic losses of the antenna.

Wt=Wr+Wl
The power gain of the antenna is given as
gp=4__/wt
The ratio of power to the directivity is referred as a measure of efficiency of the antenna

9
gp/gd=Wr/(Wr+Wl)
The power radiated by the antenna should be properly designed as this causes more
penetration of the electromagnetic radiation and thus it might have some effect in the
near by cells. The effective area of the antenna is another important factor that is mainly
required in the receiving antenna and it may be referred as the effective aperture or
capture area and is related to the directive gain of the antenna through the relation
A=gd_2/4
Since the sniffer device that is constructed is a device that has both the transmitting and
the receiving antenna. Effective gain has to be taken into account and this shows the
ability of the antenna to capture the signal that the lost mobileis transmitting.

4.4 SOFTWARE FOR THE TRACKING

Fig:4.4.1
The software part plays a major role in the tracking of the lost mobile phone It is the
base for the antenna to track the lost mobile the main feature of this software is that it
helps in the process of creation of the data base and this is mainly done using a Random
Access Memory. The mobile phone that is lost has certain IMEI number that is
embedded in the chip. This RAM of the sniffer device stores the IMEI number of the
lost mobile phone. Thus this acts as a data base or the directory of the lost mobile phone
number/The software that is to be designed in such a way that the software has the input

10
as the IMEI number of the lost mobile phone from the RAM and this ID done using the
SQL query that fetches the IMEI number.

Fig:4.4.2
After getting the input of the lost mobile phones IMEI number it checks the comport for
getting the information whether it obtains any signaling information from the lost device
that might respond to the signal sent by the sniffer The programming is done with C or
Java. However the C is most preferred as it is easily embedded with the chips. With VB
the front end is designed. The oracle SQL is the back end as it helps in retrieving the
input data from the RAM using the query. But however the sample program that we
have designed does not use the oracle it takes the input directly from the keyboard and
this is an example and a dummy program that has been created that helps in the
understanding of how the device would work.

CHAPTER 5
WORKING OF SNIFFER DEVICE

11
Sniffer is a transceiver which chips away at recurrence which is in unused range and it
is worked by specialist organization.Following graph demonstrates the sniffer working,
the principal chart demonstrates the typical association between the lost or lost cell
phone with cell systems. Firstly the IMEI number of the lost or lost PDA must be
accounted for to specialist organization, this administrations supplier keeps all record
of the lost cell phones in track.
MTSO is utilized to keeps it to track of all phones, that is IMEI numbers and their area
under which cell, and area under which BTS.

Fig:5.1 before frequency


The second fig demonstrates the sniffer which gets in to the work. After data which is
given by MTSO; on the off chance that the versatile or PDA is accessible, at that point
the sniffer situated in the specific cell which gets without hesitation by recognizing. At
the point when association between the sniffer and cell phone is built up then the base
station detaches association with lost or lost cell phone while the sniffer is worked in
the recurrence which is unique in relation to the recurrence and from the recurrence is
embraced by the cell. Directional radio wire is utilized to discover the area of the lost
or cell phone.

12
Fig:5.2 increased frequency
PRELIMINARIES

Open air Localization System:


GPS is a framework which is utilized for finding the situation of specific article. It is
gets satellite sign and furthermore decides the area of cell phones. It is grouped under
two sorts of information transmission.

I. SMS information transmission:


In this client requires to send demand by means of SMS on a gadget where GPS beacon
is introduced. After this, the gadget will send the co-ordinate of its position and
personality of the versatile through SMS. This co-ordinate can spoke to as on a guide
programming utilizing Google Map.

ii. GPRS (General Packet Radio Service) data transmission: It is a GPS following
framework. Each and every moment that sends the situation of the following item from
SIM card of lost or lost portable to the each and every moment versatile phones. Because
this framework contains day in and day out administration, Outdoor restriction
framework utilized GPS; it doesn't perform successfully in that indoor area. This is on
the grounds that it comes up short on the capacity to building divider and requires
custom frameworks for each region in that restriction to be performed.

13
Android is a stage for cell phone which created by Google. It gives wide arrangement
of programming improvement OS, Tools and APIs which important to manufactured
applications. Android is accustomed to creating versatile application. Android
administration was made for recovering the portable data and running the information
checking process from the lost versatile as foundation process, that won't be recognized
by the cheat.

FRAMEWORK ARCHITECTURE:

Fig:5.3 framework

•Misplaced or Lost portable: From companions versatile pones will make clients cell
phones to ring, in the event that telephone is lost or lost inside reachable range.

•GPS: From companions versatile will assist client with receiving his cell phones GPS
area data as a URL on companions portable.

•SIM Change Notification: If SIM can expel on clients portable, It will inform SIM
change action by sending SMS to companions cell phone numbers.

14
•MMS and Pictures: It is upgrades new innovation like MMS where utilizing you can
send video and picture to another PDA. By sending preview and little video it gives data
about the cheat. I is works regardless of whether the GPS don't give the best possible
area connect.

15
CHAPTER 6
RESULTS

Since the advancement of technology the mobile phone is one of the most used
technologies in communication field. Many of mobile phones are lost or misplaced with
some respective reasons, so this given paper is the basic idea for the Sniffer Technology
for Detection of Mobile Phones. For this process we used the three main components
that is earlier described as sniffer base station, unidirectional antenna and the software
for tracking process. The designing of the antenna is most important because the
detection is properly based on the signal strength or directivity, where the signal strength
is maximum the detection is done in similar direction.

However there are certain limitation, in this tracking process that are: the signal strength
is maximum the detection is done in similar direction. However there are certain
limitation in this tracking process that are:
1. The power of the lost device should be good so that it can be easily detectable by
the antenna pattern.
2. There should be no shadow.

ADVANTAGES:

 This method is used for finding the lost mobiles effectively

 Cost effective

 Low power consumption

 Easy to design

16
APPLICATIONS:

 Capture private info like usernames, passwords, credit card numbers, etc.

 Record communications such as emails and

 instant messages

 Commit identity fraud

 Commit financial fraud

 For network troubleshooting

 To detecting malware or hacking activity

17
CHAPTER 7
CONCLUSION

7.1 CONCLUSION
If there should arise an occurrence of the versatile taking the Sniffer innovation is
valuable. This innovation takes a shot at the recurrence which is typically utilized for
military. In the burglary dentifying methods this innovation contains its following
programming projects that make it mainstream. Following advances included this plan:
Sniffer base station structure. Unidirectional reception apparatus plan. Development of
programming following for track a lost or lost cell phone. The possibility of this
improvement "Sniffer for the following lost Mobile telephones" which the lost or lost
cell phones can recouped Let we all expectation for this innovation will be useful for
each individual who are lost or lost mobiles. This Technique seems complex including
plan of the sniffer yet the substantial scale location is viable expense of the structures
and identification scales are down. There are sure limit criteria that need to fit the bill
for the distinguishing proof of lost or lost versatile like intensity of the cell phone ought
to be sufficient. The cell phones ought not be in the shadow area., however utilizing
present day advancements and gadgets this technique can be improved.

18
CHAPTER 8
REFERENCES

[1] Network Sniffers, Alan Joch, 2001 (Intro&Use.doc).


[2] http://www.infoworld.com/articles/tc/xml/01/12/03/01 1203tcpackets.
[3]MandyAndress,2001moreacquaintedwithyournetwork.htm).http://online.securityfocus.
com/infocus/.
[4] Mathiew Tanase, 2002 (Security Focus Home infocus Sniffers what they are and how
to ensure yourself.htm).
[5] http://123seminarsonly.com/Seminar-Reports/043/78605740-Whitepaper.pdf
[6] http://www.itpathshala.com/discussions/showthread.ph p?114-Detection-of-lost-
portableSeminarreportsamppptdownloadfobtechstudents&s=f857b08ed3ab10cbccb934bd
46895500
[7] Schiller, "Portable Communication", Pearson Education 1 Edition, seventh republish -
2003.
[8] S. Satya Sri Ambica, P. Padma Priya, Dr.N.Srinivasu, "Sniffer Technology to Detect
Lost Mobile ", International Journal of Engineering Trends and Technology, volume
4,issue4 April 2013.
[9] "Following a suspect by any cell phone: Tracking SIM and handset". BBC News. 2005-
08-03. Recovered 2010-01- 02.
[10]Shreya K. Patil, Bhawana D Sarode, Prof. P.D.Chowhan "Identification of Lost Mobile
on Android Platform" International Journal of Advanced Research in Computer
Engineering Technology (IJARCET). [11] https://www.wikipedia.org

19

You might also like