Skip to main content

InfoSec-MobCop – Framework for Theft Detection and Data Security on Mobile Computing Devices

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 40))

Abstract

People steal mobile devices with the intention of making money either by selling the mobile or by taking the sensitive information stored inside it. Mobile thefts are rising even with existing deterrents in place. This is because; they are ineffective, as they generate unnecessary alerts and might require expensive hardware equipments. In this paper a novel framework termed as InfoSec-MobCop is proposed which secures a mobile user’s data and discovers theft by detecting any anomaly in the user behavior. The anomaly of the user is computed by extracting and monitoring user specific details (typing pattern and usage history). The result of any intrusion attempt by a masquerader is intimated to the service provider through an SMS. Effectiveness of the used approach is discussed using FAR and FRR graphs. The experimental system uses both real users and simulated studies to quantify the effectiveness of the InfoSec-MobCop (Information Security Mobile Cop).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. World Telecommunication /ICT Indicator Database, 12th edn. (2008)

    Google Scholar 

  2. Harrington, V., Mathew, P.: Mobile Phone Theft. Home Office Research Study 235, 58–59 (2001)

    Google Scholar 

  3. Snelick, R., Uludag, U., Mink, A., Indovina, M., Jain, A.: Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems. IEEE Transactions on Pattern Analysis and Machine Intelligence (2005)

    Google Scholar 

  4. Spiel Studios. Spiel Studios & BPL Mobile release MobileTracker. Press Release (August 2007)

    Google Scholar 

  5. Micro Technologies. Micro Technologies to offer Mobile Security to 2 million MTNL subscribers. Press Release (April 2008)

    Google Scholar 

  6. Innova Technologies. Mumbai IT firm introduces low-cost mobile security software. Press Release (June 2007)

    Google Scholar 

  7. Zhuang, L., Zhou, F., Tygar, J.D.: Keyboard Acoustic Emanations Revisited. In: 12th ACM Conference on Computer and Communications Security (2005)

    Google Scholar 

  8. Silfverberg, M., Scott MacKenzie, I., Korhonen, P.: Predicting Text Entry Speed on Mobile Phones. In: CHI (April 2000)

    Google Scholar 

  9. Monrose, F., Reiter, M.K., Wetzel, S.: Password hardening based on keystroke dynamics. In: Proceedings of the 6th ACM conference on Computer and communications security, pp. 73–82. ACM Press, New York (1999)

    Google Scholar 

  10. Lau, E., et al.: Enhanced user authentication through keystroke biometrics. 6.857 Computer and Network Security final project report (2004)

    Google Scholar 

  11. Nicholson, A.J., Corner, M.D., Noble, B.D.: Mobile Device Security Using Transient Authentication. IEEE Transactions on Mobile Computing (2006)

    Google Scholar 

  12. Mazhelis, O.: Masquerader Detection in Mobile Context based on Behaviour and Environment Modelling, Jyvaskyla (2007)

    Google Scholar 

  13. Bhukya, W.N., Suresh Kumar, G., Negi, A.: A study of effective-ness in masquerade detection. IEEE, Los Alamitos (2006)

    Google Scholar 

  14. Saleem, A., Al-Akaidi, M.: Security system based on fingerprint ID for mobile phone. In: 6th Middle East Simulation Multiconference, pp. 97–101 (2004)

    Google Scholar 

  15. Biddlecombe, E.: Crimes of fashion [mobile phone theft]. Communications International, pp. 38–39, 41, 43 (May 2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gupta, A., Gupta, D., Gupta, N. (2009). InfoSec-MobCop – Framework for Theft Detection and Data Security on Mobile Computing Devices. In: Ranka, S., et al. Contemporary Computing. IC3 2009. Communications in Computer and Information Science, vol 40. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03547-0_60

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03547-0_60

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03546-3

  • Online ISBN: 978-3-642-03547-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics