On the Modelling of Context-Aware Security for Mobile Devices

Security management in wireless networks has to deal with the changing character of the environment, which can further lead to decision making problem for unexpected events. Among a huge list of devices, the mobile ones are especially vulnerable to this situation. The solution for adapting systems and applications to dynamic environments can be context-aware description of the user actions, which gives a possibility to take into account the factors that influence these actions. In the article, we propose a context-aware security adjusting model, which is based on proposition logic and incorporates mechanisms that assist in the reasoning process. The main benefits that differentiate our approach from similar ones are a formal representation of the model, the usage of the whole spectrum of context attributes, the detection and analysis of contextual data integrity, and conflicting rules’ eradication capability. All these traits transcribe into a more effective way of adjusting security measures in accordance with existing circumstances. To illustrate the proposed approach, we present the case study of context-aware security management for mobile devices.

[1]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[2]  Henry Prakken,et al.  Logics for Defeasible Argumentation , 2001 .

[3]  Ahmad-Reza Sadeghi,et al.  ConXsense: automated context classification for context-aware access control , 2013, AsiaCCS.

[4]  Zahir Tari,et al.  CoCaMAAL: A cloud-oriented context-aware middleware in ambient assisted living , 2014, Future Gener. Comput. Syst..

[5]  Raian Ali,et al.  Reasoning with contextual requirements: Detecting inconsistency and conflicts , 2013, Inf. Softw. Technol..

[6]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[7]  Adam Wierzbicki,et al.  On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML) , 2013, ICT-EurAsia.

[8]  Mark Strembeck,et al.  Modeling Context-Aware RBAC Models for Business Processes in Ubiquitous Computing Environments , 2012, 2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing.

[9]  Grzegorz J. Nalepa,et al.  Rule-based solution for context-aware reasoning on mobile devices , 2014, Comput. Sci. Inf. Syst..

[10]  Bogdan Ksiezopolski,et al.  Quality of Protection Evaluation of Security Mechanisms , 2014, TheScientificWorldJournal.

[11]  Zbigniew Kotulski,et al.  Adaptable security mechanism for dynamic environments , 2007, Comput. Secur..

[12]  Timothy W. Finin,et al.  CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies , 2012, Distributed and Parallel Databases.

[13]  Muhammad Younas,et al.  A new model for context-aware transactions in mobile services , 2011, Personal and Ubiquitous Computing.

[14]  Alessio Merlo,et al.  A survey on energy-aware security mechanisms , 2015, Pervasive Mob. Comput..

[15]  Riza Cenk Erdur,et al.  iConAwa - An intelligent context-aware system , 2012, Expert Syst. Appl..

[16]  Tomasz Zurek Model of Argument from Social Importance , 2014, JURIX.

[17]  Dimitris Askounis,et al.  A context awareness framework for cross-platform distributed applications , 2014, J. Syst. Softw..

[18]  Ian Oakley,et al.  CASA: context-aware scalable authentication , 2013, SOUPS.

[19]  Henry Prakken,et al.  The ASPIC+ framework for structured argumentation: a tutorial , 2014, Argument Comput..

[20]  Zbigniew Kotulski,et al.  On QoP method for ensuring availability of the goal of cryptographic protocols in the real-time systems , 2011 .

[21]  Adam Wierzbicki,et al.  On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML) , 2012, Ann. UMCS Informatica.

[22]  Henry Prakken,et al.  A dialectical model of assessing conflicting arguments in legal reasoning , 1996, Artificial Intelligence and Law.

[23]  Zbigniew Kotulski,et al.  Adaptive Approach to Network Security , 2009, CN.

[24]  Yaser Mowafi,et al.  A Context-aware Adaptive Security Framework for Mobile Applications , 2014, ICCASA.

[25]  Youakim Badr,et al.  A security policy framework for context-aware and user preferences in e-services , 2009, J. Syst. Archit..

[26]  Evaggelia Pitoura,et al.  Managing contextual preferences , 2011, Inf. Syst..

[27]  Charalabos Skianis,et al.  A Survey on Context-Aware Mobile and Wireless Networking: On Networking and Computing Environments' Integration , 2013, IEEE Communications Surveys & Tutorials.