Skip to main content

Towards Self-aware Approach for Mobile Devices Security

  • Conference paper
  • First Online:
Computer Network Security (MMM-ACNS 2017)

Abstract

We present conceptual design of self-aware security for mobile devices. The design is envisioned to bring self-awareness into the mobile devices security for optimal protection by regulating application activities. The proposed design contains three subsystems: meta-level enables self-awareness, extended meta-level extends protections to the base-level components through security mechanisms and base-level comprises of resources that are essential for applications execution. The presented design enables cooperation among security mechanisms (such as access control and anti-virus) as well as with self-aware agent. The cooperation is intended for better understanding of application activities that leads to recognizing threat patterns in advance. When a threat is predicted/detected, the self-aware agent communicates with the security mechanisms so that they can take the necessary actions. The design of the security mechanisms are elaborated using access control system and anti-virus as example cases.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ericsson. Ericsson Mobility Report, November 2016. https://www.ericsson.com/assets/local/mobility-report/documents/2016/ericsson-mobility-report-november-2016.pdf. Accessed 22 Feb 2017

  2. Gartner. Gartner says by 2018, more than 50 percent of users will use a tablet or smartphone first for all online activities (2014). http://www.gartner.com/newsroom/id/2939217. Accessed 22 Feb 2017

  3. International Data Corporation. IDC: Smartphone OS Market Share, Q3 (2016). http://www.idc.com/promo/smartphone-market-share/os. Accessed 22 Feb 2017

  4. Apple Developer. API Reference Apple Developer Documentation. https://developer.apple.com/reference. Accessed 22 Feb 2017

  5. Android Developer. Package Index Android Developers. https://developer.android.com/reference/packages.html. Accessed 22 Feb 2017

  6. Apple. iOS6 Software Update (2012). https://support.apple.com/kb/DL1578?locale=en_US. Accessed 22 Feb 2017

  7. Android. Security Enhancements in Android 6.0. (2016). http://source.android.com/security/enhancements/enhancements60.html. Accessed 22 Feb 2017

  8. Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R.: Xmandroid: a new android evolution to mitigate privilege escalation attacks. Technische Universität Darmstadt, Technical report TR-2011-04 (2011)

    Google Scholar 

  9. Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (TOCS) 32(2), 5 (2014)

    Article  Google Scholar 

  10. Heuser, S., Nadkarni, A., Enck, W., Sadeghi, A.-R.: ASM: a programmable interface for extending android security. In: Proceedings of 23rd USENIX Security Symposium (2014)

    Google Scholar 

  11. Wang, X., Sun, K., Wang, Y., Jing, J.: Deepdroid: dynamically enforcing enterprise policy on android devices. In: Proceedings of 22nd Annual Network and Distributed System Security Symposium (NDSS 2015). The Internet Society (2015)

    Google Scholar 

  12. Conti, M., Crispo, B., Fernandes, E., Zhauniarovich, Y.: Crêpe: a system for enforcing fine-grained context-related policies on android. IEEE Trans. Inf. Forensics Secur. 7(5), 1426–1438 (2012)

    Article  Google Scholar 

  13. Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., Shelby, Z., Gomez, C.: RFC 7668 - IPv6 over BLUETOOTH\(\textregistered \) low energy. https://tools.ietf.org/html/rfc7668. Accessed 23 Feb 2017

  14. Wang, H., Xi, M., Liu, J., Chen, C.: Transmitting IPv6 packets over Bluetooth low energy based on BlueZ. In: 2013 15th International Conference on Advanced Communications Technology (ICACT), PyeongChang, pp. 72–77 (2013)

    Google Scholar 

  15. Andersen, M.P., Fierro, G., Culler, D.E.: System design for a synergistic, low power Mote/BLE embedded platform. In: 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), Vienna, pp. 1–12 (2016)

    Google Scholar 

  16. Skorin-Kapov, L., Pripužić, K., Marjanović, M., Antonić, A., Žarko, I.P.: Energy efficient and quality-driven continuous sensor management for mobile IoT applications. In: 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Miami, FL, pp. 397–406 (2014)

    Google Scholar 

  17. Angelopoulos, C.M., Evangelatos, O., Nikoletseas, S., Raptis, T.P., Rolim, J.D.P., Veroutis, K.: A user-enabled testbed architecture with mobile crowdsensing support for smart, green buildings. In: 2015 IEEE International Conference on Communications (ICC), London, pp. 573–578 (2015)

    Google Scholar 

  18. Zhao, D., Ma, H., Liu, L.: Frugal online incentive mechanisms for mobile crowd sensing. IEEE Trans. Veh. Technol. PP(99), 1 (2016)

    Google Scholar 

  19. Shu, L., Chen, Y., Huo, Z., Bergmann, N., Wang, L.: When mobile crowd sensing meets traditional industry. IEEE Access PP(99), 1 (2017)

    Article  Google Scholar 

  20. Guang, L., Nigussie, E., Rantala, P., Isoaho, J., Tenhunen, H.: Hierarchical agent monitoring design approach towards self-aware parallel systems-on-chip. ACM Trans. Embedded Comput. Syst. (TECS) 9(3), 1–26 (2010)

    Article  Google Scholar 

  21. Isoaho, J., Virtanen, S., Tenhunen, H.: Current challenges in embedded communication systems. In: Innovations in Embedded and Real-Time Systems Engineering for Communication. IGI Global (2012)

    Google Scholar 

  22. Zhou, X., Demetriou, S., He, D., Naveed, M., Pan, X., Wang, X., Gunter, C.A., Nahrstedt, K.: Identity, location, disease and more: inferring your secrets from android public resources. In: 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1017–1028. ACM (2013)

    Google Scholar 

  23. Narain, S., Vo-Huu, T.D., Block, K., Noubir, G.: Inferring user routes and locations using zero-permission mobile sensors. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 397–413. IEEE (2016)

    Google Scholar 

  24. Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 95–109. IEEE (2012)

    Google Scholar 

  25. Avira Holding GmbH. Avira Mobile Security (version 2.1). https://itunes.apple.com/us/app/avira-mobile-security/id692893556. Accessed 28 Feb 2017

  26. NortonMobile. Norton Security & Antivirus (version 3.17.0.3205). https://play.google.com/store/apps/details?id=com.symantec.mobilesecurity. Accessed 28 Feb 2017

  27. Trend Micro Incorporated. Trend Micro Mobile Security (version 5.2.1089). https://itunes.apple.com/us/app/trend-micro-mobile-security/id630442428. Accessed 28 Feb 2017

  28. Avast Software. Mobile Security & Antivirus. https://play.google.com/store/apps/details?id=com.avast.android.mobilesecurity. Accessed 28 Feb 2017

  29. Weyns, D., Malek, S., Andersson, J.: FORMS: unifying reference model for formal specification of distributed self-adaptive systems. ACM Trans. Auton. Adaptive Syst. 7(1), 61 (2012)

    Google Scholar 

  30. Kephart, J.O., Chess, D.M.: The vision of autonomic computing. Computer 36(1), 41–50 (2003)

    Article  MathSciNet  Google Scholar 

  31. Hoffmann, H., Maggio, M., Santambrogio, M.D., Leva, A., Agarwal, A.: SEEC: a framework for self-aware computing (2010)

    Google Scholar 

  32. Bailey, C., Montrieux, L., de Lemos, R., Yu, Y., Wermelinger, M.: Run-time generation, transformation, and verification of access control models for self-protection. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2014), pp. 135–144. ACM (2014)

    Google Scholar 

  33. Guo, D.F., Sui, A.F., Shi, Y.J., Hu, J.J., Lin, G.Z., Guo, T.: Behavior classification based self-learning mobile malware detection. J. Comput. 9(4), 851–858 (2014)

    Article  Google Scholar 

  34. Shabtai, A., Tenenboim-Chekina, L., Mimran, D., Rokach, L., Shapira, B., Elovici, Y.: Mobile malware detection through analysis of deviations in application network behaviour. Comput. Secur. 43, 1–18 (2014)

    Article  Google Scholar 

  35. Li, F., Clarke, N., Papadaki, M., Dowland, P.: Behaviour profiling on mobile devices. In: International Conference on Emerging Security Technologies, Canterbury, pp. 77–82 (2010)

    Google Scholar 

  36. Tong, F., Yan, Z.: A hybrid approach of mobile malware detection in Android. J. Parallel Distrib. Comput. 103, 220–31 (2016)

    Google Scholar 

Download references

Acknowledgement

The authors gratefully acknowledge Tekes (the Finnish Funding Agency for Innovation), DIMECC Oy, and the Cyber Trust research program for their support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nanda Kumar Thanigaivelan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Thanigaivelan, N.K., Nigussie, E., Virtanen, S., Isoaho, J. (2017). Towards Self-aware Approach for Mobile Devices Security. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science(), vol 10446. Springer, Cham. https://doi.org/10.1007/978-3-319-65127-9_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65127-9_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65126-2

  • Online ISBN: 978-3-319-65127-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics