Adaptive Security Mechanism: a study on the different approaches to mobile devices
Abstract
This article provides an overview of some major works that focus on the use of adaptive security for mobile computing to protect information and data traffic. The limited resources on the mobile device makes security mechanisms implementations very expensive. However, these devises are very attractive to attackers to exploit their weaknesses, launch scanning attacks, and man-in-the-middle attacks to have access to private data of mobile users. To provide security for users of mobile devices, security mechanism with the ability to adapt to various states and situations may be applied such as encryption to increase confidentiality, authentication so that only authorized users or systems have access to its data, and prioritizes ergonomics of the mobile device. For this purpose, mobile features such as CPU, memory, battery, and the environment in which it is connected must be operated by the adaptive security mechanism.
Downloads
References
Satyanarayanan, M. (2001). Pervasive computing: Vision and challenges. Personal Communications, IEEE, 8(4), 10-17.
Leeuwen, J. (1990). Handbook of theoretical computer science: algorithms and complexity (Vol. 1). Elsevier.
Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of applied cryptography. CRC press.
Jiang, W., Guo, Z., Ma, Y., & Sang, N. (2013). Measurement-based research on cryptographic algorithms for embedded real-time systems. Journal of Systems Architecture, 59(10), 1394-1404.
Qi, H., & Gani, A. (2012, May). Research on mobile cloud computing: Review, trend and perspectives. In Digital Information and Communication Technology and it's Applications (DICTAP), 2012 Second International Conference on (pp. 195-202). ieee.
Gupta, S. K. S., & Srimani, P. K. (2000). Experience in teaching a graduate course in mobile computing. In Frontiers in Education Conference, 2000. FIE 2000. 30th Annual (Vol. 2, pp. S1C-6). IEEE.
Gartner. “Gartner Says Worldwide Traditional PC, Tablet, Ultramobile and Mobile Phone Shipments On Pace to Grow 7.6 Percent in 2014”.
Alliance, C. (2012). Security Guidance for Critical Areas of Mobile Computing, V1.0. Cloud Security Alliance.
Pirmez, M., Pirmez, L., da Costa Carmo, L. F. R., Delicato, F. C., Pires, P. F., & de Sousa, E. B. (2008). Prometheus: Um Serviço de Segurança Adaptativa. SBSEG2008, Gramado, RS (to appear).
An, G., Bae, G., Kim, K., & Seo, D. (2009, December). Context-aware dynamic security configuration for mobile communication device. In New Technologies, Mobility and Security (NTMS), 2009 3rd International Conference on (pp. 1-5). IEEE.
Cirqueira, A. C., Andrade, R. M., & de Castro, M. F. (2011). Um mecanismo de seguranca com adaptacao dinamica em tempo de execucao para dispositivos moveis. Seminario Integrado de Software e Hardware, 1337-1351.
Lee, H., & Chung, M. (2011, October). Context-Aware Security model for Social Network Service. In Broadband and Wireless Computing, Communication and Applications (BWCCA), 2011 International Conference on(pp. 144-151). IEEE.
Moraes, R. U. M. (2014). Ssacc - servico de seguranca para autenticacao ciente do contexto: para dispositivos moveis no paradigma da computacao em nuvem. Master’s thesis, UNIVERSIDADE FEDERAL DO MARANHAO.
Elgamal, T., & Hickman, K. E. (1998). U.S. Patent No. 5,825,890. Washington, DC: U.S. Patent and Trademark Office.
Kurose , J. F., Ross, K. W., & Marques, A. S. (2003). Redes de Computadores e a Internet: Uma nova abordagem, volume 1. Addison Wesley.
Oreizy, P., Medvidovic, N., & Taylor, R. N. (2008, May). Runtime software adaptation: framework, approaches, and styles. In Companion of the 30th international conference on Software engineering (pp. 899-910). ACM.
Copyright (c) 2015 Journal of Information Sciences and Computing Technologies
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
TRANSFER OF COPYRIGHT
JISCT is pleased to undertake the publication of your contribution to Journal of Information Sciences and Computing Technologies
The copyright to this article is transferred to JISCT(including without limitation, the right to publish the work in whole or in part in any and all forms of media, now or hereafter known) effective if and when the article is accepted for publication thus granting JISCT all rights for the work so that both parties may be protected from the consequences of unauthorized use.