We make the case for usable mobile security by outlining why usable security in mobile devices is important and why it is hard to achieve. We describe a number of current problems in mobile devices that need usable and secure solutions. Finally, we discuss the characteristics of mobile devices that can actually help in designing usable solutions to mobile security problems.


Mobile Device Security Association Local Authentication Usable Security Graphical Password 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Allan, A., Warden, P.: iPhone Tracking: ”What Your iPhone Knows About You”. O’Reilly Where 2.0 Conference (April 2011),
  2. 2.
    Asokan, N., Nyberg, K.: Security associations for wireless device. In: Gritzalis, S., Karygiannis, T., Skianis, C. (eds.) Security and Privacy in Mobile and Wireless Networking, pp. 23–62. Troubador Publishing Ltd., Leicester (2009), Google Scholar
  3. 3.
    Clarke, N.L., Furnell, S.: Advanced user authentication for mobile devices. Computers & Security 26(2), 109–119 (2007), CrossRefGoogle Scholar
  4. 4.
    Dunphy, P., Heiner, A.P., Asokan, N.: A closer look at recognition-based graphical passwords on mobile devices. In: Cranor, L.F. (ed.) SOUPS. ACM International Conference Proceeding Series, vol. 485. ACM (2010),
  5. 5.
    Gupta, A., Miettinen, M., Asokan, N.: Using context-profiling to aid access control decisions in mobile devices. In: PerCom Workshops, pp. 310–312. IEEE (2011),
  6. 6.
    Jakobsson, M., Wetzel, S.: Security Weaknesses in Bluetooth. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 176–191. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  7. 7.
    Kostiainen, K., Reshetova, E., Ekberg, J.-E., Asokan, N.: Old, new, borrowed, blue –: a perspective on the evolution of mobile platform security architectures. In: Sandhu, R.S., Bertino, E. (eds.) CODASPY, pp. 13–24. ACM (2011),
  8. 8.
    Kuo, C., Goh, V., Tang, A., Perrig, A., Walker, J.: Empowering ordinary consumers to securely configure their mobile devices and wireless networks. Technical Report CMU-CyLab-05-005, Carnegie Mellon University (2005),
  9. 9.
    Miettinen, M., Asokan, N.: Towards security policy decisions based on context profiling. In: Greenstadt, R. (ed.) AISec, pp. 19–23. ACM (2010),
  10. 10.
    Norton. Norton survey reveals one in three experience cell phone loss, theft (February 8, 2011),
  11. 11.
    Retrevo Blog. iPhones, backups and toilets, what’s the connection? (August 2, 2011),
  12. 12.
    Sophos Naked Security blog. Survey says 70% don’t password-protect mobiles: download free Mobile Toolkit (August 9, 2011),
  13. 13.
    Suomalainen, J., Valkonen, J., Asokan, N.: Standards for security associations in personal networks: a comparative analysis. IJSN 4(1/2), 87–100 (2009)CrossRefGoogle Scholar
  14. 14.
    van Oorschot, P.C., Thorpe, J.: On predictive models and user-drawn graphical passwords. ACM Trans. Inf. Syst. Secur. 10(4) (2008),
  15. 15.
    Yee, K.-P.: Aligning security and usability. IEEE Security and Privacy 2, 48–55 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • N. Asokan
    • 1
  • Cynthia Kuo
    • 1
  1. 1.Nokia Research CenterFinland

Personalised recommendations