語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Designing Effective Security and Pri...
~
Temple University.
Designing Effective Security and Privacy Schemes for Wireless Mobile Devices.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Designing Effective Security and Privacy Schemes for Wireless Mobile Devices.
作者:
Wu, Longfei.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, 2017
面頁冊數:
170 p.
附註:
Source: Dissertation Abstracts International, Volume: 79-01(E), Section: B.
附註:
Adviser: Xiaojiang Du.
Contained By:
Dissertation Abstracts International79-01B(E).
標題:
Computer science.
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10604609
ISBN:
9780355172027
Designing Effective Security and Privacy Schemes for Wireless Mobile Devices.
Wu, Longfei.
Designing Effective Security and Privacy Schemes for Wireless Mobile Devices.
- Ann Arbor : ProQuest Dissertations & Theses, 2017 - 170 p.
Source: Dissertation Abstracts International, Volume: 79-01(E), Section: B.
Thesis (Ph.D.)--Temple University, 2017.
The growing ubiquity of modern wireless and mobile electronic devices has brought our daily lives with more convenience and fun. Today's smartphones are equipped with a variety of sensors and wireless communication technologies, which can support not only the basic functions like phone call and web browsing, but also advanced functions like mobile pay, biometric security, fitness monitoring, etc. Internet-of-Things (IoT) is another category of popular wireless devices that are networked to collect and exchange data. For example, the smart appliances are increasingly deployed to serve in home and office environments, such as smart thermostat, smart bulb, and smart meter. Additionally, implantable medical devices (IMD) is the typical type of modern wireless devices that are implanted within human body for diagnostic, monitoring, and therapeutic purposes. However, these modern wireless and mobile devices are not well protected compared with traditional personal computers (PCs), due to the intrinsic limitations in computation power, battery capacity, etc. In this dissertation, we first present the security and privacy vulnerabilities we discovered. Then, we present our designs to address these issues and enhance the security of smartphones, IoT devices, and IMDs.
ISBN: 9780355172027Subjects--Topical Terms:
199325
Computer science.
Designing Effective Security and Privacy Schemes for Wireless Mobile Devices.
LDR
:04579nmm a2200325 4500
001
523931
005
20180517120325.5
008
180709s2017 ||||||||||||||||| ||eng d
020
$a
9780355172027
035
$a
(MiAaPQ)AAI10604609
035
$a
(MiAaPQ)temple:13065
035
$a
AAI10604609
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Wu, Longfei.
$0
(orcid)0000-0003-2325-5009
$3
795416
245
1 0
$a
Designing Effective Security and Privacy Schemes for Wireless Mobile Devices.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2017
300
$a
170 p.
500
$a
Source: Dissertation Abstracts International, Volume: 79-01(E), Section: B.
500
$a
Adviser: Xiaojiang Du.
502
$a
Thesis (Ph.D.)--Temple University, 2017.
520
$a
The growing ubiquity of modern wireless and mobile electronic devices has brought our daily lives with more convenience and fun. Today's smartphones are equipped with a variety of sensors and wireless communication technologies, which can support not only the basic functions like phone call and web browsing, but also advanced functions like mobile pay, biometric security, fitness monitoring, etc. Internet-of-Things (IoT) is another category of popular wireless devices that are networked to collect and exchange data. For example, the smart appliances are increasingly deployed to serve in home and office environments, such as smart thermostat, smart bulb, and smart meter. Additionally, implantable medical devices (IMD) is the typical type of modern wireless devices that are implanted within human body for diagnostic, monitoring, and therapeutic purposes. However, these modern wireless and mobile devices are not well protected compared with traditional personal computers (PCs), due to the intrinsic limitations in computation power, battery capacity, etc. In this dissertation, we first present the security and privacy vulnerabilities we discovered. Then, we present our designs to address these issues and enhance the security of smartphones, IoT devices, and IMDs.
520
$a
For smartphone security, we investigate the mobile phishing attacks, mobile clickjacking attacks and mobile camera-based attacks. Phishing attacks aim to steal private information such as credentials. We propose a novel anti-phishing scheme MobiFish, which can detect both phishing webpages and phishing applications (apps). The key idea is to check the consistency between the claimed identity and the actual identity of a webpage/app. The claimed identity can be extracted from the screenshot of login user interface (UI) using the optical character recognition (OCR) technique, while the actual identity is indicated by the secondary-level domain name of the Uniform Resource Locator (URL) to which the credentials are submitted. Clickjacking attacks intend to hijack user inputs and re-route them to other UIs that are not supposed to receive them. To defend such attacks, a lightweight and independent detection service is integrated into the Android operating system. Our solution requires no user or app developer effort, and is compatible with existing commercial apps. Camera-based attacks on smartphone can secretly capture photos or videos without the phone user's knowledge. One advanced attack we discovered records the user's eye movements when entering passwords. We found that it is possible to recover simple passwords from the video containing user eye movements.
520
$a
Next, we propose an out-of-band two-factor authentication scheme for indoor IoT devices (e.g., smart appliances) based on the Blockchain infrastructure. Since smart home environment consists of multiple IoT devices that may share their sensed data to better serve the user, when one IoT device is being accessed, our design utilizes another device to conduct a secondary authentication over an out-of-band channel (light, acoustic, etc.), to detect if the access requestor is a malicious external device.
520
$a
Unlike smartphones and IoT devices, IMDs have the most limited computation and battery resources. We devise a novel smartphone-assisted access control scheme in which the patient's smartphone is used to delegate the heavy computations for authentication and authorization. The communications between the smartphone and the IMD programmer are conducted through an audio cable, which can resist the wireless eavesdropping and other active attacks.
590
$a
School code: 0225.
650
4
$a
Computer science.
$3
199325
690
$a
0984
710
2
$a
Temple University.
$b
Computer and Information Science.
$3
795417
773
0
$t
Dissertation Abstracts International
$g
79-01B(E).
790
$a
0225
791
$a
Ph.D.
792
$a
2017
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10604609
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000148182
電子館藏
1圖書
學位論文
TH 2017
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10604609
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入