Lightweight Forensics Application: Lightweight Approach to Securing Mobile Devices

Physical objects with the addition of sensors, actuators and a connection to the internet form devices which can collect, process and communicate data to each other. Devices may not have been designed with connectivity in mind and adding it as an afterthought is problematic. This provides a significant technical challenge concerning securing the devices, as they are all of a sudden open to a wide range of attacks whilst providing more opportunities for malicious users and increases the chances of device compromise. The key aim of this research is to address limitations in current security solutions on mobile devices by defining a novel approach which will sustain future advances in mobile technology. Using combined security techniques our proposed solution will work with existing security technology to create a more effective and successful security implementation that will be suitable for a wide range of mobile devices.

[1]  Louis Coetzee,et al.  The Internet of Things - promise for the future? An introduction , 2011, 2011 IST-Africa Conference Proceedings.

[2]  Antonio F. Gómez-Skarmeta,et al.  A decentralized approach for security and privacy challenges in the Internet of Things , 2014, WF-IoT.

[3]  Michele Zorzi,et al.  BlinkToSCoAP: An end-to-end security framework for the Internet of Things , 2015, 2015 7th International Conference on Communication Systems and Networks (COMSNETS).

[4]  Bernardi Pranggono,et al.  Mobile Malware and Smart Device Security: Trends, Challenges and Solutions , 2013, 2013 19th International Conference on Control Systems and Computer Science.

[5]  G. Padmavathi,et al.  Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism , 2012 .

[6]  Michael Rohs,et al.  The smart phone: a ubiquitous input device , 2006, IEEE Pervasive Computing.

[7]  Xiong Zhang,et al.  Smart city architecture: A technology guide for implementation and design challenges , 2014, China Communications.

[8]  Daniele Sgandurra,et al.  A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.

[9]  Yong Wang,et al.  MobileGuardian: A security policy enforcement framework for mobile devices , 2014, 2014 International Conference on Collaboration Technologies and Systems (CTS).