Abstract
People steal mobile devices with the intention of making money either by selling the mobile or by taking the sensitive information stored inside it. Mobile thefts are rising even with existing deterrents in place. This is because; they are ineffective, as they generate unnecessary alerts and might require expensive hardware equipments. In this paper a novel framework termed as InfoSec-MobCop is proposed which secures a mobile user’s data and discovers theft by detecting any anomaly in the user behavior. The anomaly of the user is computed by extracting and monitoring user specific details (typing pattern and usage history). The result of any intrusion attempt by a masquerader is intimated to the service provider through an SMS. Effectiveness of the used approach is discussed using FAR and FRR graphs. The experimental system uses both real users and simulated studies to quantify the effectiveness of the InfoSec-MobCop (Information Security Mobile Cop).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
World Telecommunication /ICT Indicator Database, 12th edn. (2008)
Harrington, V., Mathew, P.: Mobile Phone Theft. Home Office Research Study 235, 58–59 (2001)
Snelick, R., Uludag, U., Mink, A., Indovina, M., Jain, A.: Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems. IEEE Transactions on Pattern Analysis and Machine Intelligence (2005)
Spiel Studios. Spiel Studios & BPL Mobile release MobileTracker. Press Release (August 2007)
Micro Technologies. Micro Technologies to offer Mobile Security to 2 million MTNL subscribers. Press Release (April 2008)
Innova Technologies. Mumbai IT firm introduces low-cost mobile security software. Press Release (June 2007)
Zhuang, L., Zhou, F., Tygar, J.D.: Keyboard Acoustic Emanations Revisited. In: 12th ACM Conference on Computer and Communications Security (2005)
Silfverberg, M., Scott MacKenzie, I., Korhonen, P.: Predicting Text Entry Speed on Mobile Phones. In: CHI (April 2000)
Monrose, F., Reiter, M.K., Wetzel, S.: Password hardening based on keystroke dynamics. In: Proceedings of the 6th ACM conference on Computer and communications security, pp. 73–82. ACM Press, New York (1999)
Lau, E., et al.: Enhanced user authentication through keystroke biometrics. 6.857 Computer and Network Security final project report (2004)
Nicholson, A.J., Corner, M.D., Noble, B.D.: Mobile Device Security Using Transient Authentication. IEEE Transactions on Mobile Computing (2006)
Mazhelis, O.: Masquerader Detection in Mobile Context based on Behaviour and Environment Modelling, Jyvaskyla (2007)
Bhukya, W.N., Suresh Kumar, G., Negi, A.: A study of effective-ness in masquerade detection. IEEE, Los Alamitos (2006)
Saleem, A., Al-Akaidi, M.: Security system based on fingerprint ID for mobile phone. In: 6th Middle East Simulation Multiconference, pp. 97–101 (2004)
Biddlecombe, E.: Crimes of fashion [mobile phone theft]. Communications International, pp. 38–39, 41, 43 (May 2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gupta, A., Gupta, D., Gupta, N. (2009). InfoSec-MobCop – Framework for Theft Detection and Data Security on Mobile Computing Devices. In: Ranka, S., et al. Contemporary Computing. IC3 2009. Communications in Computer and Information Science, vol 40. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03547-0_60
Download citation
DOI: https://doi.org/10.1007/978-3-642-03547-0_60
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03546-3
Online ISBN: 978-3-642-03547-0
eBook Packages: Computer ScienceComputer Science (R0)