The security challenges for mobile ubiquitous services

https://doi.org/10.1016/j.istr.2007.05.001Get rights and content

Abstract

It is envisaged that in future mobile ubiquitous environments, users will be able to seamlessly, search, access and consume a rich offering of services and content from an array of Service/Content Providers, whilst they are on the move, anytime, anywhere. Unfortunately, this new computing paradigm also brings along new and unique security challenges. Novel security solutions are therefore required. But, in order for appropriate security solutions to be devised, all possible security threats must first be thoroughly analysed, and the corresponding security requirements be identified. In this paper, we examine the security issues germane to a mobile ubiquitous environment. We then suggest some possible solutions which may be employed to address these security issues. Open research issues are also highlighted.

Introduction

The vision of mobile ubiquitous access/service is fast becoming a reality. This can be attributed to advances in various wireless networking access technologies (such as Bluetooth, WiFi, WiMAX, UWB), coupled with the increasing computation and communication capability of mobile devices. Apart from innovations in network technologies and mobile applications, good and sound security solutions are also crucial and critical for widespread adoption of such services.

In the Mobile VCE project on ubiquitous services, it is envisaged that users (via their mobile devices and some network access technologies) are able to seamlessly discover, and access a rich offering of services and content from a wide choice of service and content providers (as shown in Fig. 1).

As can be seen from Fig. 1, there are three key perspectives to a mobile ubiquitous environment, namely: User, Network and Service/Content Provider. This paper aims to address the ubiquitous services security issues arising from these three perspectives. We briefly introduce each of the perspectives in the following sub-sections.

From the User Perspective, the fundamental requirement is a user setup that ensures simplicity and consistent service access. The Internet today comprises widely of diverse heterogeneous networks, with very different and varying capabilities (bandwidth, interface speed, edge-to-edge latency and connection type). Also, the usage of laptops, palmtops and mobiles has increased and so has the variety of operating systems. This has lead to a large diversity in end system capabilities. This diversity, combined with the huge amounts of information and services available via these technologies, results in an undesirable level of complexity. Inevitably, in this new environment, users are more vulnerable to being exposed to a variety of security threats and various forms of attacks. It is therefore imperative that the security and privacy of users are protected and not compromised.

From the Network Perspective, the support for Security, Quality of Service (QoS) and Mobility in various participating networks is a key factor in providing an acceptable level of network performance. Heterogeneity has made the co-operation among “Security, QoS, Mobility Management” a complex issue. A common network framework is thus required to integrate Security, QoS and Mobility functions efficiently. The network components incorporating these functionalities, “Security, QoS, Mobility Management”, are also referred to as ‘enhanced nodes’. For example, in Hierarchical Mobile IPv6, the Mobility Anchor Points (MAPs) can act as enhanced nodes.

From the content and service provider perspective, multiple co-operative networks promise the possibility of a range of new ‘ubiquitous services’, including context-aware services. Particularly, the need for content and service providers to support multimedia applications over a range of eligible access network technologies (including ad hoc), each with its own capabilities represent a key challenge to service delivery. In this perspective, security is also important so as to protect the interests of the Service/Content Provider from malicious users and other adversaries.

Section snippets

A ubiquitous services scenario

We now describe a simple ubiquitous services scenario, showing how, a ubiquitous services user/consumer, Jose, is able to receive some digital content while he is on the move. This scenario serves to illustrate the ubiquitous service security threats and requirements.

The sequences of events are as follows (also depicted in Fig. 2):

  • Liverpool (The Reds) and AC Milan are playing in the finals of the 2007 UEFA Champions League.

Security threats

In this section, we separately identify and examine the security threats from each of the three aforementioned perspectives of a mobile ubiquitous environment, namely, the User Perspective, the Network Perspective, and the Service/Content Provider Perspective. To better illustrate the cause and effect of these security threats, they will also be discussed, whenever possible, in relation to the ubiquitous services scenario described in Section 2.

Security requirements

Based on the threat analysis in Section 3, a corresponding set of ubiquitous services security requirements is derived. We first identify the general security requirements, followed by some specific security requirements for the User and Service provider perspective, and for the Network Perspective.

Trusted Computing

Trusted Computing has some interesting security functionalities which may be used to address some of the aforementioned security issues.

Developed by the Trusted Computing Group4 (TCG), Trusted Computing (TC) is a new technology that aims to enhance the security of computing platforms in increasingly ubiquitous and heterogeneous environments. This objective is realised through the incorporation of trusted hardware functionality, by means of a special

Privacy preserving (anonymous) authentication

Authentication is an important security requirement, which conventionally requires the identity of a user (or some other identifying information) to be authenticated to a verifier. On the other hand, users and consumers are becoming increasingly concerned about their privacy (Berendt et al., 2005), and the risks (such as identity theft) of leaving any form of digital trail, when making electronic transactions. Hence, given a choice, users may well prefer to interact with service providers

Conclusion

>In the context of a mobile ubiquitous environment, we studied various security threats that are posed to the User, Network, and Service/Content Provider. We also identified a set of security requirements to mitigate these threats. We then suggested some possible solutions, followed by a discussion on the various open issues that are not adequately addressed by current solutions.

The work in this paper showed that many of the security threats in the ubiquitous environment can occur in more than

Acknowledgment

The work reported in this paper has formed part of the Ubiquitous Services Core Research Programme of the Virtual Centre of Excellence in Mobile & Personal Communications, Mobile VCE, www.mobilevce.com. This research has been funded by the DTI-led Technology Programme and by the Industrial Companies who are members of Mobile VCE. Fully detailed technical reports on this research are available to Industrial Members of Mobile VCE.

References (31)

  • Arkko J, Devarapalli V, Dupont F. Using IPSec to protect Mobile IPv6 signaling between mobile nodes and home agents....
  • B. Balacheff et al.

    Trusted computing platforms: TCPA technology in context

    (2003)
  • Baugher M, Canetti R, Dondeti L, Lindholm F. Multicast Security (MSEC) group key management architecture. RFC 4046;...
  • B. Berendt et al.

    Privacy in e-commerce: stated preferences vs. actual behaviour

    Commun. ACM

    (2005)
  • Calhoun P, Loughney J, Guttman E, Zorn G, Arkko J. Diameter base protocol. RFC 3588; Sep....
  • De Laat C, Gross G, Gommans L, Vollbrecht J, Spence D. Generic AAA architecture. RFC 2903; Aug....
  • Devarapalli V, Dupont F. Mobile IPv6 operation with IKEv2 and the revised IPSec architecture. RFC 4877; April...
  • P. Engelstad et al.

    Authenticated access for IPv6 supported mobility

  • Hardjono T, Weis B. The multicast group security architecture. RFC 3740; Mar....
  • Hoffman P. Cryptographic suites for IPsec. RFC 4308; Dec....
  • Holbrook H, Cain B. Source-specific multicast for IP. RFC 4607; Aug....
  • Hyun-Sun Kang et al.

    A key management scheme for secure Mobile IP registration based on AAA protocol

    IEICE Trans. Fund.

    (June 2006)
  • Karygiannis T, Owens L. Wireless network security: 802.11, bluetooth and handheld devices. In: National institute of...
  • Kaufman C. Internet Key Exchange (IKEv2) protocol. RFC 4306; Dec....
  • Kent S. IP Encapsulating Security Payload (ESP). RFC 4303; Dec....
  • Cited by (23)

    • Playing with multiple wearable devices: Exploring the influence of display, motion and gender

      2015, Computers in Human Behavior
      Citation Excerpt :

      Jeong and Fishbein (2007) identify information processing and enjoyment experience as two types of needs in the context of media multitasking. Leung, Sheng, and Cruickshank (2007) summarize four types of needs in the context of user-generated content on the Internet: cognitive needs, social needs, recognition needs and entertainment needs. Zhang and Zhang (2012) focus on the scenario of multitasking with computers and provide a summary of three groups of needs: convenient/easy/instant; control/habitual; and social/affective/relaxation.

    • Prevention of wormhole attacks in mobile commerce based on non-infrastructure wireless networks

      2011, Electronic Commerce Research and Applications
      Citation Excerpt :

      It is clear that traditional security techniques cannot be directly applied to the mobile commerce system (Galanxhi-Janaqi and Nah 2004). Therefore, several mechanisms have been developed to satisfy vital security requirements for mobile commerce (Kadhiwal and Zulfiquar 2007, Leung et al. 2007), such as authentication, authorization, availability, confidentiality, integrity, and non-repudiation (Lin and Chang 2007, Hwang et al. 2007, Hassinen et al. 2008). Several studies (Hu et al. 2003, 2005, 2006; A´cs et al. 2006; Nait-Abdesselam et al. 2008; Burmester and Medeiros 2009) have dealt with the serious danger posed by the wormhole attack, which is aimed at damaging the routing function of wireless networks, especially non-infrastructure wireless networks.

    • Multitasking with Intelligent Assistant: Effects of Task Relevance and Interruption Mode

      2022, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    View all citing articles on Scopus
    1

    This author is supported by the British Chevening/Royal Holloway Scholarship.

    View full text