Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Designing Effective Security and Pri...
~
Temple University.
Designing Effective Security and Privacy Schemes for Wireless Mobile Devices.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Designing Effective Security and Privacy Schemes for Wireless Mobile Devices.
Author:
Wu, Longfei.
Published:
Ann Arbor : ProQuest Dissertations & Theses, 2017
Description:
170 p.
Notes:
Source: Dissertation Abstracts International, Volume: 79-01(E), Section: B.
Notes:
Adviser: Xiaojiang Du.
Contained By:
Dissertation Abstracts International79-01B(E).
Subject:
Computer science.
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10604609
ISBN:
9780355172027
Designing Effective Security and Privacy Schemes for Wireless Mobile Devices.
Wu, Longfei.
Designing Effective Security and Privacy Schemes for Wireless Mobile Devices.
- Ann Arbor : ProQuest Dissertations & Theses, 2017 - 170 p.
Source: Dissertation Abstracts International, Volume: 79-01(E), Section: B.
Thesis (Ph.D.)--Temple University, 2017.
The growing ubiquity of modern wireless and mobile electronic devices has brought our daily lives with more convenience and fun. Today's smartphones are equipped with a variety of sensors and wireless communication technologies, which can support not only the basic functions like phone call and web browsing, but also advanced functions like mobile pay, biometric security, fitness monitoring, etc. Internet-of-Things (IoT) is another category of popular wireless devices that are networked to collect and exchange data. For example, the smart appliances are increasingly deployed to serve in home and office environments, such as smart thermostat, smart bulb, and smart meter. Additionally, implantable medical devices (IMD) is the typical type of modern wireless devices that are implanted within human body for diagnostic, monitoring, and therapeutic purposes. However, these modern wireless and mobile devices are not well protected compared with traditional personal computers (PCs), due to the intrinsic limitations in computation power, battery capacity, etc. In this dissertation, we first present the security and privacy vulnerabilities we discovered. Then, we present our designs to address these issues and enhance the security of smartphones, IoT devices, and IMDs.
ISBN: 9780355172027Subjects--Topical Terms:
199325
Computer science.
Designing Effective Security and Privacy Schemes for Wireless Mobile Devices.
LDR
:04579nmm a2200325 4500
001
523931
005
20180517120325.5
008
180709s2017 ||||||||||||||||| ||eng d
020
$a
9780355172027
035
$a
(MiAaPQ)AAI10604609
035
$a
(MiAaPQ)temple:13065
035
$a
AAI10604609
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Wu, Longfei.
$0
(orcid)0000-0003-2325-5009
$3
795416
245
1 0
$a
Designing Effective Security and Privacy Schemes for Wireless Mobile Devices.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2017
300
$a
170 p.
500
$a
Source: Dissertation Abstracts International, Volume: 79-01(E), Section: B.
500
$a
Adviser: Xiaojiang Du.
502
$a
Thesis (Ph.D.)--Temple University, 2017.
520
$a
The growing ubiquity of modern wireless and mobile electronic devices has brought our daily lives with more convenience and fun. Today's smartphones are equipped with a variety of sensors and wireless communication technologies, which can support not only the basic functions like phone call and web browsing, but also advanced functions like mobile pay, biometric security, fitness monitoring, etc. Internet-of-Things (IoT) is another category of popular wireless devices that are networked to collect and exchange data. For example, the smart appliances are increasingly deployed to serve in home and office environments, such as smart thermostat, smart bulb, and smart meter. Additionally, implantable medical devices (IMD) is the typical type of modern wireless devices that are implanted within human body for diagnostic, monitoring, and therapeutic purposes. However, these modern wireless and mobile devices are not well protected compared with traditional personal computers (PCs), due to the intrinsic limitations in computation power, battery capacity, etc. In this dissertation, we first present the security and privacy vulnerabilities we discovered. Then, we present our designs to address these issues and enhance the security of smartphones, IoT devices, and IMDs.
520
$a
For smartphone security, we investigate the mobile phishing attacks, mobile clickjacking attacks and mobile camera-based attacks. Phishing attacks aim to steal private information such as credentials. We propose a novel anti-phishing scheme MobiFish, which can detect both phishing webpages and phishing applications (apps). The key idea is to check the consistency between the claimed identity and the actual identity of a webpage/app. The claimed identity can be extracted from the screenshot of login user interface (UI) using the optical character recognition (OCR) technique, while the actual identity is indicated by the secondary-level domain name of the Uniform Resource Locator (URL) to which the credentials are submitted. Clickjacking attacks intend to hijack user inputs and re-route them to other UIs that are not supposed to receive them. To defend such attacks, a lightweight and independent detection service is integrated into the Android operating system. Our solution requires no user or app developer effort, and is compatible with existing commercial apps. Camera-based attacks on smartphone can secretly capture photos or videos without the phone user's knowledge. One advanced attack we discovered records the user's eye movements when entering passwords. We found that it is possible to recover simple passwords from the video containing user eye movements.
520
$a
Next, we propose an out-of-band two-factor authentication scheme for indoor IoT devices (e.g., smart appliances) based on the Blockchain infrastructure. Since smart home environment consists of multiple IoT devices that may share their sensed data to better serve the user, when one IoT device is being accessed, our design utilizes another device to conduct a secondary authentication over an out-of-band channel (light, acoustic, etc.), to detect if the access requestor is a malicious external device.
520
$a
Unlike smartphones and IoT devices, IMDs have the most limited computation and battery resources. We devise a novel smartphone-assisted access control scheme in which the patient's smartphone is used to delegate the heavy computations for authentication and authorization. The communications between the smartphone and the IMD programmer are conducted through an audio cable, which can resist the wireless eavesdropping and other active attacks.
590
$a
School code: 0225.
650
4
$a
Computer science.
$3
199325
690
$a
0984
710
2
$a
Temple University.
$b
Computer and Information Science.
$3
795417
773
0
$t
Dissertation Abstracts International
$g
79-01B(E).
790
$a
0225
791
$a
Ph.D.
792
$a
2017
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10604609
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000148182
電子館藏
1圖書
學位論文
TH 2017
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10604609
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login