Adaptive Security Mechanism: a study on the different approaches to mobile devices

  • Zair Abdelouahab UFMA, DEINF, Avenida dos Portugueses, s/n, Campus Universitário do Bacanga, CEP 65085-580, São Luís, Maranhão.
  • Cláudio Aroucha UFMA, DEINF, Avenida dos Portugueses, s/n, Campus Universitário do Bacanga, CEP 65085-580, São Luís, Maranhão.
  • Denivaldo Lopes UFMA, DEINF, Avenida dos Portugueses, s/n, Campus Universitário do Bacanga, CEP 65085-580, São Luís, Maranhão.
  • Jonathan Santos UFMA, DEINF, Avenida dos Portugueses, s/n, Campus Universitário do Bacanga, CEP 65085-580, São Luís, Maranhão.
  • Willian Ribeiro UFMA, DEINF, Avenida dos Portugueses, s/n, Campus Universitário do Bacanga, CEP 65085-580, São Luís, Maranhão.
  • Higo Pires UFMA, DEINF, Avenida dos Portugueses, s/n, Campus Universitário do Bacanga, CEP 65085-580, São Luís, Maranhão.
Keywords: Adaptive Security, Mobile Computing, Cryptography, Authentication.

Abstract

This article provides an overview of some major works that focus on the use of adaptive security for mobile computing to protect information and data traffic. The limited resources on the mobile device makes security mechanisms implementations very expensive. However, these devises are very attractive to attackers to exploit their weaknesses, launch scanning attacks, and man-in-the-middle attacks to have access to private data of mobile users. To provide security for users of mobile devices, security mechanism with the ability to adapt to various states and situations may be applied such as encryption to increase confidentiality, authentication so that only authorized users or systems have access to its data, and prioritizes ergonomics of the mobile device. For this purpose, mobile features such as CPU, memory, battery, and the environment in which it is connected must be operated by the adaptive security mechanism.

References

Satyanarayanan, M. (2001). Pervasive computing: Vision and challenges. Personal Communications, IEEE, 8(4), 10-17.

Leeuwen, J. (1990). Handbook of theoretical computer science: algorithms and complexity (Vol. 1). Elsevier.

Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of applied cryptography. CRC press.

Jiang, W., Guo, Z., Ma, Y., & Sang, N. (2013). Measurement-based research on cryptographic algorithms for embedded real-time systems. Journal of Systems Architecture, 59(10), 1394-1404.

Qi, H., & Gani, A. (2012, May). Research on mobile cloud computing: Review, trend and perspectives. In Digital Information and Communication Technology and it's Applications (DICTAP), 2012 Second International Conference on (pp. 195-202). ieee.

Gupta, S. K. S., & Srimani, P. K. (2000). Experience in teaching a graduate course in mobile computing. In Frontiers in Education Conference, 2000. FIE 2000. 30th Annual (Vol. 2, pp. S1C-6). IEEE.

Gartner. Gartner Says Worldwide Traditional PC, Tablet, Ultramobile and Mobile Phone Shipments On Pace to Grow 7.6 Percent in 2014.

Alliance, C. (2012). Security Guidance for Critical Areas of Mobile Computing, V1.0. Cloud Security Alliance.

Pirmez, M., Pirmez, L., da Costa Carmo, L. F. R., Delicato, F. C., Pires, P. F., & de Sousa, E. B. (2008). Prometheus: Um Servio de Segurana Adaptativa. SBSEG2008, Gramado, RS (to appear).

An, G., Bae, G., Kim, K., & Seo, D. (2009, December). Context-aware dynamic security configuration for mobile communication device. In New Technologies, Mobility and Security (NTMS), 2009 3rd International Conference on (pp. 1-5). IEEE.

Cirqueira, A. C., Andrade, R. M., & de Castro, M. F. (2011). Um mecanismo de segurana com adaptao dinmica em tempo de execuo para dispositivos mveis. Seminrio Integrado de Software e Hardware, 1337-1351.

Lee, H., & Chung, M. (2011, October). Context-Aware Security model for Social Network Service. In Broadband and Wireless Computing, Communication and Applications (BWCCA), 2011 International Conference on(pp. 144-151). IEEE.

Moraes, R. U. M. (2014). Ssacc - servio de segurana para autenticao ciente do contexto: para dispositivos mveis no paradigma da computao em nuvem. Masters thesis, UNIVERSIDADE FEDERAL DO MARANHO.

Elgamal, T., & Hickman, K. E. (1998). U.S. Patent No. 5,825,890. Washington, DC: U.S. Patent and Trademark Office.

Kurose , J. F., Ross, K. W., & Marques, A. S. (2003). Redes de Computadores e a Internet: Uma nova abordagem, volume 1. Addison Wesley.

Oreizy, P., Medvidovic, N., & Taylor, R. N. (2008, May). Runtime software adaptation: framework, approaches, and styles. In Companion of the 30th international conference on Software engineering (pp. 899-910). ACM.

Published
2015-02-28
How to Cite
Abdelouahab, Z., Aroucha, Lopes, D., Santos, J., Ribeiro, W., & Pires, H. (2015). Adaptive Security Mechanism: a study on the different approaches to mobile devices. Journal of Information Sciences and Computing Technologies, 2(2), 147-153. Retrieved from http://scitecresearch.com/journals/index.php/jisct/article/view/70
Section
Articles