Protecting Future Personal Computing: Challenging Traditional Network Security Models

The Internet is a notoriously two-way street. If multiple computers can communicate sensitive data across the Internet, malicious entities can access the network and collect this data also. The range and number of connected devices is increasing dramatically and with this expansion so is the security risk. Collection of ever rising quantities of data, especially sensitive and personal data, raises many challenges and questions about the suitability of current security solutions. The key problem our research investigates is how we can adapt traditional security models to enhance its both current and future deployment. The work is not aimed to replace existing security solutions although it builds upon it to complement it and enhance existing methods. We utilise the timeliness of the Internet of Things as a focus to develop and experiment with our work. In this paper we present our novel framework. The novelty lies within the way the three components are integrated within it to provide scaleable security. The results we present prove its feasibility to enhance current security to be more efficient and dynamic to protect a broad number of devices on future networks.

[1]  A. Householder,et al.  Computer attack trends challenge Internet security , 2002 .

[2]  Antonio F. Gómez-Skarmeta,et al.  A decentralized approach for security and privacy challenges in the Internet of Things , 2014, WF-IoT.

[3]  L. F. Reese Challenges faced today by computer security practitioners , 1989, [1989 Proceedings] Fifth Annual Computer Security Applications Conference.

[4]  Sheikh Iqbal Ahamed,et al.  Seeing Beyond Visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices , 2014, 2014 IEEE Eighth International Conference on Software Security and Reliability-Companion.

[5]  Neal Krawetz Introduction to network security , 2006 .

[6]  Sahil Kumar,et al.  Introduction to Network Security , 2016 .

[7]  Byung-Gon Chun,et al.  TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.

[8]  Antonio F. Gómez-Skarmeta,et al.  An Architecture Based on Internet of Things to Support Mobility and Security in Medical Environments , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.

[9]  Michele Zorzi,et al.  BlinkToSCoAP: An end-to-end security framework for the Internet of Things , 2015, 2015 7th International Conference on Communication Systems and Networks (COMSNETS).

[10]  Bernardi Pranggono,et al.  Mobile Malware and Smart Device Security: Trends, Challenges and Solutions , 2013, 2013 19th International Conference on Control Systems and Computer Science.

[11]  Ramjee Prasad,et al.  Threshold Cryptography-based Group Authentication (TCGA) scheme for the Internet of Things (IoT) , 2014, 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE).

[12]  Yong Wang,et al.  MobileGuardian: A security policy enforcement framework for mobile devices , 2014, 2014 International Conference on Collaboration Technologies and Systems (CTS).