Mobile security education on portable labs

Mobile computing has become extremely popular in our daily lives [1] and hence it is an important platform for software developers. Mobile platforms enable students to learn in a modern context when they are used as teaching tools in Computer Science (CS) or Information Technology (IT) education. Meanwhile, mobile security is an important topic in security curricula partly due to the popularity of consumer mobile devices and a shift in computing landscape towards mobile devices' apps development. Due to the rapid demand and popularity of mobile devices [2-3], the security of mobile computing is vital to the growing army of users and for the future of our social, economic and political systems. Hence, it is important and needed to develop hands-on learning materials on mobile security that produce a well-educated and trained workforce, who understands the many concerns of security, privacy, integrity and reliability, and is able to develop strong protection mechanisms and apply fundamental principles and best practices in solving real world problems [4-6]. Many colleges and universities are developing and offering courses on mobile programming and development. However, pedagogical materials based on real world applications running on a portable isolated network are still in infant stage.

[1]  Juliet K. Hurtig,et al.  A common framework for diverse capstone experiences , 2009, 2009 39th IEEE Frontiers in Education Conference.

[2]  Zhao Zhang,et al.  Reflections on Implementing and Teaching an Advanced Undergraduate Course in Embedded Systems , 2007, 2007 IEEE International Conference on Microelectronic Systems Education (MSE'07).

[3]  Naehyuck Chang,et al.  Capstone Design Project for a Ubiquitous Sensor Network , 2007, 2007 IEEE International Conference on Microelectronic Systems Education (MSE'07).

[4]  Ming Yang,et al.  Work in progress: Real world relevant security labware for mobile threat analysis and protection experience , 2012, 2012 Frontiers in Education Conference Proceedings.

[5]  Kyle King,et al.  RADICL: A Reconfigurable Attack-Defend Instructional Computing Laboratory , 2005, Security and Management.

[6]  Jaakko Kurhila,et al.  Discovering high-impact success factors in capstone software projects , 2009, SIGITE '09.

[7]  D.G. Meyer,et al.  Capstone Design Outcome Assessment: Instruments for Quantitative Evaluation , 2005, Proceedings Frontiers in Education 35th Annual Conference.

[8]  M. Jimenez,et al.  Integrating fundamental and advanced concepts in a rounded capstone design experience in computer engineering , 2007, 2007 37th Annual Frontiers In Education Conference - Global Engineering: Knowledge Without Borders, Opportunities Without Passports.

[9]  B. Ramamurthy Work in Progress: A Synergistic Undergraduate Research Model Leveraging Capstone-Style Projects and Grid Computing , 2006, Proceedings. Frontiers in Education. 36th Annual Conference.

[10]  S.M. Dascalu,et al.  Computer science capstone course senior projects: from project idea to prototype implementation , 2005, Proceedings Frontiers in Education 35th Annual Conference.

[11]  Kathleen Meehan,et al.  Work in progress - transitioning Lab-in-a-Box (LiaB) to the community college setting , 2009, 2009 39th IEEE Frontiers in Education Conference.