Skip to main content

Usable Mobile Security

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNISA,volume 7154)

Abstract

We make the case for usable mobile security by outlining why usable security in mobile devices is important and why it is hard to achieve. We describe a number of current problems in mobile devices that need usable and secure solutions. Finally, we discuss the characteristics of mobile devices that can actually help in designing usable solutions to mobile security problems.

Keywords

  • Mobile Device
  • Security Association
  • Local Authentication
  • Usable Security
  • Graphical Password

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   69.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Allan, A., Warden, P.: iPhone Tracking: ”What Your iPhone Knows About You”. O’Reilly Where 2.0 Conference (April 2011), http://where2conf.com/where2011/public/schedule/detail/20340

  2. Asokan, N., Nyberg, K.: Security associations for wireless device. In: Gritzalis, S., Karygiannis, T., Skianis, C. (eds.) Security and Privacy in Mobile and Wireless Networking, pp. 23–62. Troubador Publishing Ltd., Leicester (2009), http://research.ics.tkk.fi/publications/knyberg/secass.pdf

    Google Scholar 

  3. Clarke, N.L., Furnell, S.: Advanced user authentication for mobile devices. Computers & Security 26(2), 109–119 (2007), http://dx.doi.org/10.1016/j.cose.2006.08.008

    CrossRef  Google Scholar 

  4. Dunphy, P., Heiner, A.P., Asokan, N.: A closer look at recognition-based graphical passwords on mobile devices. In: Cranor, L.F. (ed.) SOUPS. ACM International Conference Proceeding Series, vol. 485. ACM (2010), http://doi.acm.org/10.1145/1837110.1837114

  5. Gupta, A., Miettinen, M., Asokan, N.: Using context-profiling to aid access control decisions in mobile devices. In: PerCom Workshops, pp. 310–312. IEEE (2011), http://dx.doi.org/10.1109/PERCOMW.2011.5766891

  6. Jakobsson, M., Wetzel, S.: Security Weaknesses in Bluetooth. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 176–191. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  7. Kostiainen, K., Reshetova, E., Ekberg, J.-E., Asokan, N.: Old, new, borrowed, blue –: a perspective on the evolution of mobile platform security architectures. In: Sandhu, R.S., Bertino, E. (eds.) CODASPY, pp. 13–24. ACM (2011), http://doi.acm.org/10.1145/1943513.1943517

  8. Kuo, C., Goh, V., Tang, A., Perrig, A., Walker, J.: Empowering ordinary consumers to securely configure their mobile devices and wireless networks. Technical Report CMU-CyLab-05-005, Carnegie Mellon University (2005), http://repository.cmu.edu/cylab/65/

  9. Miettinen, M., Asokan, N.: Towards security policy decisions based on context profiling. In: Greenstadt, R. (ed.) AISec, pp. 19–23. ACM (2010), http://doi.acm.org/10.1145/1866423.1866428

  10. Norton. Norton survey reveals one in three experience cell phone loss, theft (February 8, 2011), http://www.symantec.com/about/news/release/article.jsp?prid=20110208_01

  11. Retrevo Blog. iPhones, backups and toilets, what’s the connection? (August 2, 2011), http://www.retrevo.com/content/blog/2011/08/iphones-backups-and-toilets-connection

  12. Sophos Naked Security blog. Survey says 70% don’t password-protect mobiles: download free Mobile Toolkit (August 9, 2011), http://nakedsecurity.sophos.com/2011/08/09/free-sophos-mobile-security-toolkit/

  13. Suomalainen, J., Valkonen, J., Asokan, N.: Standards for security associations in personal networks: a comparative analysis. IJSN 4(1/2), 87–100 (2009)

    CrossRef  Google Scholar 

  14. van Oorschot, P.C., Thorpe, J.: On predictive models and user-drawn graphical passwords. ACM Trans. Inf. Syst. Secur. 10(4) (2008), http://doi.acm.org/10.1145/1284680.1284685

  15. Yee, K.-P.: Aligning security and usability. IEEE Security and Privacy 2, 48–55 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Asokan, N., Kuo, C. (2012). Usable Mobile Security. In: Ramanujam, R., Ramaswamy, S. (eds) Distributed Computing and Internet Technology. ICDCIT 2012. Lecture Notes in Computer Science, vol 7154. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28073-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28073-3_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28072-6

  • Online ISBN: 978-3-642-28073-3

  • eBook Packages: Computer ScienceComputer Science (R0)