Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 張耕瑋 黃峻亨 楊銘鴻 李昌諭 吳政穎 陳建廷
Introduction to Mobile Computing Security Issues of Mobile Computing Security Policies Security Prevent Applications and Enterprise Case
Definition ◦ Mobile computing & Ubiquitous computing Features ◦ Technical and other limitations of mobile computing Insufficient bandwidth Security standards Power consumption Transmission interferences Potential health hazards Human interface with device 。 Wireless communication and network
Data is cited from
Security is major issue ◦ Protection of Mobile Devices ◦ Software Security – program vulnerabilities ◦ Security Protocols - authentication Different architecture has different security vulnerabilities
Common security threat in wireless network can be categorized into two types: ◦ Passive - difficult to detect ◦ Active – possible to detect
Interception Modification Fabrication Interruption
Virus and Worms Denial of Service Intrusion
911 Virus 911 Virus PalmOS/LibertyCrack PalmOS/LibertyCrack
Security policies! Symbian: Protect your data, not just your device Technical support
Confidentiality Integrity Availability Authorization Dependability and Reliability Accountability
A process when devices be stole Security policy between wired network and wireless network A mechanism to manage carrier who has secret data Standard to control virus, worm… Hierarchy certificate mechanism
Information security Network security Device security People training
Hotspot ◦ Hotspot is the location supply LAN that is open for public. ◦ Data transfer don’t encrypt. Hotspot Security ◦ Establish system to prevent fake Hotspot Service ◦ Turn off the Ad-hoc network mode ◦ Don’t set auto-connect to AP ◦ Pre-set to use VPN Mobile Computing Security ◦ Don’t use trusted network and un-trusted network at same time
Types of Attack Interception Fabrication Interruption Modification Prevention Encrypt Signature + CA Digital Signature
TEK exchange SS BS authentication information X.509 certificate authorization request X.509 certificate, capability, Basic CID authorization reply encrypted AK, SAIDs, SQN AK,… AK exchange key request SAID, HMAC-Digest,… key reply encrypted TEK, CBC IV, HMAC-Digest,… Data exchange( encrypt by TEK)
Encrypt Separate risks Firewall Redact
EFS (Encrypting file system) symmetric encryption:asymmetric encryption :
Two-factor authentication + Or others : passwordIC Card
Server Notebook CD-Rom USB flash drive
coping sensitive record into removable disk before employees carry documents out Sensitive data Employees Document
Notebook computer PDA Enterprise case
Beginning of Mobile Phone Virus Recent Viruses The Way Viruses Infect Problems of Anti-Virus
Wikipedia Security in Distributed, Grid, Mobile, and Pervasive Computing by Yang Xiao
Thank you for listening!