InfoSec-MobCop – Framework for Theft Detection and Data Security on Mobile Computing Devices

  • Anand Gupta
  • Deepank Gupta
  • Nidhi Gupta
Part of the Communications in Computer and Information Science book series (CCIS, volume 40)


People steal mobile devices with the intention of making money either by selling the mobile or by taking the sensitive information stored inside it. Mobile thefts are rising even with existing deterrents in place. This is because; they are ineffective, as they generate unnecessary alerts and might require expensive hardware equipments. In this paper a novel framework termed as InfoSec-MobCop is proposed which secures a mobile user’s data and discovers theft by detecting any anomaly in the user behavior. The anomaly of the user is computed by extracting and monitoring user specific details (typing pattern and usage history). The result of any intrusion attempt by a masquerader is intimated to the service provider through an SMS. Effectiveness of the used approach is discussed using FAR and FRR graphs. The experimental system uses both real users and simulated studies to quantify the effectiveness of the InfoSec-MobCop (Information Security Mobile Cop).


Mobile Device Security Masquerade Detection Opaque Authentication Typing Pattern 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    World Telecommunication /ICT Indicator Database, 12th edn. (2008)Google Scholar
  2. 2.
    Harrington, V., Mathew, P.: Mobile Phone Theft. Home Office Research Study 235, 58–59 (2001)Google Scholar
  3. 3.
    Snelick, R., Uludag, U., Mink, A., Indovina, M., Jain, A.: Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems. IEEE Transactions on Pattern Analysis and Machine Intelligence (2005)Google Scholar
  4. 4.
    Spiel Studios. Spiel Studios & BPL Mobile release MobileTracker. Press Release (August 2007)Google Scholar
  5. 5.
    Micro Technologies. Micro Technologies to offer Mobile Security to 2 million MTNL subscribers. Press Release (April 2008)Google Scholar
  6. 6.
    Innova Technologies. Mumbai IT firm introduces low-cost mobile security software. Press Release (June 2007)Google Scholar
  7. 7.
    Zhuang, L., Zhou, F., Tygar, J.D.: Keyboard Acoustic Emanations Revisited. In: 12th ACM Conference on Computer and Communications Security (2005)Google Scholar
  8. 8.
    Silfverberg, M., Scott MacKenzie, I., Korhonen, P.: Predicting Text Entry Speed on Mobile Phones. In: CHI (April 2000)Google Scholar
  9. 9.
    Monrose, F., Reiter, M.K., Wetzel, S.: Password hardening based on keystroke dynamics. In: Proceedings of the 6th ACM conference on Computer and communications security, pp. 73–82. ACM Press, New York (1999)Google Scholar
  10. 10.
    Lau, E., et al.: Enhanced user authentication through keystroke biometrics. 6.857 Computer and Network Security final project report (2004)Google Scholar
  11. 11.
    Nicholson, A.J., Corner, M.D., Noble, B.D.: Mobile Device Security Using Transient Authentication. IEEE Transactions on Mobile Computing (2006)Google Scholar
  12. 12.
    Mazhelis, O.: Masquerader Detection in Mobile Context based on Behaviour and Environment Modelling, Jyvaskyla (2007)Google Scholar
  13. 13.
    Bhukya, W.N., Suresh Kumar, G., Negi, A.: A study of effective-ness in masquerade detection. IEEE, Los Alamitos (2006)Google Scholar
  14. 14.
    Saleem, A., Al-Akaidi, M.: Security system based on fingerprint ID for mobile phone. In: 6th Middle East Simulation Multiconference, pp. 97–101 (2004)Google Scholar
  15. 15.
    Biddlecombe, E.: Crimes of fashion [mobile phone theft]. Communications International, pp. 38–39, 41, 43 (May 2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Anand Gupta
    • 1
  • Deepank Gupta
    • 1
  • Nidhi Gupta
    • 1
  1. 1.Information Technology DepartmentNetaji Subhas Institute of TechnologyNew DelhiIndia

Personalised recommendations