Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2009.16C.6.691

Design and Implementation of Security Reconfiguration for Effective Security Management of Mobile Communication Device  

An, Gae-Il (한국전자통신연구원 인프라보호연구팀)
Kim, Ki-Young (한국전자통신연구원 인프라보호연구팀)
Seo, Dong-Il (한국전자통신연구원 인프라보호연구팀)
Abstract
A mobile communication device is a small size of portable computer which provides communication service, such as smart phone and PDA. Currently, one of the biggest barriers in developing the mobile communication device is security issue. Even though there are excellent security functions which can remove the security issues, there is a problem that the mobile communication device can not be loaded with all the functions because it has low storage, poor computational power, and inconvenient user interface, compared to the desktop personal computer. This paper proposes a context-aware security reconfiguration scheme for effective security management of the mobile communication device. The scheme can provide the mobile communication device with the optimized security service which is most adapted to its current security context. Through the prototype implementation and the experiments of the proposed scheme, we have confirmed that the proposed scheme is excellent in terms of computing resource efficiency and usability, without degrading security level.
Keywords
Device Security; Security Management; Mobile Communication Device; Security Context; Security Reconfiguration;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Ko, S., Ji, Y., Kim, D.: Understanding Influence of Mobile Internet Services on Life Behavior of Mobile Users. In Proc. of Human-Computer Interaction, LNCS, vol. LNCS 4553, pp. 944-953 (2007)   DOI   ScienceOn
2 Jamaluddin, J., Zotou, N., Edwards, R.: Mobile phone vulnerabilities: a new generation of malware. In Proc. of IEEE International Symposium on Consumer Electronics, pp. 199-202 (2004)
3 Schilit, B. N. Adams, N., Want, R.: Context-Aware Computing Applications. In Proc. of IEEE Workshop Mobile Computing Systems and Applications, pp.85-90, (1994)   DOI
4 Chen, G. & Kotz, D. A Survey of Context-Aware Mobile Computing Research. Dartmouth Computer Science Technical Report, TR2000-381 (2000)
5 Han, L., Jyri, S., Ma, J., Yu, K.: Research on Context-Aware Mobile Computing. In Proc. of 22nd International Conference on Advanced Information Networking and Applications, pp. 24-30 (2008)   DOI
6 Dey, A. K., Abowd, G. D.: Towards a Better Understanding of Context and Context-Awareness. In Proc. of the workshop on the What, Who, Where, When and How of Context-Awareness (2000)   DOI
7 Mulliner, C., Vigna, G., Dagon, D., Lee, W.: Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. In Proc. of SIG SIDAR Conf. on Detection of Intrusions and Malware & Vulnerability Assessment, LNCS, Vol.4064, pp. 91-108, (2006)   DOI   ScienceOn
8 Nash, D. C., Martin, T. L., Ha, D. S., Hsiao, M. S.: Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices. In Proc. of the 3rd Int'l Conf. on Pervasive Computing and Communications Workshops, pp.141-145, (2005)
9 Martin, T., Hsiao, M., Ha, D., Krishnaswami, J.: Denial-of-Service Attacks on Battery-powered Mobile Computers. In Proc. of the 2th IEEE Annual Conf. on Pervasive Computing and Communications, pp.309-318 (2004)
10 Jacoby, G. A., Davis IV, N. J.: Battery-Based Intrusion Detection. In Proc. of Globecom 2004, pp. 2250-2255 (2004)