Abstract
Cryptographic operations involved in securing communications are computationally intensive and contribute to energy drain in mobile devices. Thus, varying the level of security according to the user’s location may provide a convenient solution to energy management. Context-adaptive energy-aware security allocation for mobile devices is modeled in this paper as a combinatorial optimization problem. The goal is to allocate security levels effectively so that user utility is maximized while bounding the maximum energy cost to a constant E. Although the offline version of the problem has been previously studied in the literature where both the security levels and the locations to which a user may travel to is known a priori, this is the first work that formulates and solves an online version of the problem where the locations may be known a priori but the security levels are revealed only upon reaching the locations. We provide two different algorithms for the solution of this online problem by mapping it to the online multi-choice knapsack problem. We study competitive ratios of our two algorithms by comparing the solutions they yield to the optimal solution obtained for the corresponding offline problem. We also present simulation experiments on realistic datasets to validate the scalability and efficiency of our approaches (taking in order of milliseconds for up to 100 locations and providing near-optimal competitive ratios).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Abowd, G.D., Dey, A.K., Brown, P.J., Davies, N., Smith, M., Steggles, P.: Towards a better understanding of context and context-awareness. In: Gellersen, H.-W. (ed.) HUC 1999. LNCS, vol. 1707, pp. 304–307. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48157-5_29
Al-Turjman, F., Alturjman, S.: Context-sensitive access in industrial internet of things (IIoT) healthcare applications. IEEE Trans. Ind. Inform. 14(6), 2736–2744 (2018)
Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., Möller, S.: On the need for different security methods on mobile phones. In: Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, pp. 465–473. ACM (2011)
Botezatu, N., Manta, V., Stan, A.: Self-adaptability in secure embedded systems: an energy-performance trade-off. In: The 2011 International Conference on Information Security and Internet Engineering, World Congress on Engineering (2011)
Chakrabarty, D., Zhou, Y., Lukose, R.: Online knapsack problems. In: Workshop on Internet and Network Economics (WINE) (2008)
Fischer, G.: Context-aware systems: the ‘right’ information, at the ‘right’ time, in the ‘right’ place, in the ‘right’ way, to the ‘right’ person. In: Proceedings of the International Working Conference on Advanced Visual Interfaces, AVI 2012, pp. 287–294. ACM, New York (2012). https://doi.org/10.1145/2254556.2254611
Ghahramani, M., Zhou, M., Hon, C.T.: Mobile phone data analysis: a spatial exploration toward hotspot detection. IEEE Trans. Autom. Sci. Eng. 16, 351–362 (2018)
Goel, G., Mehta, A.: Online budgeted matching in random input models with applications to adwords. In: Proceedings of the Nineteenth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 982–991. Society for Industrial and Applied Mathematics (2008)
Hager, C.T.: Context aware and adaptive security for wireless networks. Ph.D. thesis, Virginia Polytechnic Institute and State University (2004)
Jameson, A.: Modelling both the context and the user. Pers. Ubiquitous Comput. 5(1), 29–33 (2001). https://doi.org/10.1007/s007790170025, http://dx.doi.org/10.1007/s007790170025
Kellerer, H., Pferschy, U., Pisinger, D.: Knapsack problems 2004 (2003)
Marchetti-Spaccamela, A., Vercellis, C.: Stochastic on-line knapsack problems. Math. Program. 68(1–3), 73–104 (1995)
Mehta, A., Saberi, A., Vazirani, U., Vazirani, V.: Adwords and generalized on-line matching. In: 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2005), pp. 264–273. IEEE (2005)
Roy, S., Sankaran, S., Singh, P., Sridhar, R.: Modeling context-adaptive energy-aware security in mobile devices. In: 2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops), pp. 105–109. IEEE (2018)
Sankaran, S.: Lightweight security framework for IoTs using identity based cryptography. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 880–886, September 2016. https://doi.org/10.1109/ICACCI.2016.7732156
Sankaran, S., Sridhar, R.: User-adaptive energy-aware security for mobile devices. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 391–392. IEEE (2013)
Zhou, Y., Chakrabarty, D., Lukose, R.: Budget constrained bidding in keyword auctions and online knapsack problems. In: Papadimitriou, C., Zhang, S. (eds.) WINE 2008. LNCS, vol. 5385, pp. 566–576. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-92185-1_63
Zhu, K.: Phone usage pattern as credit card fraud detection trigger, 26 February 2013. US Patent 8,386,386
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Asaithambi, A., Dutta, A., Rao, C., Roy, S. (2020). Online Context-Adaptive Energy-Aware Security Allocation in Mobile Devices: A Tale of Two Algorithms. In: Hung, D., D´Souza, M. (eds) Distributed Computing and Internet Technology. ICDCIT 2020. Lecture Notes in Computer Science(), vol 11969. Springer, Cham. https://doi.org/10.1007/978-3-030-36987-3_18
Download citation
DOI: https://doi.org/10.1007/978-3-030-36987-3_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-36986-6
Online ISBN: 978-3-030-36987-3
eBook Packages: Computer ScienceComputer Science (R0)