Skip to main content

Usable Mobile Security

  • Conference paper
Distributed Computing and Internet Technology (ICDCIT 2012)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7154))

Abstract

We make the case for usable mobile security by outlining why usable security in mobile devices is important and why it is hard to achieve. We describe a number of current problems in mobile devices that need usable and secure solutions. Finally, we discuss the characteristics of mobile devices that can actually help in designing usable solutions to mobile security problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Allan, A., Warden, P.: iPhone Tracking: ”What Your iPhone Knows About You”. O’Reilly Where 2.0 Conference (April 2011), http://where2conf.com/where2011/public/schedule/detail/20340

  2. Asokan, N., Nyberg, K.: Security associations for wireless device. In: Gritzalis, S., Karygiannis, T., Skianis, C. (eds.) Security and Privacy in Mobile and Wireless Networking, pp. 23–62. Troubador Publishing Ltd., Leicester (2009), http://research.ics.tkk.fi/publications/knyberg/secass.pdf

    Google Scholar 

  3. Clarke, N.L., Furnell, S.: Advanced user authentication for mobile devices. Computers & Security 26(2), 109–119 (2007), http://dx.doi.org/10.1016/j.cose.2006.08.008

    Article  Google Scholar 

  4. Dunphy, P., Heiner, A.P., Asokan, N.: A closer look at recognition-based graphical passwords on mobile devices. In: Cranor, L.F. (ed.) SOUPS. ACM International Conference Proceeding Series, vol. 485. ACM (2010), http://doi.acm.org/10.1145/1837110.1837114

  5. Gupta, A., Miettinen, M., Asokan, N.: Using context-profiling to aid access control decisions in mobile devices. In: PerCom Workshops, pp. 310–312. IEEE (2011), http://dx.doi.org/10.1109/PERCOMW.2011.5766891

  6. Jakobsson, M., Wetzel, S.: Security Weaknesses in Bluetooth. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 176–191. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Kostiainen, K., Reshetova, E., Ekberg, J.-E., Asokan, N.: Old, new, borrowed, blue –: a perspective on the evolution of mobile platform security architectures. In: Sandhu, R.S., Bertino, E. (eds.) CODASPY, pp. 13–24. ACM (2011), http://doi.acm.org/10.1145/1943513.1943517

  8. Kuo, C., Goh, V., Tang, A., Perrig, A., Walker, J.: Empowering ordinary consumers to securely configure their mobile devices and wireless networks. Technical Report CMU-CyLab-05-005, Carnegie Mellon University (2005), http://repository.cmu.edu/cylab/65/

  9. Miettinen, M., Asokan, N.: Towards security policy decisions based on context profiling. In: Greenstadt, R. (ed.) AISec, pp. 19–23. ACM (2010), http://doi.acm.org/10.1145/1866423.1866428

  10. Norton. Norton survey reveals one in three experience cell phone loss, theft (February 8, 2011), http://www.symantec.com/about/news/release/article.jsp?prid=20110208_01

  11. Retrevo Blog. iPhones, backups and toilets, what’s the connection? (August 2, 2011), http://www.retrevo.com/content/blog/2011/08/iphones-backups-and-toilets-connection

  12. Sophos Naked Security blog. Survey says 70% don’t password-protect mobiles: download free Mobile Toolkit (August 9, 2011), http://nakedsecurity.sophos.com/2011/08/09/free-sophos-mobile-security-toolkit/

  13. Suomalainen, J., Valkonen, J., Asokan, N.: Standards for security associations in personal networks: a comparative analysis. IJSN 4(1/2), 87–100 (2009)

    Article  Google Scholar 

  14. van Oorschot, P.C., Thorpe, J.: On predictive models and user-drawn graphical passwords. ACM Trans. Inf. Syst. Secur. 10(4) (2008), http://doi.acm.org/10.1145/1284680.1284685

  15. Yee, K.-P.: Aligning security and usability. IEEE Security and Privacy 2, 48–55 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Asokan, N., Kuo, C. (2012). Usable Mobile Security. In: Ramanujam, R., Ramaswamy, S. (eds) Distributed Computing and Internet Technology. ICDCIT 2012. Lecture Notes in Computer Science, vol 7154. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28073-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28073-3_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28072-6

  • Online ISBN: 978-3-642-28073-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics