Skip to main content
Erschienen in:

05.09.2019

Adaptive Security for Self-Protection of Mobile Computing Devices

verfasst von: Aakash Ahmad, Asad Waqar Malik, Abdulrahman Alreshidi, Wilayat Khan, Maryam Sajjad

Erschienen in: Mobile Networks and Applications | Ausgabe 2/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile computing has emerged as a pervasive technology that empowers its users with portable computation and context-aware communication. Smart systems and infrastructures can exploit portable and context-aware computing technologies to provide any time, any place digitized services on the go. Despite the offered benefits, such as portability, context-sensitivity, and high connectivity, mobile computing also faces some critical challenges. These challenges include resource poverty as well as data security and privacy that need to be addressed to increase the pervasiveness of mobile systems. We propose to provide a self-protection mechanism for mobile devices against the unforeseen security threats that can attack the critical resources of mobile devices. We have unified the concepts of autonomic computing and computer security to develop a framework that enables adaptive security to dynamically configure the security measures of a mobile device. We have developed a framework - an android-based prototype - that supports automation and user decision to protect the critical hardware and software resources of a device. Evaluation results demonstrate (i) framework’s accuracy for runtime detection and minimization of threats, and (ii) framework’s efficiency for device’s resource utilization.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Fußnoten
3
In Fig. 8 we have anonymized the name of the app - used as a case study - that represents a potential security threat to the device resources.
 
Literatur
1.
Zurück zum Zitat Mehmood R, Bhaduri B, Katib I, Chlamtac I (2018) Smart societies, infrastructure, technologies and applications: first international conference, SCITA 2017, Jeddah, Saudi Arabia, November 27–29, 2017, Proceedings, vol 224 Springer Mehmood R, Bhaduri B, Katib I, Chlamtac I (2018) Smart societies, infrastructure, technologies and applications: first international conference, SCITA 2017, Jeddah, Saudi Arabia, November 27–29, 2017, Proceedings, vol 224 Springer
2.
Zurück zum Zitat Sajjad M, Abbasi AA, Malik A, Altamimi AB, Alseadoon IM (2018) Classification and mapping of adaptive security for mobile computing. IEEE Trans Emerg Top Comput 1(1):1–1 Sajjad M, Abbasi AA, Malik A, Altamimi AB, Alseadoon IM (2018) Classification and mapping of adaptive security for mobile computing. IEEE Trans Emerg Top Comput 1(1):1–1
3.
Zurück zum Zitat Protsenko M, Kreuter S, Muller T (2015) Dynamic self-protection and tamperproofing for android apps using native code. In: 2015 10th International conference on availability, reliability and security (ARES), pp 129–138 Protsenko M, Kreuter S, Muller T (2015) Dynamic self-protection and tamperproofing for android apps using native code. In: 2015 10th International conference on availability, reliability and security (ARES), pp 129–138
4.
Zurück zum Zitat Security H (2017) Study on mobile device security, Science and Technology Directorate Security H (2017) Study on mobile device security, Science and Technology Directorate
5.
Zurück zum Zitat Kim KI, Hwang HS, Ko HJ, Lee HK, Kim UM (2006) Multi-policy access control considering privacy in ubiquitous environment. In: 2006 international conference on hybrid information technology, vol 1. IEEE, pp 216–222 Kim KI, Hwang HS, Ko HJ, Lee HK, Kim UM (2006) Multi-policy access control considering privacy in ubiquitous environment. In: 2006 international conference on hybrid information technology, vol 1. IEEE, pp 216–222
6.
Zurück zum Zitat Muhammed T, Mehmood R, Albeshri A, Katib I (2018) Ubehealth: a personalized ubiquitous cloud and edge-enabled networked healthcare system for smart cities. IEEE Access 6:32258–32285CrossRef Muhammed T, Mehmood R, Albeshri A, Katib I (2018) Ubehealth: a personalized ubiquitous cloud and edge-enabled networked healthcare system for smart cities. IEEE Access 6:32258–32285CrossRef
7.
Zurück zum Zitat Penning N, Hoffman M, Nikolai J, Wang Y (2014) Mobile malware security challeges and cloud-based detection. In: 2014 International conference on collaboration technologies and systems (CTS). IEEE, pp 181–188 Penning N, Hoffman M, Nikolai J, Wang Y (2014) Mobile malware security challeges and cloud-based detection. In: 2014 International conference on collaboration technologies and systems (CTS). IEEE, pp 181–188
8.
Zurück zum Zitat Alampalayam SP, Kumar A (2003) An adaptive security model for mobile agents in wireless networks. In: Global telecommunications conference, 2003. GLOBECOM ’03, vol 3. IEEE, pp 1516–1521 Alampalayam SP, Kumar A (2003) An adaptive security model for mobile agents in wireless networks. In: Global telecommunications conference, 2003. GLOBECOM ’03, vol 3. IEEE, pp 1516–1521
9.
Zurück zum Zitat Anwar Z, Khan WA (2015) Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs. Secur Commun Netw 8(16):2813–2825CrossRef Anwar Z, Khan WA (2015) Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs. Secur Commun Netw 8(16):2813–2825CrossRef
10.
Zurück zum Zitat Salehie M, Pasquale L, Omoronyia I, Ali R, Nuseibeh B (2012) Requirements-driven adaptive security: protecting variable assets at runtime. In: 2012 20th IEEE international requirements engineering conference (RE), pp 111–120 Salehie M, Pasquale L, Omoronyia I, Ali R, Nuseibeh B (2012) Requirements-driven adaptive security: protecting variable assets at runtime. In: 2012 20th IEEE international requirements engineering conference (RE), pp 111–120
11.
Zurück zum Zitat Garcia M, Llewellyn-Jones D, Ortin F, Merabti M (2012) Applying dynamic separation of aspects to distributed systems security: a case study. Softw IET 6:231–248CrossRef Garcia M, Llewellyn-Jones D, Ortin F, Merabti M (2012) Applying dynamic separation of aspects to distributed systems security: a case study. Softw IET 6:231–248CrossRef
12.
Zurück zum Zitat An G, Bae G, Kim K, Seo D (2009) Context-aware dynamic security configuration for mobile communication device. In: 2009 3rd International conference on new technologies, mobility and security (NTMS), pp 1–5 An G, Bae G, Kim K, Seo D (2009) Context-aware dynamic security configuration for mobile communication device. In: 2009 3rd International conference on new technologies, mobility and security (NTMS), pp 1–5
13.
Zurück zum Zitat Kephart JO, Chess DM (2003) The vision of autonomic computing. Computer 36:41–50CrossRef Kephart JO, Chess DM (2003) The vision of autonomic computing. Computer 36:41–50CrossRef
14.
Zurück zum Zitat Sajjad M, Abbasi AA, Malik A, Altamimi AB, Alseadoon IM (2018) Classification and mapping of adaptive security for mobile computing. IEEE Trans Emerg Top Comput Sajjad M, Abbasi AA, Malik A, Altamimi AB, Alseadoon IM (2018) Classification and mapping of adaptive security for mobile computing. IEEE Trans Emerg Top Comput
16.
Zurück zum Zitat Robbes R, Lanza M (2008) Spyware. In: ACM/IEEE 30th International conference on software engineering, pp 847–850 Robbes R, Lanza M (2008) Spyware. In: ACM/IEEE 30th International conference on software engineering, pp 847–850
17.
Zurück zum Zitat Satyanarayanan M (2015) A brief history of cloud offload: a personal journey from odyssey through cyber foraging to cloudlets. GetMobile: Mobile Comput Commun 18(4):19–23CrossRef Satyanarayanan M (2015) A brief history of cloud offload: a personal journey from odyssey through cyber foraging to cloudlets. GetMobile: Mobile Comput Commun 18(4):19–23CrossRef
18.
Zurück zum Zitat Lewis GA, Lago P, Procaccianti G (2014) Architecture strategies for cyber-foraging: preliminary results from a systematic literature review. In: European conference on software architecture. Springer, pp 154–169 Lewis GA, Lago P, Procaccianti G (2014) Architecture strategies for cyber-foraging: preliminary results from a systematic literature review. In: European conference on software architecture. Springer, pp 154–169
19.
Zurück zum Zitat Zhang X, Kim G-B, Bae H-Y (2014) An adaptive spatial cloaking method for privacy protection in location-based service. In: 2014 International conference on information and communication technology convergence (ICTC), pp 480–485 Zhang X, Kim G-B, Bae H-Y (2014) An adaptive spatial cloaking method for privacy protection in location-based service. In: 2014 International conference on information and communication technology convergence (ICTC), pp 480–485
20.
Zurück zum Zitat Seigneur TEMM (2013) Security adaptation based on autonomic and trust systems for ubiquitous mobile network and green it. In: UBICOMM 2013 : the seventh international conference on mobile ubiquitous computing, systems, services and technologies, IARIA Seigneur TEMM (2013) Security adaptation based on autonomic and trust systems for ubiquitous mobile network and green it. In: UBICOMM 2013 : the seventh international conference on mobile ubiquitous computing, systems, services and technologies, IARIA
21.
Zurück zum Zitat Martinelli F, Mori P, Quillinan T, Schaefer C (2008) A runtime monitoring environment for mobile java. In: IEEE international conference on software testing verification and validation workshop, 2008. ICSTW ’08, pp 270–278 Martinelli F, Mori P, Quillinan T, Schaefer C (2008) A runtime monitoring environment for mobile java. In: IEEE international conference on software testing verification and validation workshop, 2008. ICSTW ’08, pp 270–278
22.
Zurück zum Zitat Yang Z, Lu S, Yang P (2006) Runtime security verification for itinerary-driven mobile agents. In: 2nd IEEE international symposium on dependable, autonomic and secure computing, pp 177–186 Yang Z, Lu S, Yang P (2006) Runtime security verification for itinerary-driven mobile agents. In: 2nd IEEE international symposium on dependable, autonomic and secure computing, pp 177–186
23.
Zurück zum Zitat Lin H, Yan Z, Fu Y (2019) Adaptive security-related data collection with context awareness. J Netw Comput Appl 126:88–103CrossRef Lin H, Yan Z, Fu Y (2019) Adaptive security-related data collection with context awareness. J Netw Comput Appl 126:88–103CrossRef
24.
Zurück zum Zitat Laborde R, Oglaza A, Wazan AS, Barrère F, Benzekri A (2019) A situation-driven framework for dynamic security management. Ann Telecommun 74(3-4):185–196CrossRef Laborde R, Oglaza A, Wazan AS, Barrère F, Benzekri A (2019) A situation-driven framework for dynamic security management. Ann Telecommun 74(3-4):185–196CrossRef
25.
Zurück zum Zitat An G, Bae G, Kim K, Seo D (2009) Context-aware dynamic security configuration for mobile communication device. In: 2009 3rd International conference on new technologies, mobility and Security (NTMS), pp 1–5 An G, Bae G, Kim K, Seo D (2009) Context-aware dynamic security configuration for mobile communication device. In: 2009 3rd International conference on new technologies, mobility and Security (NTMS), pp 1–5
27.
Zurück zum Zitat Rocha BPS, Costa DNO, Moreira RA, Rezende CG, Loureiro AAF, Boukerche A (2010) Adaptive security protocol selection for mobile computing. J Netw Comput Appl 33:569–587CrossRef Rocha BPS, Costa DNO, Moreira RA, Rezende CG, Loureiro AAF, Boukerche A (2010) Adaptive security protocol selection for mobile computing. J Netw Comput Appl 33:569–587CrossRef
28.
Zurück zum Zitat Garcia M, Llewellyn-Jones D, Ortin F, Merabti M (2012) Applying dynamic separation of aspects to distributed systems security: a case study. Softw IET 6:231–248CrossRef Garcia M, Llewellyn-Jones D, Ortin F, Merabti M (2012) Applying dynamic separation of aspects to distributed systems security: a case study. Softw IET 6:231–248CrossRef
29.
Zurück zum Zitat Gilbert P, Chun B-G, Cox LP, Jung J (2011) Vision: automated security validation of mobile apps at app markets. In: Proceedings of the second international workshop on mobile cloud computing and services. ACM, pp 21–26 Gilbert P, Chun B-G, Cox LP, Jung J (2011) Vision: automated security validation of mobile apps at app markets. In: Proceedings of the second international workshop on mobile cloud computing and services. ACM, pp 21–26
30.
Zurück zum Zitat Dehling T, Gao F, Schneider S, Sunyaev A (2015) Exploring the far side of mobile health: information security and privacy of mobile health apps on ios and android. JMIR mHealth and uHealth, 3(1) Dehling T, Gao F, Schneider S, Sunyaev A (2015) Exploring the far side of mobile health: information security and privacy of mobile health apps on ios and android. JMIR mHealth and uHealth, 3(1)
31.
Zurück zum Zitat (2016). Xposed - general info, versions & changelog, xda developers (2016). Xposed - general info, versions & changelog, xda developers
32.
Zurück zum Zitat Sable Research Group (2016) Soot: a framework for analyzing and transforming Java and Android applications Sable Research Group (2016) Soot: a framework for analyzing and transforming Java and Android applications
33.
Zurück zum Zitat Pallapa G, Roy N, Das SK (2008) A scheme for quantizing privacy in context-aware ubiquitous computing. In: IET conference proceedings, pp 32–32 Pallapa G, Roy N, Das SK (2008) A scheme for quantizing privacy in context-aware ubiquitous computing. In: IET conference proceedings, pp 32–32
34.
Zurück zum Zitat Miller E (1998) An introduction to the resource description framework. Bull Am Soc Inf Sci Technol 25 (1):15–19CrossRef Miller E (1998) An introduction to the resource description framework. Bull Am Soc Inf Sci Technol 25 (1):15–19CrossRef
35.
Zurück zum Zitat Suna A, El Fallah-Seghrouchni A (2005) A mobile agents platform: architecture, mobility and security elements. In: Bordini RH, Dastani M, Dix J, El Fallah Seghrouchni A (eds) Programming multi-agent systems. Springer, Berlin, pp 126–146 Suna A, El Fallah-Seghrouchni A (2005) A mobile agents platform: architecture, mobility and security elements. In: Bordini RH, Dastani M, Dix J, El Fallah Seghrouchni A (eds) Programming multi-agent systems. Springer, Berlin, pp 126–146
36.
Zurück zum Zitat Zhao K, Zou D, Jin H, Tian Z, Qiang W, Dai W (2015) Privacy protection for perceptual applications on smartphones. In: 2015 IEEE international conference on mobile services (MS). IEEE, pp 174–181 Zhao K, Zou D, Jin H, Tian Z, Qiang W, Dai W (2015) Privacy protection for perceptual applications on smartphones. In: 2015 IEEE international conference on mobile services (MS). IEEE, pp 174–181
37.
Zurück zum Zitat La Polla M, Martinelli F, Sgandurra D (2013) A survey on security for mobile devices. IEEE Commun Surv Tutorials 15(1):446–471CrossRef La Polla M, Martinelli F, Sgandurra D (2013) A survey on security for mobile devices. IEEE Commun Surv Tutorials 15(1):446–471CrossRef
38.
Zurück zum Zitat Wijesekera P, Baokar A, Hosseini A, Egelman S, Wagner D, Beznosov K (2015) Android permissions remystified: a field study on contextual integrity. In: USENIX security symposium, pp 499–514 Wijesekera P, Baokar A, Hosseini A, Egelman S, Wagner D, Beznosov K (2015) Android permissions remystified: a field study on contextual integrity. In: USENIX security symposium, pp 499–514
39.
Zurück zum Zitat Maji AK, Arshad FA, Bagchi S, Rellermeyer JS (2012) An empirical study of the robustness of inter-component communication in android. In: 2012 42nd Annual IEEE/IFIP international conference on dependable systems and networks (DSN). IEEE, pp 1–12 Maji AK, Arshad FA, Bagchi S, Rellermeyer JS (2012) An empirical study of the robustness of inter-component communication in android. In: 2012 42nd Annual IEEE/IFIP international conference on dependable systems and networks (DSN). IEEE, pp 1–12
40.
Zurück zum Zitat Cugola G, Margara A, Migliavacca M (2009) Context-aware publish-subscribe: model, implementation, and evaluation. In: 2009 IEEE symposium on computers and communications, pp 875–881 Cugola G, Margara A, Migliavacca M (2009) Context-aware publish-subscribe: model, implementation, and evaluation. In: 2009 IEEE symposium on computers and communications, pp 875–881
41.
Zurück zum Zitat Onica E, Felber P, Mercier H, Rivière E (2016) Confidentiality-preserving publish/subscribe: a survey. ACM Comput Surv (CSUR) 49(2):27 Onica E, Felber P, Mercier H, Rivière E (2016) Confidentiality-preserving publish/subscribe: a survey. ACM Comput Surv (CSUR) 49(2):27
42.
Zurück zum Zitat Jung H-W, Kim S-G, Chung C-S (2004) Measuring software product quality: a survey of iso/iec 9126. IEEE Softw 21(5):88–92CrossRef Jung H-W, Kim S-G, Chung C-S (2004) Measuring software product quality: a survey of iso/iec 9126. IEEE Softw 21(5):88–92CrossRef
43.
Zurück zum Zitat Liu Y, Jin Z, Wang Y (2010) Survey on security scheme and attacking methods of wpa/wpa2. In: 2010 6th international conference on wireless communications networking and mobile computing (wicom). IEEE, pp 1–4 Liu Y, Jin Z, Wang Y (2010) Survey on security scheme and attacking methods of wpa/wpa2. In: 2010 6th international conference on wireless communications networking and mobile computing (wicom). IEEE, pp 1–4
44.
Zurück zum Zitat Lashkari AH, Danesh MMS, Samadi B (2009) A survey on wireless security protocols (wep, wpa and wpa2/802.11 i). In: 2nd IEEE International conference on computer science and information technology, 2009. ICCSIT 2009. IEEE, pp 48–52 Lashkari AH, Danesh MMS, Samadi B (2009) A survey on wireless security protocols (wep, wpa and wpa2/802.11 i). In: 2nd IEEE International conference on computer science and information technology, 2009. ICCSIT 2009. IEEE, pp 48–52
Metadaten
Titel
Adaptive Security for Self-Protection of Mobile Computing Devices
verfasst von
Aakash Ahmad
Asad Waqar Malik
Abdulrahman Alreshidi
Wilayat Khan
Maryam Sajjad
Publikationsdatum
05.09.2019
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 2/2023
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-019-01355-y