Abstract | ||
---|---|---|
Physical objects with the addition of sensors, actuators and a connection to the internet form devices which can collect, process and communicate data to each other. Devices may not have been designed with connectivity in mind and adding it as an afterthought is problematic. This provides a significant technical challenge concerning securing the devices, as they are all of a sudden open to a wide range of attacks whilst providing more opportunities for malicious users and increases the chances of device compromise. The key aim of this research is to address limitations in current security solutions on mobile devices by defining a novel approach which will sustain future advances in mobile technology. Using combined security techniques our proposed solution will work with existing security technology to create a more effective and successful security implementation that will be suitable for a wide range of mobile devices. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1109/CIT/IUCC/DASC/PICOM.2015.117 | CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING |
Keywords | Field | DocType |
Lightweight security, mobile device, smartphone, digital forensics, malware detection, in-network, Collaborative, Internet of Things | Mobile technology,Mobile computing,Mobile search,Computer security,Computer science,Mobile device forensics,Cloud computing security,Mobile device,Mobile Web,Mobile telephony | Conference |
Citations | PageRank | References |
0 | 0.34 | 5 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Helen Angela Brumfitt | 1 | 0 | 0.68 |
Bob Askwith | 2 | 75 | 9.70 |
Bo Zhou | 3 | 34 | 7.51 |