Abstract
Mobile computing has emerged as a pervasive technology that empowers its users with portable computation and context-aware communication. Smart systems and infrastructures can exploit portable and context-aware computing technologies to provide any time, any place digitized services on the go. Despite the offered benefits, such as portability, context-sensitivity, and high connectivity, mobile computing also faces some critical challenges. These challenges include resource poverty as well as data security and privacy that need to be addressed to increase the pervasiveness of mobile systems. We propose to provide a self-protection mechanism for mobile devices against the unforeseen security threats that can attack the critical resources of mobile devices. We have unified the concepts of autonomic computing and computer security to develop a framework that enables adaptive security to dynamically configure the security measures of a mobile device. We have developed a framework - an android-based prototype - that supports automation and user decision to protect the critical hardware and software resources of a device. Evaluation results demonstrate (i) framework’s accuracy for runtime detection and minimization of threats, and (ii) framework’s efficiency for device’s resource utilization.














Similar content being viewed by others
Notes
Android: https://www.android.com/
Google Play: https://play.google.com/
In Fig. 8 we have anonymized the name of the app - used as a case study - that represents a potential security threat to the device resources.
Samsung: https://www.samsung.com/us/mobile/
Amazon DynamoDB: https://aws.amazon.com/dynamodb/
References
Mehmood R, Bhaduri B, Katib I, Chlamtac I (2018) Smart societies, infrastructure, technologies and applications: first international conference, SCITA 2017, Jeddah, Saudi Arabia, November 27–29, 2017, Proceedings, vol 224 Springer
Sajjad M, Abbasi AA, Malik A, Altamimi AB, Alseadoon IM (2018) Classification and mapping of adaptive security for mobile computing. IEEE Trans Emerg Top Comput 1(1):1–1
Protsenko M, Kreuter S, Muller T (2015) Dynamic self-protection and tamperproofing for android apps using native code. In: 2015 10th International conference on availability, reliability and security (ARES), pp 129–138
Security H (2017) Study on mobile device security, Science and Technology Directorate
Kim KI, Hwang HS, Ko HJ, Lee HK, Kim UM (2006) Multi-policy access control considering privacy in ubiquitous environment. In: 2006 international conference on hybrid information technology, vol 1. IEEE, pp 216–222
Muhammed T, Mehmood R, Albeshri A, Katib I (2018) Ubehealth: a personalized ubiquitous cloud and edge-enabled networked healthcare system for smart cities. IEEE Access 6:32258–32285
Penning N, Hoffman M, Nikolai J, Wang Y (2014) Mobile malware security challeges and cloud-based detection. In: 2014 International conference on collaboration technologies and systems (CTS). IEEE, pp 181–188
Alampalayam SP, Kumar A (2003) An adaptive security model for mobile agents in wireless networks. In: Global telecommunications conference, 2003. GLOBECOM ’03, vol 3. IEEE, pp 1516–1521
Anwar Z, Khan WA (2015) Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs. Secur Commun Netw 8(16):2813–2825
Salehie M, Pasquale L, Omoronyia I, Ali R, Nuseibeh B (2012) Requirements-driven adaptive security: protecting variable assets at runtime. In: 2012 20th IEEE international requirements engineering conference (RE), pp 111–120
Garcia M, Llewellyn-Jones D, Ortin F, Merabti M (2012) Applying dynamic separation of aspects to distributed systems security: a case study. Softw IET 6:231–248
An G, Bae G, Kim K, Seo D (2009) Context-aware dynamic security configuration for mobile communication device. In: 2009 3rd International conference on new technologies, mobility and security (NTMS), pp 1–5
Kephart JO, Chess DM (2003) The vision of autonomic computing. Computer 36:41–50
Sajjad M, Abbasi AA, Malik A, Altamimi AB, Alseadoon IM (2018) Classification and mapping of adaptive security for mobile computing. IEEE Trans Emerg Top Comput
Intelligence GSMA (2016) Definitive data and analysis for the mobile industry. http://GSMAintelligence.com
Robbes R, Lanza M (2008) Spyware. In: ACM/IEEE 30th International conference on software engineering, pp 847–850
Satyanarayanan M (2015) A brief history of cloud offload: a personal journey from odyssey through cyber foraging to cloudlets. GetMobile: Mobile Comput Commun 18(4):19–23
Lewis GA, Lago P, Procaccianti G (2014) Architecture strategies for cyber-foraging: preliminary results from a systematic literature review. In: European conference on software architecture. Springer, pp 154–169
Zhang X, Kim G-B, Bae H-Y (2014) An adaptive spatial cloaking method for privacy protection in location-based service. In: 2014 International conference on information and communication technology convergence (ICTC), pp 480–485
Seigneur TEMM (2013) Security adaptation based on autonomic and trust systems for ubiquitous mobile network and green it. In: UBICOMM 2013 : the seventh international conference on mobile ubiquitous computing, systems, services and technologies, IARIA
Martinelli F, Mori P, Quillinan T, Schaefer C (2008) A runtime monitoring environment for mobile java. In: IEEE international conference on software testing verification and validation workshop, 2008. ICSTW ’08, pp 270–278
Yang Z, Lu S, Yang P (2006) Runtime security verification for itinerary-driven mobile agents. In: 2nd IEEE international symposium on dependable, autonomic and secure computing, pp 177–186
Lin H, Yan Z, Fu Y (2019) Adaptive security-related data collection with context awareness. J Netw Comput Appl 126:88–103
Laborde R, Oglaza A, Wazan AS, Barrère F, Benzekri A (2019) A situation-driven framework for dynamic security management. Ann Telecommun 74(3-4):185–196
An G, Bae G, Kim K, Seo D (2009) Context-aware dynamic security configuration for mobile communication device. In: 2009 3rd International conference on new technologies, mobility and Security (NTMS), pp 1–5
Maheshwari S (2018) That game on your phone may be tracking what you’re watching on tv, https://www.nytimes.com/2017/12/28/business/media/alphonso-app-tracking.html
Rocha BPS, Costa DNO, Moreira RA, Rezende CG, Loureiro AAF, Boukerche A (2010) Adaptive security protocol selection for mobile computing. J Netw Comput Appl 33:569–587
Garcia M, Llewellyn-Jones D, Ortin F, Merabti M (2012) Applying dynamic separation of aspects to distributed systems security: a case study. Softw IET 6:231–248
Gilbert P, Chun B-G, Cox LP, Jung J (2011) Vision: automated security validation of mobile apps at app markets. In: Proceedings of the second international workshop on mobile cloud computing and services. ACM, pp 21–26
Dehling T, Gao F, Schneider S, Sunyaev A (2015) Exploring the far side of mobile health: information security and privacy of mobile health apps on ios and android. JMIR mHealth and uHealth, 3(1)
(2016). Xposed - general info, versions & changelog, xda developers
Sable Research Group (2016) Soot: a framework for analyzing and transforming Java and Android applications
Pallapa G, Roy N, Das SK (2008) A scheme for quantizing privacy in context-aware ubiquitous computing. In: IET conference proceedings, pp 32–32
Miller E (1998) An introduction to the resource description framework. Bull Am Soc Inf Sci Technol 25 (1):15–19
Suna A, El Fallah-Seghrouchni A (2005) A mobile agents platform: architecture, mobility and security elements. In: Bordini RH, Dastani M, Dix J, El Fallah Seghrouchni A (eds) Programming multi-agent systems. Springer, Berlin, pp 126–146
Zhao K, Zou D, Jin H, Tian Z, Qiang W, Dai W (2015) Privacy protection for perceptual applications on smartphones. In: 2015 IEEE international conference on mobile services (MS). IEEE, pp 174–181
La Polla M, Martinelli F, Sgandurra D (2013) A survey on security for mobile devices. IEEE Commun Surv Tutorials 15(1):446–471
Wijesekera P, Baokar A, Hosseini A, Egelman S, Wagner D, Beznosov K (2015) Android permissions remystified: a field study on contextual integrity. In: USENIX security symposium, pp 499–514
Maji AK, Arshad FA, Bagchi S, Rellermeyer JS (2012) An empirical study of the robustness of inter-component communication in android. In: 2012 42nd Annual IEEE/IFIP international conference on dependable systems and networks (DSN). IEEE, pp 1–12
Cugola G, Margara A, Migliavacca M (2009) Context-aware publish-subscribe: model, implementation, and evaluation. In: 2009 IEEE symposium on computers and communications, pp 875–881
Onica E, Felber P, Mercier H, Rivière E (2016) Confidentiality-preserving publish/subscribe: a survey. ACM Comput Surv (CSUR) 49(2):27
Jung H-W, Kim S-G, Chung C-S (2004) Measuring software product quality: a survey of iso/iec 9126. IEEE Softw 21(5):88–92
Liu Y, Jin Z, Wang Y (2010) Survey on security scheme and attacking methods of wpa/wpa2. In: 2010 6th international conference on wireless communications networking and mobile computing (wicom). IEEE, pp 1–4
Lashkari AH, Danesh MMS, Samadi B (2009) A survey on wireless security protocols (wep, wpa and wpa2/802.11 i). In: 2nd IEEE International conference on computer science and information technology, 2009. ICCSIT 2009. IEEE, pp 48–52
Acknowledgments
This research is funded by the Deanship of Scientific Research at the University of Ha’il, Saudi Arabia under the grant number ‘160595’ (Project Code: 160595)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ahmad, A., Malik, A.W., Alreshidi, A. et al. Adaptive Security for Self-Protection of Mobile Computing Devices. Mobile Netw Appl 28, 653–672 (2023). https://doi.org/10.1007/s11036-019-01355-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-019-01355-y