Adaptive Security Mechanism: a study on the different approaches to mobile devices

  • Zair Abdelouahab UFMA, DEINF, Avenida dos Portugueses, s/n, Campus Universitario do Bacanga, CEP 65085-580, Sao Luis, Maranhao, Brazil
  • Claudio Aroucha UFMA, DEINF, Avenida dos Portugueses, s/n, Campus Universitario do Bacanga, CEP 65085-580, Sao Luis, Maranhao, Brazil
  • Denivaldo Lopes UFMA, DEINF, Avenida dos Portugueses, s/n, Campus Universitario do Bacanga, CEP 65085-580, Sao Luis, Maranhao, Brazil
  • Jonathan Santos UFMA, DEINF, Avenida dos Portugueses, s/n, Campus Universitario do Bacanga, CEP 65085-580, Sao Luis, Maranhao, Brazil
  • Willian Ribeiro UFMA, DEINF, Avenida dos Portugueses, s/n, Campus Universitario do Bacanga, CEP 65085-580, Sao Luis, Maranhao, Brazil
  • Higo Pires UFMA, DEINF, Avenida dos Portugueses, s/n, Campus Universitario do Bacanga, CEP 65085-580, Sao Luis, Maranhao, Brazil
Keywords: Adaptive Security, Mobile Computing, Cryptography, Authentication.

Abstract

This article provides an overview of some major works that focus on the use of adaptive security for mobile computing to protect information and data traffic. The limited resources on the mobile device makes security mechanisms implementations very expensive. However, these devises are very attractive to attackers to exploit their weaknesses, launch scanning attacks, and man-in-the-middle attacks to have access to private data of mobile users. To provide security for users of mobile devices, security mechanism with the ability to adapt to various states and situations may be applied such as encryption to increase confidentiality, authentication so that only authorized users or systems have access to its data, and prioritizes ergonomics of the mobile device. For this purpose, mobile features such as CPU, memory, battery, and the environment in which it is connected must be operated by the adaptive security mechanism.

Downloads

Download data is not yet available.

References

Satyanarayanan, M. (2001). Pervasive computing: Vision and challenges. Personal Communications, IEEE, 8(4), 10-17.

Leeuwen, J. (1990). Handbook of theoretical computer science: algorithms and complexity (Vol. 1). Elsevier.

Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of applied cryptography. CRC press.

Jiang, W., Guo, Z., Ma, Y., & Sang, N. (2013). Measurement-based research on cryptographic algorithms for embedded real-time systems. Journal of Systems Architecture, 59(10), 1394-1404.

Qi, H., & Gani, A. (2012, May). Research on mobile cloud computing: Review, trend and perspectives. In Digital Information and Communication Technology and it's Applications (DICTAP), 2012 Second International Conference on (pp. 195-202). ieee.

Gupta, S. K. S., & Srimani, P. K. (2000). Experience in teaching a graduate course in mobile computing. In Frontiers in Education Conference, 2000. FIE 2000. 30th Annual (Vol. 2, pp. S1C-6). IEEE.

Gartner. “Gartner Says Worldwide Traditional PC, Tablet, Ultramobile and Mobile Phone Shipments On Pace to Grow 7.6 Percent in 2014”.

Alliance, C. (2012). Security Guidance for Critical Areas of Mobile Computing, V1.0. Cloud Security Alliance.

Pirmez, M., Pirmez, L., da Costa Carmo, L. F. R., Delicato, F. C., Pires, P. F., & de Sousa, E. B. (2008). Prometheus: Um Serviço de Segurança Adaptativa. SBSEG2008, Gramado, RS (to appear).

An, G., Bae, G., Kim, K., & Seo, D. (2009, December). Context-aware dynamic security configuration for mobile communication device. In New Technologies, Mobility and Security (NTMS), 2009 3rd International Conference on (pp. 1-5). IEEE.

Cirqueira, A. C., Andrade, R. M., & de Castro, M. F. (2011). Um mecanismo de seguranca com adaptacao dinamica em tempo de execucao para dispositivos moveis. Seminario Integrado de Software e Hardware, 1337-1351.

Lee, H., & Chung, M. (2011, October). Context-Aware Security model for Social Network Service. In Broadband and Wireless Computing, Communication and Applications (BWCCA), 2011 International Conference on(pp. 144-151). IEEE.

Moraes, R. U. M. (2014). Ssacc - servico de seguranca para autenticacao ciente do contexto: para dispositivos moveis no paradigma da computacao em nuvem. Master’s thesis, UNIVERSIDADE FEDERAL DO MARANHAO.

Elgamal, T., & Hickman, K. E. (1998). U.S. Patent No. 5,825,890. Washington, DC: U.S. Patent and Trademark Office.

Kurose , J. F., Ross, K. W., & Marques, A. S. (2003). Redes de Computadores e a Internet: Uma nova abordagem, volume 1. Addison Wesley.

Oreizy, P., Medvidovic, N., & Taylor, R. N. (2008, May). Runtime software adaptation: framework, approaches, and styles. In Companion of the 30th international conference on Software engineering (pp. 899-910). ACM.

Published
2015-02-28
How to Cite
Abdelouahab, Z., Aroucha, C., Lopes, D., Santos, J., Ribeiro, W., & Pires, H. (2015). Adaptive Security Mechanism: a study on the different approaches to mobile devices. Journal of Information Sciences and Computing Technologies, 2(2), 147-153. Retrieved from http://scitecresearch.com/journals/index.php/jisct/article/view/70
Section
Articles