Skip to main content
Top
Published in: The Journal of Supercomputing 5/2016

01-05-2016

Hybrid app security protocol for high speed mobile communication

Authors: Seoung-Hyeon Lee, Young-Hyuk Kim, Jae-Kwang Lee, Deok Gyu Lee

Published in: The Journal of Supercomputing | Issue 5/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, security vulnerabilities that can be found in hybrid apps, by which important data are downloaded from a web server, were analyzed and HIGHT algorithm based on OTP delimiter modification and bit slicing was proposed to enhance security of hybrid apps. The hybrid app, to which the proposed method was applied before analysis, is a medical app for research and monitors biometric data of patients in the healthcare field. This app is monitoring patient’s biometric data continuously. Thus, this app generates considerable mobile traffic and transmission delay. After installing the app in a mobile device, reverse engineering was used to check the address from which the app requests important data, and a web server analysis tool was used to obtain important data that enables security attacks including the sitemap, type and version of application, and open source. To solve these problems, the security protocol proposed in this paper was applied, as a result important data were protected without transmission delay and it shows that proposed protocol can adopt high speed mobile communications.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Do KM, Kim YH, Kim DI, Kim CB (2013) Application design using hybrid app in mobile environment. In: Korean Institute of Information Technology summer conference, pp 35–38 Do KM, Kim YH, Kim DI, Kim CB (2013) Application design using hybrid app in mobile environment. In: Korean Institute of Information Technology summer conference, pp 35–38
3.
go back to reference Jung WJ, Oh JH, Yoon DW (2012) Design and implementation of hybrid app framework. J Korea Inst Inf Commun Eng 16(9):1990–1996CrossRef Jung WJ, Oh JH, Yoon DW (2012) Design and implementation of hybrid app framework. J Korea Inst Inf Commun Eng 16(9):1990–1996CrossRef
5.
go back to reference Carlos R, Afonso J, Tomé P (2011) Mobile application webservice performance analysis: restful services with JSON and XML. In: ENTERprise information systems, pp 162–169. doi:10.1007/978-3-642-24355-4_17 Carlos R, Afonso J, Tomé P (2011) Mobile application webservice performance analysis: restful services with JSON and XML. In: ENTERprise information systems, pp 162–169. doi:10.​1007/​978-3-642-24355-4_​17
6.
go back to reference Nurseitov N, Paulson M, Reynolds R, Izurieta C (2009) Comparison of JSON and XML data interchange formats: a case study. In: Proceedings of the ISCA 22nd international conference on computer applications in industry and engineering, pp 157–162 Nurseitov N, Paulson M, Reynolds R, Izurieta C (2009) Comparison of JSON and XML data interchange formats: a case study. In: Proceedings of the ISCA 22nd international conference on computer applications in industry and engineering, pp 157–162
7.
go back to reference Berena AJ, Chunwijitra S, Okada H, Ueno H (2013) Shared virtual presentation board for e-Meeting in higher education on the WebELS platform. Hum Centric Comput Inf Sci 3(3). doi:10.1186/2192-1962-3-6 Berena AJ, Chunwijitra S, Okada H, Ueno H (2013) Shared virtual presentation board for e-Meeting in higher education on the WebELS platform. Hum Centric Comput Inf Sci 3(3). doi:10.​1186/​2192-1962-3-6
8.
go back to reference Kim GY, Cho SJ (2010) Security vulnerability trends in smartphones. Korean Inst Inf Sci Eng Conf 37(2B):90–94 Kim GY, Cho SJ (2010) Security vulnerability trends in smartphones. Korean Inst Inf Sci Eng Conf 37(2B):90–94
10.
go back to reference Tsai C-L, Chen C-J, Zhuang D-J (2012) Trusted M-banking verification scheme based on a combination of OTP and biometrics. J Converg 3(3):23–30 Tsai C-L, Chen C-J, Zhuang D-J (2012) Trusted M-banking verification scheme based on a combination of OTP and biometrics. J Converg 3(3):23–30
12.
13.
go back to reference Melendi D, Pañeda XG, García R, García VG (2009) Sistema para la realización y evaluación de prácticas de protocolos de nivel de aplicación. IEEE-RITA 4(2):109–116 Melendi D, Pañeda XG, García R, García VG (2009) Sistema para la realización y evaluación de prácticas de protocolos de nivel de aplicación. IEEE-RITA 4(2):109–116
14.
go back to reference Kelly MR (2012) An extensible framework for creating personal archives of web resources requiring authentication. PhD Thesis, Old Dominion University Kelly MR (2012) An extensible framework for creating personal archives of web resources requiring authentication. PhD Thesis, Old Dominion University
16.
go back to reference Samet H, Adelfio MD, Fruin BC, Lieberman MD, Teitler BE (2011) Porting a web-based mapping application to a smartphone app. In: Proceedings of the 19th ACM SIGSPATIAL international conference on advances in geographic information systems, pp 525–528. doi:10.1145/2093973.2094065 Samet H, Adelfio MD, Fruin BC, Lieberman MD, Teitler BE (2011) Porting a web-based mapping application to a smartphone app. In: Proceedings of the 19th ACM SIGSPATIAL international conference on advances in geographic information systems, pp 525–528. doi:10.​1145/​2093973.​2094065
17.
go back to reference Godwin-Jones R (2011) Emerging technologies: mobile apps for language learning. Lang Learn Technol 15(2):2–11 Godwin-Jones R (2011) Emerging technologies: mobile apps for language learning. Lang Learn Technol 15(2):2–11
19.
go back to reference Na Daniel Y (2011) The what, why, and how of mobile applications. Sigma 11(1):20–26 Na Daniel Y (2011) The what, why, and how of mobile applications. Sigma 11(1):20–26
23.
go back to reference Biswas K, Muthukkumarasamy V, Sithirasenan E, Singh K (2014) A simple lightweight encryption scheme for wireless sensor networks. In: Distributed computing and networking, pp 499–504. doi:10.1007/978-3-642-45249-9_33 Biswas K, Muthukkumarasamy V, Sithirasenan E, Singh K (2014) A simple lightweight encryption scheme for wireless sensor networks. In: Distributed computing and networking, pp 499–504. doi:10.​1007/​978-3-642-45249-9_​33
24.
go back to reference Ozen O, Varici K, Tezcan C, Kocair C (2009) Lightweight block ciphers revisited: cryptanalysis of reduced round PRESENT and HIGHT. In: Information security and privacy, pp 90–107. doi:10.1007/978-3-642-02620-1_7 Ozen O, Varici K, Tezcan C, Kocair C (2009) Lightweight block ciphers revisited: cryptanalysis of reduced round PRESENT and HIGHT. In: Information security and privacy, pp 90–107. doi:10.​1007/​978-3-642-02620-1_​7
25.
go back to reference AlDabbagh SSM, Al Shaikhli IFT (2012) Lightweight block ciphers: a comparative study. J Adv Comput Sci Technol Res 2(1):159–165 AlDabbagh SSM, Al Shaikhli IFT (2012) Lightweight block ciphers: a comparative study. J Adv Comput Sci Technol Res 2(1):159–165
27.
go back to reference TTA, TTAS.KO-12.0040/R1: 64-bit block cipher HIGHT TTA, TTAS.KO-12.0040/R1: 64-bit block cipher HIGHT
28.
go back to reference ISO/IEC 18033-3:2010, Information technology—security techniques—encryption algorithms-Part 3: Block ciphers ISO/IEC 18033-3:2010, Information technology—security techniques—encryption algorithms-Part 3: Block ciphers
29.
go back to reference Karuppiah AB, Rajaram S (2012) Energy efficient encryption algorithm for wireless sensor network. Int J Eng Res Technol 1(3):1–7 Karuppiah AB, Rajaram S (2012) Energy efficient encryption algorithm for wireless sensor network. Int J Eng Res Technol 1(3):1–7
31.
go back to reference Hong DJ, Sung JC, Hong SH, Lim JI, Lee SJ, Koo BS, Lee CH, Chang DH, Lee JS, Jeong KT, Kim H, Kim JS, Chee ST (2006) HIGHT: a new block cipher suitable for low-resource device. In: Cryptographic hardware and embedded systems-CHES 2006, pp 46–59. doi:10.1007/11894063_4 Hong DJ, Sung JC, Hong SH, Lim JI, Lee SJ, Koo BS, Lee CH, Chang DH, Lee JS, Jeong KT, Kim H, Kim JS, Chee ST (2006) HIGHT: a new block cipher suitable for low-resource device. In: Cryptographic hardware and embedded systems-CHES 2006, pp 46–59. doi:10.​1007/​11894063_​4
33.
go back to reference Baek ET, Lee MK (2012) Speed-optimized implementation of HIGHT block cipher algorithm. J Korea Inst Inf Secur Cryptol 22(3):495–504 Baek ET, Lee MK (2012) Speed-optimized implementation of HIGHT block cipher algorithm. J Korea Inst Inf Secur Cryptol 22(3):495–504
34.
go back to reference Lee DG (2011) Kim HW (2011) FPGA implementation of HIGHT block cipher. Inst Electron Eng Korea Summer Conf 34(1):1603–1606 Lee DG (2011) Kim HW (2011) FPGA implementation of HIGHT block cipher. Inst Electron Eng Korea Summer Conf 34(1):1603–1606
36.
go back to reference Me G, Pirro D, Sarrecchia R (2006) A mobile based approach to strong authentication on web. In: ICCGI ’06 proceedings of the international multi-conference on computing in the global information technology, p 67. doi:10.1109/ICCGI.2006.8 Me G, Pirro D, Sarrecchia R (2006) A mobile based approach to strong authentication on web. In: ICCGI ’06 proceedings of the international multi-conference on computing in the global information technology, p 67. doi:10.​1109/​ICCGI.​2006.​8
39.
go back to reference Eldefrawy MH, Khan MK, Alghathbar K, Kim TH, Elkamchouchi H (2012) Mobile one-time passwords: two-factor authentication using mobile phones. Secur Commun Netw 5(2):508–516. doi:10.1002/sec.340 CrossRef Eldefrawy MH, Khan MK, Alghathbar K, Kim TH, Elkamchouchi H (2012) Mobile one-time passwords: two-factor authentication using mobile phones. Secur Commun Netw 5(2):508–516. doi:10.​1002/​sec.​340 CrossRef
40.
go back to reference Gurav TH, Dhage M (2012) Remote client authentication using mobile phone generated OTP. Int J Sci Res Publ 2(2):1–4 Gurav TH, Dhage M (2012) Remote client authentication using mobile phone generated OTP. Int J Sci Res Publ 2(2):1–4
Metadata
Title
Hybrid app security protocol for high speed mobile communication
Authors
Seoung-Hyeon Lee
Young-Hyuk Kim
Jae-Kwang Lee
Deok Gyu Lee
Publication date
01-05-2016
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 5/2016
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-014-1318-3

Other articles of this Issue 5/2016

The Journal of Supercomputing 5/2016 Go to the issue

Premium Partner