Skip to main content

Online Context-Adaptive Energy-Aware Security Allocation in Mobile Devices: A Tale of Two Algorithms

  • Conference paper
  • First Online:
Distributed Computing and Internet Technology (ICDCIT 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11969))

Abstract

Cryptographic operations involved in securing communications are computationally intensive and contribute to energy drain in mobile devices. Thus, varying the level of security according to the user’s location may provide a convenient solution to energy management. Context-adaptive energy-aware security allocation for mobile devices is modeled in this paper as a combinatorial optimization problem. The goal is to allocate security levels effectively so that user utility is maximized while bounding the maximum energy cost to a constant E. Although the offline version of the problem has been previously studied in the literature where both the security levels and the locations to which a user may travel to is known a priori, this is the first work that formulates and solves an online version of the problem where the locations may be known a priori but the security levels are revealed only upon reaching the locations. We provide two different algorithms for the solution of this online problem by mapping it to the online multi-choice knapsack problem. We study competitive ratios of our two algorithms by comparing the solutions they yield to the optimal solution obtained for the corresponding offline problem. We also present simulation experiments on realistic datasets to validate the scalability and efficiency of our approaches (taking in order of milliseconds for up to 100 locations and providing near-optimal competitive ratios).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abowd, G.D., Dey, A.K., Brown, P.J., Davies, N., Smith, M., Steggles, P.: Towards a better understanding of context and context-awareness. In: Gellersen, H.-W. (ed.) HUC 1999. LNCS, vol. 1707, pp. 304–307. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48157-5_29

    Chapter  Google Scholar 

  2. Al-Turjman, F., Alturjman, S.: Context-sensitive access in industrial internet of things (IIoT) healthcare applications. IEEE Trans. Ind. Inform. 14(6), 2736–2744 (2018)

    Article  Google Scholar 

  3. Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., Möller, S.: On the need for different security methods on mobile phones. In: Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, pp. 465–473. ACM (2011)

    Google Scholar 

  4. Botezatu, N., Manta, V., Stan, A.: Self-adaptability in secure embedded systems: an energy-performance trade-off. In: The 2011 International Conference on Information Security and Internet Engineering, World Congress on Engineering (2011)

    Google Scholar 

  5. Chakrabarty, D., Zhou, Y., Lukose, R.: Online knapsack problems. In: Workshop on Internet and Network Economics (WINE) (2008)

    Google Scholar 

  6. Fischer, G.: Context-aware systems: the ‘right’ information, at the ‘right’ time, in the ‘right’ place, in the ‘right’ way, to the ‘right’ person. In: Proceedings of the International Working Conference on Advanced Visual Interfaces, AVI 2012, pp. 287–294. ACM, New York (2012). https://doi.org/10.1145/2254556.2254611

  7. Ghahramani, M., Zhou, M., Hon, C.T.: Mobile phone data analysis: a spatial exploration toward hotspot detection. IEEE Trans. Autom. Sci. Eng. 16, 351–362 (2018)

    Article  Google Scholar 

  8. Goel, G., Mehta, A.: Online budgeted matching in random input models with applications to adwords. In: Proceedings of the Nineteenth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 982–991. Society for Industrial and Applied Mathematics (2008)

    Google Scholar 

  9. Hager, C.T.: Context aware and adaptive security for wireless networks. Ph.D. thesis, Virginia Polytechnic Institute and State University (2004)

    Google Scholar 

  10. Jameson, A.: Modelling both the context and the user. Pers. Ubiquitous Comput. 5(1), 29–33 (2001). https://doi.org/10.1007/s007790170025, http://dx.doi.org/10.1007/s007790170025

    Article  Google Scholar 

  11. Kellerer, H., Pferschy, U., Pisinger, D.: Knapsack problems 2004 (2003)

    Google Scholar 

  12. Marchetti-Spaccamela, A., Vercellis, C.: Stochastic on-line knapsack problems. Math. Program. 68(1–3), 73–104 (1995)

    MathSciNet  MATH  Google Scholar 

  13. Mehta, A., Saberi, A., Vazirani, U., Vazirani, V.: Adwords and generalized on-line matching. In: 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2005), pp. 264–273. IEEE (2005)

    Google Scholar 

  14. Roy, S., Sankaran, S., Singh, P., Sridhar, R.: Modeling context-adaptive energy-aware security in mobile devices. In: 2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops), pp. 105–109. IEEE (2018)

    Google Scholar 

  15. Sankaran, S.: Lightweight security framework for IoTs using identity based cryptography. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 880–886, September 2016. https://doi.org/10.1109/ICACCI.2016.7732156

  16. Sankaran, S., Sridhar, R.: User-adaptive energy-aware security for mobile devices. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 391–392. IEEE (2013)

    Google Scholar 

  17. Zhou, Y., Chakrabarty, D., Lukose, R.: Budget constrained bidding in keyword auctions and online knapsack problems. In: Papadimitriou, C., Zhang, S. (eds.) WINE 2008. LNCS, vol. 5385, pp. 566–576. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-92185-1_63

    Chapter  Google Scholar 

  18. Zhu, K.: Phone usage pattern as credit card fraud detection trigger, 26 February 2013. US Patent 8,386,386

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ayan Dutta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Asaithambi, A., Dutta, A., Rao, C., Roy, S. (2020). Online Context-Adaptive Energy-Aware Security Allocation in Mobile Devices: A Tale of Two Algorithms. In: Hung, D., D´Souza, M. (eds) Distributed Computing and Internet Technology. ICDCIT 2020. Lecture Notes in Computer Science(), vol 11969. Springer, Cham. https://doi.org/10.1007/978-3-030-36987-3_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-36987-3_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-36986-6

  • Online ISBN: 978-3-030-36987-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics