Adaptive Security Mechanism: a study on the different approaches to mobile devices


Abstract


This article provides an overview of some major works that focus on the use of adaptive security for mobile computing to protect information and data traffic. The limited resources on the mobile device makes security mechanisms implementations very expensive. However, these devises are very attractive to attackers to exploit their weaknesses, launch scanning attacks, and man-in-the-middle attacks to have access to private data of mobile users. To provide security for users of mobile devices, security mechanism with the ability to adapt to various states and situations may be applied such as encryption to increase confidentiality, authentication so that only authorized users or systems have access to its data, and prioritizes ergonomics of the mobile device. For this purpose, mobile features such as CPU, memory, battery, and the environment in which it is connected must be operated by the adaptive security mechanism.

Keywords


Adaptive Security; Mobile Computing; Cryptography; Authentication.

Full Text:

PDF

References


Satyanarayanan, M. (2001). Pervasive computing: Vision and challenges. Personal Communications, IEEE, 8(4), 10-17.

Leeuwen, J. (1990). Handbook of theoretical computer science: algorithms and complexity (Vol. 1). Elsevier.

Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of applied cryptography. CRC press.

Jiang, W., Guo, Z., Ma, Y., & Sang, N. (2013). Measurement-based research on cryptographic algorithms for embedded real-time systems. Journal of Systems Architecture, 59(10), 1394-1404.

Qi, H., & Gani, A. (2012, May). Research on mobile cloud computing: Review, trend and perspectives. In Digital Information and Communication Technology and it's Applications (DICTAP), 2012 Second International Conference on (pp. 195-202). ieee.

Gupta, S. K. S., & Srimani, P. K. (2000). Experience in teaching a graduate course in mobile computing. In Frontiers in Education Conference, 2000. FIE 2000. 30th Annual (Vol. 2, pp. S1C-6). IEEE.

Gartner. Gartner Says Worldwide Traditional PC, Tablet, Ultramobile and Mobile Phone Shipments On Pace to Grow 7.6 Percent in 2014.

Alliance, C. (2012). Security Guidance for Critical Areas of Mobile Computing, V1.0. Cloud Security Alliance.

Pirmez, M., Pirmez, L., da Costa Carmo, L. F. R., Delicato, F. C., Pires, P. F., & de Sousa, E. B. (2008). Prometheus: Um Servio de Segurana Adaptativa. SBSEG2008, Gramado, RS (to appear).

An, G., Bae, G., Kim, K., & Seo, D. (2009, December). Context-aware dynamic security configuration for mobile communication device. In New Technologies, Mobility and Security (NTMS), 2009 3rd International Conference on (pp. 1-5). IEEE.

Cirqueira, A. C., Andrade, R. M., & de Castro, M. F. (2011). Um mecanismo de segurana com adaptao dinmica em tempo de execuo para dispositivos mveis. Seminrio Integrado de Software e Hardware, 1337-1351.

Lee, H., & Chung, M. (2011, October). Context-Aware Security model for Social Network Service. In Broadband and Wireless Computing, Communication and Applications (BWCCA), 2011 International Conference on(pp. 144-151). IEEE.

Moraes, R. U. M. (2014). Ssacc - servio de segurana para autenticao ciente do contexto: para dispositivos mveis no paradigma da computao em nuvem. Masters thesis, UNIVERSIDADE FEDERAL DO MARANHO.

Elgamal, T., & Hickman, K. E. (1998). U.S. Patent No. 5,825,890. Washington, DC: U.S. Patent and Trademark Office.

Kurose , J. F., Ross, K. W., & Marques, A. S. (2003). Redes de Computadores e a Internet: Uma nova abordagem, volume 1. Addison Wesley.

Oreizy, P., Medvidovic, N., & Taylor, R. N. (2008, May). Runtime software adaptation: framework, approaches, and styles. In Companion of the 30th international conference on Software engineering (pp. 899-910). ACM.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2015 Journal of Information Sciences and Computing Technologies

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

 

Copyright © 2014 Journal of Information Sciences and Computing Technologies. All rights reserved.

ISSN: 2394-9066

For any help/support contact us at jiscteditor@scitecresearch.com.