Abstract
We present conceptual design of self-aware security for mobile devices. The design is envisioned to bring self-awareness into the mobile devices security for optimal protection by regulating application activities. The proposed design contains three subsystems: meta-level enables self-awareness, extended meta-level extends protections to the base-level components through security mechanisms and base-level comprises of resources that are essential for applications execution. The presented design enables cooperation among security mechanisms (such as access control and anti-virus) as well as with self-aware agent. The cooperation is intended for better understanding of application activities that leads to recognizing threat patterns in advance. When a threat is predicted/detected, the self-aware agent communicates with the security mechanisms so that they can take the necessary actions. The design of the security mechanisms are elaborated using access control system and anti-virus as example cases.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ericsson. Ericsson Mobility Report, November 2016. https://www.ericsson.com/assets/local/mobility-report/documents/2016/ericsson-mobility-report-november-2016.pdf. Accessed 22 Feb 2017
Gartner. Gartner says by 2018, more than 50 percent of users will use a tablet or smartphone first for all online activities (2014). http://www.gartner.com/newsroom/id/2939217. Accessed 22 Feb 2017
International Data Corporation. IDC: Smartphone OS Market Share, Q3 (2016). http://www.idc.com/promo/smartphone-market-share/os. Accessed 22 Feb 2017
Apple Developer. API Reference Apple Developer Documentation. https://developer.apple.com/reference. Accessed 22 Feb 2017
Android Developer. Package Index Android Developers. https://developer.android.com/reference/packages.html. Accessed 22 Feb 2017
Apple. iOS6 Software Update (2012). https://support.apple.com/kb/DL1578?locale=en_US. Accessed 22 Feb 2017
Android. Security Enhancements in Android 6.0. (2016). http://source.android.com/security/enhancements/enhancements60.html. Accessed 22 Feb 2017
Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R.: Xmandroid: a new android evolution to mitigate privilege escalation attacks. Technische Universität Darmstadt, Technical report TR-2011-04 (2011)
Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (TOCS) 32(2), 5 (2014)
Heuser, S., Nadkarni, A., Enck, W., Sadeghi, A.-R.: ASM: a programmable interface for extending android security. In: Proceedings of 23rd USENIX Security Symposium (2014)
Wang, X., Sun, K., Wang, Y., Jing, J.: Deepdroid: dynamically enforcing enterprise policy on android devices. In: Proceedings of 22nd Annual Network and Distributed System Security Symposium (NDSS 2015). The Internet Society (2015)
Conti, M., Crispo, B., Fernandes, E., Zhauniarovich, Y.: Crêpe: a system for enforcing fine-grained context-related policies on android. IEEE Trans. Inf. Forensics Secur. 7(5), 1426–1438 (2012)
Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., Shelby, Z., Gomez, C.: RFC 7668 - IPv6 over BLUETOOTH\(\textregistered \) low energy. https://tools.ietf.org/html/rfc7668. Accessed 23 Feb 2017
Wang, H., Xi, M., Liu, J., Chen, C.: Transmitting IPv6 packets over Bluetooth low energy based on BlueZ. In: 2013 15th International Conference on Advanced Communications Technology (ICACT), PyeongChang, pp. 72–77 (2013)
Andersen, M.P., Fierro, G., Culler, D.E.: System design for a synergistic, low power Mote/BLE embedded platform. In: 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), Vienna, pp. 1–12 (2016)
Skorin-Kapov, L., Pripužić, K., Marjanović, M., Antonić, A., Žarko, I.P.: Energy efficient and quality-driven continuous sensor management for mobile IoT applications. In: 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Miami, FL, pp. 397–406 (2014)
Angelopoulos, C.M., Evangelatos, O., Nikoletseas, S., Raptis, T.P., Rolim, J.D.P., Veroutis, K.: A user-enabled testbed architecture with mobile crowdsensing support for smart, green buildings. In: 2015 IEEE International Conference on Communications (ICC), London, pp. 573–578 (2015)
Zhao, D., Ma, H., Liu, L.: Frugal online incentive mechanisms for mobile crowd sensing. IEEE Trans. Veh. Technol. PP(99), 1 (2016)
Shu, L., Chen, Y., Huo, Z., Bergmann, N., Wang, L.: When mobile crowd sensing meets traditional industry. IEEE Access PP(99), 1 (2017)
Guang, L., Nigussie, E., Rantala, P., Isoaho, J., Tenhunen, H.: Hierarchical agent monitoring design approach towards self-aware parallel systems-on-chip. ACM Trans. Embedded Comput. Syst. (TECS) 9(3), 1–26 (2010)
Isoaho, J., Virtanen, S., Tenhunen, H.: Current challenges in embedded communication systems. In: Innovations in Embedded and Real-Time Systems Engineering for Communication. IGI Global (2012)
Zhou, X., Demetriou, S., He, D., Naveed, M., Pan, X., Wang, X., Gunter, C.A., Nahrstedt, K.: Identity, location, disease and more: inferring your secrets from android public resources. In: 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1017–1028. ACM (2013)
Narain, S., Vo-Huu, T.D., Block, K., Noubir, G.: Inferring user routes and locations using zero-permission mobile sensors. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 397–413. IEEE (2016)
Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 95–109. IEEE (2012)
Avira Holding GmbH. Avira Mobile Security (version 2.1). https://itunes.apple.com/us/app/avira-mobile-security/id692893556. Accessed 28 Feb 2017
NortonMobile. Norton Security & Antivirus (version 3.17.0.3205). https://play.google.com/store/apps/details?id=com.symantec.mobilesecurity. Accessed 28 Feb 2017
Trend Micro Incorporated. Trend Micro Mobile Security (version 5.2.1089). https://itunes.apple.com/us/app/trend-micro-mobile-security/id630442428. Accessed 28 Feb 2017
Avast Software. Mobile Security & Antivirus. https://play.google.com/store/apps/details?id=com.avast.android.mobilesecurity. Accessed 28 Feb 2017
Weyns, D., Malek, S., Andersson, J.: FORMS: unifying reference model for formal specification of distributed self-adaptive systems. ACM Trans. Auton. Adaptive Syst. 7(1), 61 (2012)
Kephart, J.O., Chess, D.M.: The vision of autonomic computing. Computer 36(1), 41–50 (2003)
Hoffmann, H., Maggio, M., Santambrogio, M.D., Leva, A., Agarwal, A.: SEEC: a framework for self-aware computing (2010)
Bailey, C., Montrieux, L., de Lemos, R., Yu, Y., Wermelinger, M.: Run-time generation, transformation, and verification of access control models for self-protection. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2014), pp. 135–144. ACM (2014)
Guo, D.F., Sui, A.F., Shi, Y.J., Hu, J.J., Lin, G.Z., Guo, T.: Behavior classification based self-learning mobile malware detection. J. Comput. 9(4), 851–858 (2014)
Shabtai, A., Tenenboim-Chekina, L., Mimran, D., Rokach, L., Shapira, B., Elovici, Y.: Mobile malware detection through analysis of deviations in application network behaviour. Comput. Secur. 43, 1–18 (2014)
Li, F., Clarke, N., Papadaki, M., Dowland, P.: Behaviour profiling on mobile devices. In: International Conference on Emerging Security Technologies, Canterbury, pp. 77–82 (2010)
Tong, F., Yan, Z.: A hybrid approach of mobile malware detection in Android. J. Parallel Distrib. Comput. 103, 220–31 (2016)
Acknowledgement
The authors gratefully acknowledge Tekes (the Finnish Funding Agency for Innovation), DIMECC Oy, and the Cyber Trust research program for their support.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Thanigaivelan, N.K., Nigussie, E., Virtanen, S., Isoaho, J. (2017). Towards Self-aware Approach for Mobile Devices Security. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science(), vol 10446. Springer, Cham. https://doi.org/10.1007/978-3-319-65127-9_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-65127-9_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65126-2
Online ISBN: 978-3-319-65127-9
eBook Packages: Computer ScienceComputer Science (R0)