The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile devices are becoming targets for hackers and malicious users due to the multifold increase in its capabilities and usage. Security threats are more prominent in mobile payment and mobile banking applications (MBAs). As these MBAs, store, transmit and access sensitive and confidential information, so utmost priority should be given to secure MBAs. In this paper, we have analyzed MBAs of several...
Nowadays, touchscreen mobile devices make up a larger share in the market. Users often use these devices to store personal and sensitive data. This necessitate to find more effective and robust methods to continuously authenticate touch-based mobile device users. In this paper, we propose two levels of behavioral touch features that can be extracted from raw touchscreen logs and demonstrate that different...
Mobile money is an upshot of the conventional banking system that creates an opportunity for the financially excluded group of people. It allows the unbanked in the rural areas and the underbanked in the urban centers to have access to financial services. User experience is all encompassing as it affects the emotion and the attitude of the user of a product or services. This study reviewed the related...
Local databases have become an important component within mobile applications. Developers use local databases to provide mobile users with a responsive and secure service for data storage and access. However, using local databases comes with a cost. Studies have shown that they are one of the most energy consuming components on mobile devices and misuseof their APIs can lead to performance and security...
Crowdsensing, as a novel method of data collecting, environment sensing and information providing, has been widely used in place of the traditional wired sensor networks and wireless sensor network to tackle real-world challenges by leveraging mobile devices. Unfortunately, the practicality of crowdsensing can be tampered with antisocial behavior, such as free-riding, false-reporting and whitewashing...
In context of Industry 4.0 Augmented Reality (AR) is frequently mentioned as the upcoming interface technology for human-machine communication and collaboration. Many prototypes have already arisen in both the consumer market and in the industrial sector. According to numerous experts it will take only few years until AR will reach the maturity level to be deployed in productive applications. Especially...
Mobile Devices offer enriched services and information for the end users. Achieving security in such a dynamic and heterogeneous environment is a challenging task. Hence, adaptive security is an applicable solution for this challenge. It is able to automatically select security mechanisms and their parameters at runtime in order to preserve the required security level in a changing environment. In...
In this paper, an embedded cloud surveillance system for particular area security is designed, which consists of monitoring and control parts. The system uses an Arduino Yun board to be the platform, and uses two PIR sensors as well as a Webcam for a purpose of monitoring. Once PIR sensors detect someone close to the system, not only a buzzer will play alarm sounds, the camera will enable to monitor...
The idea of employees leveraging their personal mobile devices for their work (Bring Your Own Device, or BYOD) is becoming increasingly popular in recent years. As BYOD users will use various digital goods (such as cloud services and mobile software) for their work and personal purposes via the same mobile devices, it brings serious security risks into both the cloud and mobile devices. Generally,...
Secret key establishment is a fundamental requirement for private communication between two wireless entities. An intriguing solution is to extract secret keys from the inherent randomness shared between them. Although several works have been done to extract secret keys from different kinds of mediums (e.g., RSSI, CSI, CIR), the efficiency and security problems are not fully solved. In this paper,...
The personalization is one of the main success factor in Mobile Commerce. This paper presents the main characteristic for Mobile Commerce and describes factors of personalization in Mobile Commerce, it also shows how these factors affects user satisfaction positively or negatively. The mechanism for personalization and recommendation system used in personalized Mobile Commerce are described. Many...
Mobile crowdsensing enables individuals to collect data from social events and phenomena for performing tasks released by customers using their mobile devices. It removes the necessity of sensors deployment and hence supports large-scale sensing applications efficiently. Nevertheless, incentive and privacy remain as the major obstacles that need additional attention. If privacy is not presered or...
The fast evolution of mobile devices has made them the center of attention for not only the research industry, but also malicious actors, as smartphones are used to store, transmit and process sensitive information. The diversity and number of typically installed applications create windows of opportunity for attackers. Attackers can use vulnerable applications to gain control over the device or change...
Mobile devices are used for communication and for tasks that are sensitive and subject to tampering. Indeed, attacks can be performed on the users' devices without user awareness, this represents additional risk in mission critical scenarios, such as Public Protection and Disaster Relief (PPDR). Intrusion Detection Systems are important for scenarios where information leakage is of crucial importance,...
Mobile crowdsensing is a new paradigm which explores the mobility and intelligence of mobile users to collect high-quality data from social events and phenomena for conducting complex sensing tasks. Nevertheless, privacy preservation and task allocation become main obstacles that need additional attention. To achieve accurate task allocation, it is inevitable to share some sensitive information of...
Identification of a Specific Mobile Phone, has many possible applications by enabling physical layer recognition of a specific device which cannot be manipulated by higher level software applications. In this study, identification of a specific mobile phone among four different classes has been studied. Both transient and data section features are used to calculate distance measures to a specific...
In smart factories and smart homes, devices such as smart sensors are connected to the Internet. Independent of the context in which such a smart sensor is deployed, the possibility to change its configuration parameters in a secure way is essential. Existing solutions do provide only minimal security or do not allow to transfer arbitrary configuration data. In this paper, we present an NFC- and QR-code...
The unabated plethora of research activities to augment multifarious mobile devices by leveraging cloud resources have created new research field called Mobile Cloud Computing (MCC). Recently, researchers have found Mobile Cloud Computing (MCC) to be a promising venture combining the advantage of both the cloud and mobility in giving users available resources on the cloud wherever they are using their...
We present the password reset MitM (PRMitM) attack and show how it can be used to take over user accounts. The PRMitM attack exploits the similarity of the registration and password reset processes to launch a man in the middle (MitM) attack at the application level. The attacker initiates a password reset process with a website and forwards every challenge to the victim who either wishes to register...
With the advancements of mobile phones and cellular devices, there has been a spur of various applications being used in daily life. Mobile phones in addition to being used as communication devices, also act as sensors gathering data that can be leveraged by different applications. Using the acquired data, a plethora of health monitoring applications have been designed using mobile systems. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.