Skip to main content
Top
Published in: Mobile Networks and Applications 2/2023

05-09-2019

Adaptive Security for Self-Protection of Mobile Computing Devices

Authors: Aakash Ahmad, Asad Waqar Malik, Abdulrahman Alreshidi, Wilayat Khan, Maryam Sajjad

Published in: Mobile Networks and Applications | Issue 2/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile computing has emerged as a pervasive technology that empowers its users with portable computation and context-aware communication. Smart systems and infrastructures can exploit portable and context-aware computing technologies to provide any time, any place digitized services on the go. Despite the offered benefits, such as portability, context-sensitivity, and high connectivity, mobile computing also faces some critical challenges. These challenges include resource poverty as well as data security and privacy that need to be addressed to increase the pervasiveness of mobile systems. We propose to provide a self-protection mechanism for mobile devices against the unforeseen security threats that can attack the critical resources of mobile devices. We have unified the concepts of autonomic computing and computer security to develop a framework that enables adaptive security to dynamically configure the security measures of a mobile device. We have developed a framework - an android-based prototype - that supports automation and user decision to protect the critical hardware and software resources of a device. Evaluation results demonstrate (i) framework’s accuracy for runtime detection and minimization of threats, and (ii) framework’s efficiency for device’s resource utilization.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Footnotes
3
In Fig. 8 we have anonymized the name of the app - used as a case study - that represents a potential security threat to the device resources.
 
Literature
1.
go back to reference Mehmood R, Bhaduri B, Katib I, Chlamtac I (2018) Smart societies, infrastructure, technologies and applications: first international conference, SCITA 2017, Jeddah, Saudi Arabia, November 27–29, 2017, Proceedings, vol 224 Springer Mehmood R, Bhaduri B, Katib I, Chlamtac I (2018) Smart societies, infrastructure, technologies and applications: first international conference, SCITA 2017, Jeddah, Saudi Arabia, November 27–29, 2017, Proceedings, vol 224 Springer
2.
go back to reference Sajjad M, Abbasi AA, Malik A, Altamimi AB, Alseadoon IM (2018) Classification and mapping of adaptive security for mobile computing. IEEE Trans Emerg Top Comput 1(1):1–1 Sajjad M, Abbasi AA, Malik A, Altamimi AB, Alseadoon IM (2018) Classification and mapping of adaptive security for mobile computing. IEEE Trans Emerg Top Comput 1(1):1–1
3.
go back to reference Protsenko M, Kreuter S, Muller T (2015) Dynamic self-protection and tamperproofing for android apps using native code. In: 2015 10th International conference on availability, reliability and security (ARES), pp 129–138 Protsenko M, Kreuter S, Muller T (2015) Dynamic self-protection and tamperproofing for android apps using native code. In: 2015 10th International conference on availability, reliability and security (ARES), pp 129–138
4.
go back to reference Security H (2017) Study on mobile device security, Science and Technology Directorate Security H (2017) Study on mobile device security, Science and Technology Directorate
5.
go back to reference Kim KI, Hwang HS, Ko HJ, Lee HK, Kim UM (2006) Multi-policy access control considering privacy in ubiquitous environment. In: 2006 international conference on hybrid information technology, vol 1. IEEE, pp 216–222 Kim KI, Hwang HS, Ko HJ, Lee HK, Kim UM (2006) Multi-policy access control considering privacy in ubiquitous environment. In: 2006 international conference on hybrid information technology, vol 1. IEEE, pp 216–222
6.
go back to reference Muhammed T, Mehmood R, Albeshri A, Katib I (2018) Ubehealth: a personalized ubiquitous cloud and edge-enabled networked healthcare system for smart cities. IEEE Access 6:32258–32285CrossRef Muhammed T, Mehmood R, Albeshri A, Katib I (2018) Ubehealth: a personalized ubiquitous cloud and edge-enabled networked healthcare system for smart cities. IEEE Access 6:32258–32285CrossRef
7.
go back to reference Penning N, Hoffman M, Nikolai J, Wang Y (2014) Mobile malware security challeges and cloud-based detection. In: 2014 International conference on collaboration technologies and systems (CTS). IEEE, pp 181–188 Penning N, Hoffman M, Nikolai J, Wang Y (2014) Mobile malware security challeges and cloud-based detection. In: 2014 International conference on collaboration technologies and systems (CTS). IEEE, pp 181–188
8.
go back to reference Alampalayam SP, Kumar A (2003) An adaptive security model for mobile agents in wireless networks. In: Global telecommunications conference, 2003. GLOBECOM ’03, vol 3. IEEE, pp 1516–1521 Alampalayam SP, Kumar A (2003) An adaptive security model for mobile agents in wireless networks. In: Global telecommunications conference, 2003. GLOBECOM ’03, vol 3. IEEE, pp 1516–1521
9.
go back to reference Anwar Z, Khan WA (2015) Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs. Secur Commun Netw 8(16):2813–2825CrossRef Anwar Z, Khan WA (2015) Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs. Secur Commun Netw 8(16):2813–2825CrossRef
10.
go back to reference Salehie M, Pasquale L, Omoronyia I, Ali R, Nuseibeh B (2012) Requirements-driven adaptive security: protecting variable assets at runtime. In: 2012 20th IEEE international requirements engineering conference (RE), pp 111–120 Salehie M, Pasquale L, Omoronyia I, Ali R, Nuseibeh B (2012) Requirements-driven adaptive security: protecting variable assets at runtime. In: 2012 20th IEEE international requirements engineering conference (RE), pp 111–120
11.
go back to reference Garcia M, Llewellyn-Jones D, Ortin F, Merabti M (2012) Applying dynamic separation of aspects to distributed systems security: a case study. Softw IET 6:231–248CrossRef Garcia M, Llewellyn-Jones D, Ortin F, Merabti M (2012) Applying dynamic separation of aspects to distributed systems security: a case study. Softw IET 6:231–248CrossRef
12.
go back to reference An G, Bae G, Kim K, Seo D (2009) Context-aware dynamic security configuration for mobile communication device. In: 2009 3rd International conference on new technologies, mobility and security (NTMS), pp 1–5 An G, Bae G, Kim K, Seo D (2009) Context-aware dynamic security configuration for mobile communication device. In: 2009 3rd International conference on new technologies, mobility and security (NTMS), pp 1–5
13.
go back to reference Kephart JO, Chess DM (2003) The vision of autonomic computing. Computer 36:41–50CrossRef Kephart JO, Chess DM (2003) The vision of autonomic computing. Computer 36:41–50CrossRef
14.
go back to reference Sajjad M, Abbasi AA, Malik A, Altamimi AB, Alseadoon IM (2018) Classification and mapping of adaptive security for mobile computing. IEEE Trans Emerg Top Comput Sajjad M, Abbasi AA, Malik A, Altamimi AB, Alseadoon IM (2018) Classification and mapping of adaptive security for mobile computing. IEEE Trans Emerg Top Comput
16.
go back to reference Robbes R, Lanza M (2008) Spyware. In: ACM/IEEE 30th International conference on software engineering, pp 847–850 Robbes R, Lanza M (2008) Spyware. In: ACM/IEEE 30th International conference on software engineering, pp 847–850
17.
go back to reference Satyanarayanan M (2015) A brief history of cloud offload: a personal journey from odyssey through cyber foraging to cloudlets. GetMobile: Mobile Comput Commun 18(4):19–23CrossRef Satyanarayanan M (2015) A brief history of cloud offload: a personal journey from odyssey through cyber foraging to cloudlets. GetMobile: Mobile Comput Commun 18(4):19–23CrossRef
18.
go back to reference Lewis GA, Lago P, Procaccianti G (2014) Architecture strategies for cyber-foraging: preliminary results from a systematic literature review. In: European conference on software architecture. Springer, pp 154–169 Lewis GA, Lago P, Procaccianti G (2014) Architecture strategies for cyber-foraging: preliminary results from a systematic literature review. In: European conference on software architecture. Springer, pp 154–169
19.
go back to reference Zhang X, Kim G-B, Bae H-Y (2014) An adaptive spatial cloaking method for privacy protection in location-based service. In: 2014 International conference on information and communication technology convergence (ICTC), pp 480–485 Zhang X, Kim G-B, Bae H-Y (2014) An adaptive spatial cloaking method for privacy protection in location-based service. In: 2014 International conference on information and communication technology convergence (ICTC), pp 480–485
20.
go back to reference Seigneur TEMM (2013) Security adaptation based on autonomic and trust systems for ubiquitous mobile network and green it. In: UBICOMM 2013 : the seventh international conference on mobile ubiquitous computing, systems, services and technologies, IARIA Seigneur TEMM (2013) Security adaptation based on autonomic and trust systems for ubiquitous mobile network and green it. In: UBICOMM 2013 : the seventh international conference on mobile ubiquitous computing, systems, services and technologies, IARIA
21.
go back to reference Martinelli F, Mori P, Quillinan T, Schaefer C (2008) A runtime monitoring environment for mobile java. In: IEEE international conference on software testing verification and validation workshop, 2008. ICSTW ’08, pp 270–278 Martinelli F, Mori P, Quillinan T, Schaefer C (2008) A runtime monitoring environment for mobile java. In: IEEE international conference on software testing verification and validation workshop, 2008. ICSTW ’08, pp 270–278
22.
go back to reference Yang Z, Lu S, Yang P (2006) Runtime security verification for itinerary-driven mobile agents. In: 2nd IEEE international symposium on dependable, autonomic and secure computing, pp 177–186 Yang Z, Lu S, Yang P (2006) Runtime security verification for itinerary-driven mobile agents. In: 2nd IEEE international symposium on dependable, autonomic and secure computing, pp 177–186
23.
go back to reference Lin H, Yan Z, Fu Y (2019) Adaptive security-related data collection with context awareness. J Netw Comput Appl 126:88–103CrossRef Lin H, Yan Z, Fu Y (2019) Adaptive security-related data collection with context awareness. J Netw Comput Appl 126:88–103CrossRef
24.
go back to reference Laborde R, Oglaza A, Wazan AS, Barrère F, Benzekri A (2019) A situation-driven framework for dynamic security management. Ann Telecommun 74(3-4):185–196CrossRef Laborde R, Oglaza A, Wazan AS, Barrère F, Benzekri A (2019) A situation-driven framework for dynamic security management. Ann Telecommun 74(3-4):185–196CrossRef
25.
go back to reference An G, Bae G, Kim K, Seo D (2009) Context-aware dynamic security configuration for mobile communication device. In: 2009 3rd International conference on new technologies, mobility and Security (NTMS), pp 1–5 An G, Bae G, Kim K, Seo D (2009) Context-aware dynamic security configuration for mobile communication device. In: 2009 3rd International conference on new technologies, mobility and Security (NTMS), pp 1–5
27.
go back to reference Rocha BPS, Costa DNO, Moreira RA, Rezende CG, Loureiro AAF, Boukerche A (2010) Adaptive security protocol selection for mobile computing. J Netw Comput Appl 33:569–587CrossRef Rocha BPS, Costa DNO, Moreira RA, Rezende CG, Loureiro AAF, Boukerche A (2010) Adaptive security protocol selection for mobile computing. J Netw Comput Appl 33:569–587CrossRef
28.
go back to reference Garcia M, Llewellyn-Jones D, Ortin F, Merabti M (2012) Applying dynamic separation of aspects to distributed systems security: a case study. Softw IET 6:231–248CrossRef Garcia M, Llewellyn-Jones D, Ortin F, Merabti M (2012) Applying dynamic separation of aspects to distributed systems security: a case study. Softw IET 6:231–248CrossRef
29.
go back to reference Gilbert P, Chun B-G, Cox LP, Jung J (2011) Vision: automated security validation of mobile apps at app markets. In: Proceedings of the second international workshop on mobile cloud computing and services. ACM, pp 21–26 Gilbert P, Chun B-G, Cox LP, Jung J (2011) Vision: automated security validation of mobile apps at app markets. In: Proceedings of the second international workshop on mobile cloud computing and services. ACM, pp 21–26
30.
go back to reference Dehling T, Gao F, Schneider S, Sunyaev A (2015) Exploring the far side of mobile health: information security and privacy of mobile health apps on ios and android. JMIR mHealth and uHealth, 3(1) Dehling T, Gao F, Schneider S, Sunyaev A (2015) Exploring the far side of mobile health: information security and privacy of mobile health apps on ios and android. JMIR mHealth and uHealth, 3(1)
31.
go back to reference (2016). Xposed - general info, versions & changelog, xda developers (2016). Xposed - general info, versions & changelog, xda developers
32.
go back to reference Sable Research Group (2016) Soot: a framework for analyzing and transforming Java and Android applications Sable Research Group (2016) Soot: a framework for analyzing and transforming Java and Android applications
33.
go back to reference Pallapa G, Roy N, Das SK (2008) A scheme for quantizing privacy in context-aware ubiquitous computing. In: IET conference proceedings, pp 32–32 Pallapa G, Roy N, Das SK (2008) A scheme for quantizing privacy in context-aware ubiquitous computing. In: IET conference proceedings, pp 32–32
34.
go back to reference Miller E (1998) An introduction to the resource description framework. Bull Am Soc Inf Sci Technol 25 (1):15–19CrossRef Miller E (1998) An introduction to the resource description framework. Bull Am Soc Inf Sci Technol 25 (1):15–19CrossRef
35.
go back to reference Suna A, El Fallah-Seghrouchni A (2005) A mobile agents platform: architecture, mobility and security elements. In: Bordini RH, Dastani M, Dix J, El Fallah Seghrouchni A (eds) Programming multi-agent systems. Springer, Berlin, pp 126–146 Suna A, El Fallah-Seghrouchni A (2005) A mobile agents platform: architecture, mobility and security elements. In: Bordini RH, Dastani M, Dix J, El Fallah Seghrouchni A (eds) Programming multi-agent systems. Springer, Berlin, pp 126–146
36.
go back to reference Zhao K, Zou D, Jin H, Tian Z, Qiang W, Dai W (2015) Privacy protection for perceptual applications on smartphones. In: 2015 IEEE international conference on mobile services (MS). IEEE, pp 174–181 Zhao K, Zou D, Jin H, Tian Z, Qiang W, Dai W (2015) Privacy protection for perceptual applications on smartphones. In: 2015 IEEE international conference on mobile services (MS). IEEE, pp 174–181
37.
go back to reference La Polla M, Martinelli F, Sgandurra D (2013) A survey on security for mobile devices. IEEE Commun Surv Tutorials 15(1):446–471CrossRef La Polla M, Martinelli F, Sgandurra D (2013) A survey on security for mobile devices. IEEE Commun Surv Tutorials 15(1):446–471CrossRef
38.
go back to reference Wijesekera P, Baokar A, Hosseini A, Egelman S, Wagner D, Beznosov K (2015) Android permissions remystified: a field study on contextual integrity. In: USENIX security symposium, pp 499–514 Wijesekera P, Baokar A, Hosseini A, Egelman S, Wagner D, Beznosov K (2015) Android permissions remystified: a field study on contextual integrity. In: USENIX security symposium, pp 499–514
39.
go back to reference Maji AK, Arshad FA, Bagchi S, Rellermeyer JS (2012) An empirical study of the robustness of inter-component communication in android. In: 2012 42nd Annual IEEE/IFIP international conference on dependable systems and networks (DSN). IEEE, pp 1–12 Maji AK, Arshad FA, Bagchi S, Rellermeyer JS (2012) An empirical study of the robustness of inter-component communication in android. In: 2012 42nd Annual IEEE/IFIP international conference on dependable systems and networks (DSN). IEEE, pp 1–12
40.
go back to reference Cugola G, Margara A, Migliavacca M (2009) Context-aware publish-subscribe: model, implementation, and evaluation. In: 2009 IEEE symposium on computers and communications, pp 875–881 Cugola G, Margara A, Migliavacca M (2009) Context-aware publish-subscribe: model, implementation, and evaluation. In: 2009 IEEE symposium on computers and communications, pp 875–881
41.
go back to reference Onica E, Felber P, Mercier H, Rivière E (2016) Confidentiality-preserving publish/subscribe: a survey. ACM Comput Surv (CSUR) 49(2):27 Onica E, Felber P, Mercier H, Rivière E (2016) Confidentiality-preserving publish/subscribe: a survey. ACM Comput Surv (CSUR) 49(2):27
42.
go back to reference Jung H-W, Kim S-G, Chung C-S (2004) Measuring software product quality: a survey of iso/iec 9126. IEEE Softw 21(5):88–92CrossRef Jung H-W, Kim S-G, Chung C-S (2004) Measuring software product quality: a survey of iso/iec 9126. IEEE Softw 21(5):88–92CrossRef
43.
go back to reference Liu Y, Jin Z, Wang Y (2010) Survey on security scheme and attacking methods of wpa/wpa2. In: 2010 6th international conference on wireless communications networking and mobile computing (wicom). IEEE, pp 1–4 Liu Y, Jin Z, Wang Y (2010) Survey on security scheme and attacking methods of wpa/wpa2. In: 2010 6th international conference on wireless communications networking and mobile computing (wicom). IEEE, pp 1–4
44.
go back to reference Lashkari AH, Danesh MMS, Samadi B (2009) A survey on wireless security protocols (wep, wpa and wpa2/802.11 i). In: 2nd IEEE International conference on computer science and information technology, 2009. ICCSIT 2009. IEEE, pp 48–52 Lashkari AH, Danesh MMS, Samadi B (2009) A survey on wireless security protocols (wep, wpa and wpa2/802.11 i). In: 2nd IEEE International conference on computer science and information technology, 2009. ICCSIT 2009. IEEE, pp 48–52
Metadata
Title
Adaptive Security for Self-Protection of Mobile Computing Devices
Authors
Aakash Ahmad
Asad Waqar Malik
Abdulrahman Alreshidi
Wilayat Khan
Maryam Sajjad
Publication date
05-09-2019
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 2/2023
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-019-01355-y

Other articles of this Issue 2/2023

Mobile Networks and Applications 2/2023 Go to the issue