服务承诺
资金托管
原创保证
实力保障
24小时客服
使命必达
51Due提供Essay,Paper,Report,Assignment等学科作业的代写与辅导,同时涵盖Personal Statement,转学申请等留学文书代写。
51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标私人订制你的未来职场 世界名企,高端行业岗位等 在新的起点上实现更高水平的发展
积累工作经验
多元化文化交流
专业实操技能
建立人际资源圈A_Hierarchical_Frameworkmodel_of_Mobile_Security
2013-11-13 来源: 类别: 更多范文
A Hierarchical FrameworkModel of Mobile Security
Abstract—As wireless communications and mobile
multimedia services are booming nowadays, systematic research
of the overall aspects of mobile security is crucial. This paper
presents a framework model for guiding the systematic
investigation of mobile security. Based on the introduction of
some background viewpoints of security targets from a novel
perspective, the framework is described as a hierarchical model
in which mobile security research is partitioned into three
different layers, including Property Theory, Limited Targets,
and Classified Applications. Key research topics in each layer
are discussed respectively in detail. In the Property Theory
layer, some basic topics related to security are provided. Then,
security issues in networks, computing, and multimedia
processing are fused together in the Limited Targets layer upon
the limitation operator of mobile technology. Finally, the
Classified Applications layer proposes a brief categorization of
mobile applications, and the security topics in one
representative field, i.e. mobile E-commerce, are presented as an
illustration.
I. INTRODUCTION
The tremendous demands from social markets are pushing
the booming development of mobile communications faster
than ever before, and therefore plenty of new advanced
techniques emerge. Wider bandwidth, manifold networks,
and more powerful processing capability, together with
advances in computing technology have brought more and
more miscellaneous services to be delivered with more
excellent quality. Mobile service subscribers in some
advanced countries have already surpassed fixed
communications, and it was predicted that by 2003 the
mobile user base would exceed 1 billion, and 2 billion by
2005. Now is the time for deploying 3G mobile
communications while research of 4G is just in the ascendant
[1].
The phenomenal growth in mobile and wireless
communications entails the serious problem of security. The
causes, mainly due to the frangibility of wireless and mobile
features and the variety of applications and services, fall into
the following categories:
· The physical weaknesses and limitations of mobile
and wireless communications, e.g. high error rate and
unpredictable error behaviour due to external
interference and mobility, introduce influences on
characteristics of not only performance, but also
security.
· The entirely exposed environment of wireless air radio
and field devices provides much more opportunities of
being subject to malicious attacks and/or being
susceptible to accidental interferences.
· Applications are becoming more and more important
than ever, including mobile applications and services
in areas of military, health care, business, finance, etc.
· Other services may bring users easily in contact with
possible threats of intruding privacy, e.g. locationawareness
services and context-based applications.
· Contents of provided services, most of which are
multimedia-type, are valuable not only to subscribers
but also to composers and providers, and thus secure
protective measures are needed.
Obviously the simple migration of methods used in wired
communications in order to obtain security into a mobile
scenario cannot satisfy the requirements of anyone besides
hackers. Many studies have focused mainly on mobile
subscriber authentication, radio-path encryption [2-4], and
secure mobile IP [5, 6], but so-called “mobile security” by no
means involves only these relative independent and narrow
domains. We indeed need a more systematic approach to gear
up the research on mobile security.
In this paper, we present a framework for the systematic
research of mobile security. The framework is figured as a
hierarchical model in which the research of mobile security is
divided into three different layers: Property Theory, Limited
Targets, and Classified Applications. Key research topics in
each layer are discussed respectively in detail.
This paper is structured as follows. In Section II, some
background information related to the framework
construction of mobile security is introduced. The description
of mobile security framework is presented in Section III.
Section IV mainly discusses the key research issues in each
of the three layers composing the framework. Finally, we
summarize the paper by conclusions in Section V.
II. BACKGROUND OF SECURITY TARGETS
Regarding the term of mobile security, it is really a
straightforward perspective to position its targets only on
mobile and wireless networks and communications. The fact
is, however, that research on networks is neither the only
concern nor even the most important one. It is a
misunderstanding to think that concentrating the whole
attention on OSI reference model is an easy and efficient
approach whenever networks are concerned. As for the
research of security, we need to consider three
complementary targets, including networking, computer and
computing, and media processing.
Networking research is considered, more or less, to be on a
comparatively lower level than the other two targets. Studies
of networks can be categorized according to two different
aspects from longitudinal and transverse axes respectively,
i.e. infrastructure and protocol. Concerning infrastructures,
the most common taxonomy is to divide the target into
wireless and wired networks, which can be replaced with
mobile and fixed networks on most occasions. To investigate
protocols, obviously the seven-layer OSI Reference Model is
the most popular one, while the five-layer TCP/IP Reference
Model can be treated as a special case of the general model.
As for the target of computer and computing, we consider
some security-related topics on different levels. Database
plays a more important role than ever before since network
multimedia services rapidly increase, and at the same time
novel types like distributed web databases are emerging for
the management of multiform resources. Distributed and
mobile computing forms give full play to their abilities on the
increasing platform of networks. Software agent is becoming
an indispensable concept for the development of open
distributed applications, which also continuously makes Java
one of the most important programming languages. Besides
the quick development of traditional operating systems as
distributed/networks OS and PC OS, embedded OS and light
OS have gained a considerable reputation. This situation with
OS can also be seen in the field of terminals, together with
the trend that portable terminals exceed fixed ones.
Media processing seems to be the high level target that
needs protection by security techniques, with the interfaces of
media communications to networks and media computing
systems to computers. Usually the multifarious types of
media can be divided into discrete and continuous media.
Discrete media, e.g. different fonts/styles/formats of text
pages and different resolutions of images, are timeindependent
and sometimes the term of static media is also
applicable. Continuous media or dynamic media always has
temporal features, e.g. audio (music and speech) and video
(animation and digital video). Hypermedia is not constrained
to be linear, which contains links to other media.
Combination of two or more media streams, while
synchronized with each other, is referred to as multimedia.
Different media processing approaches can be used on
different types of media in order to obtain different kinds of
results, but on the other hand it is still possible to realise
some common ideas. Examples include media digitizing,
coding technology and standards of media compression,
media enhancement, and media recognition.
Fig. 1 presents a paradigm of the three targets together
with their taxonomy, where shaded backgrounds represent
interfaces between them.
III. MOBILE SECURITY FRAMEWORK
This section briefly outlines the sketch of the mobile
security framework model that we propose. The framework
layout is figured as a hierarchical architecture consisting of,
from bottom to top, three different layers including Property
Theory layer, Limited Targets layer, and Classified
Applications layer, as illustrated in Fig. 2. A more detailed
explanation of each layer of the framework model can be
found in the next section.
On the lowest layer, Property Theory, some basic issues of
security are considered as the fundamental points of mobile
security research, as follows. Note that since security can be
treated as just a property of information technology and
systems, discussions in this layer are common to all the other
fields besides the area of mobile communications.
· Security objectives, i.e. to formulate and determine
what kinds of security goals are going to be achieved
and to what extent.
· Attacks, i.e. to analyse and distinguish the possible
threats and offensive methods from all the directions
against which targets are to be protected.
· Security mechanisms, i.e. to find and do research on
the effective techniques to fulfil security objectives.
· Security management, i.e. to prescribe and carry out
laws and policies relevant to the administration and
maintenance of security targets, including the training
of personnel for security consciousness.
· Security evaluation, including identification of critical
components and assessment of vulnerabilities,
inspection of performance interference, evaluation of
privacy and robustness, and determination of testing
strategy and benchmarks.
Based on the discussion in Section II and using the
limitation operator of the term “mobile”, we get the Limited
Targets layer as the research domains of mobile security.
This layer seems to be the most important part of the whole
research layout, since, based on the common security theory
Application Layer
Wireless/Mobile
Wired/Fixed
QoS; Distributed MM
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Communication Entity
Databases
Computing Modes
Programming Languages
Operating Systems
Terminals & Devices
Computer Networks
Human Interfaces
Media Computing
Media Communications
Recognition
Enhancement
Compression
Digitizing
Hyper-M
Video
Audio
Image
Text
Network Multimedia
Systems & Services
Networking
Media Processing
Computer &
Computing
Fig. 1. Three targets related to security
below, the specific character of mobile targets is considered
in each of the three overlapping targets as follows, which at
the same time acts as the main basis for various mobile
communication applications further.
· Mobile networking, including different mobile
network structures and protocols related to security.
· Mobile computing, security problems related mainly
to mobile agents and light-weight operating systems
and terminals, with the stratification concept in mind.
· Mobile media, usually two aspects, i.e. media content
and copyright, are considered for the security
protection during transmission and processing
respectively.
Some applications, which cannot be successfully deployed
without the support from secure mobile networks and
computing and media processing environment, are classified
and listed on the top layer. Obviously here are just some
representative examples of the diverse applications.
· Messaging, e.g. UM (Unified/Universal Message),
PIM (Personal Information Management), Email, Fax,
SMS (Short Message Service).
· Telephony, including VoIP (Voice over IP), IPT (IP
Telephony), Video Conference, etc.
· Tele-Services, such as Tele-Medicine, Tele-
GeoProcessing, Tele-Education, etc.
· Business, with mobile E-Commerce as the
representative.
Note that there are some overlays between these
application classes although most are relatively independent.
IV. FRAMEWORK LAYERS DESCRIPTIONS
This section describes the framework components on each
layer in more detail by figuring the possible research topics.
A. Property Theory Layer
We focus more on the technical area of security here,
which by no means implies that security management and
evaluation are less important.
In total, there are three different security objectives on data
that are to be reached, one or all, including
· Confidentiality, i.e. the data can only be used by
authorized users and/or parties.
· Integrity, i.e. the data cannot be modified during
transfer and storage by adversaries.
· Availability, i.e. the data is always available for
authorized use.
Attacks to security can be classified according to:
· Intrusion orientations, from both inside and outside.
· Sources, from either malicious or unconscientious
people as well as physical environment or
components.
· Attacked targets, including infrastructures (router,
server, file, software, protocol, etc.), information (data
embezzling, data disrupting, etc.), and service (web
sites, FTP archives, etc.).
· Methods, including attacking, hijacking, intercepting,
monitoring, scanning, sniffing, spoofing, etc.
Security mechanisms and techniques are obviously far
more diversiform than can be totally listed here, so only a
basic taxonomy is provided below.
· Protection, including physical protections, access
controls, barring and filtering firewalls, and security
protocols.
· Cryptography, e.g. encryption algorithms and
standards, public and secret key infrastructures, and
key management protocols.
· Authentication, including data authentication (MACs,
digital signatures, digital certificates), party
authentication (weak and strong authentications), and
user authentication by secret codes (password, PIN)
and physical tokens (smart card, etc.) or biometric
features (e.g. fingerprints, signatures, blood vessels of
retina, voice, facial patterns).
· Monitoring and detection, such as auditing, intrusion
detection, scanning, incident handling.
Copyright
Content Mobile
Media
Mobile
Networking
Mobile
Computing
OS
Agent
Terminal
Protocol
Architecture
Limited Targets
Property Theory
Classified Messaging Applications
UM/PIM/Email/Fax/SMS
Attacks
Objectives Management Evaluation
Mechanisms
Security
Telephony
VoIP/IPT/Conferencing
Tele-Services
Medicine/GeoProcessing
Business
Mobile E-Commerce
Others
Game/Entertainment
Fig. 2. Mobile Security Framework
B. Limited Targets Layer
1) Mobile Networks: Security issues have not been
satisfactorily solved in 2G mobile communication protocols
and networks (GSM). The deficiencies and limitations
include lack or absence of mutual authentication, end-to-end
security, non-repudiation, and user anonymity, together with
protocol weaknesses. In 3G wireless networks (IMT-2000),
comprehensive requirements are considered, in categories
related to access, radio interface, terminal, user association,
network operation, security management, etc. As 4G vision is
paving its way to reality, more topics of wireless and mobile
networks need to be concerned, e.g. mobile ad hoc networks,
WLAN, PAN and micro-cellular environments.
As for mobile protocols, the research focuses mainly on
secure Mobile IP through incorporating IPSEC protocol and
extending the Mobile IP protocol. Interesting topics include
encryption, authentication, registration, care-of address,
handoff, route, firewall, etc. Note that although the mobile
attribute throws effects mainly on lower layers of the protocol
stack, it also somewhat influences high layer protocols as
application and transport.
2) Mobile Computers and Computing: Mobile agent is one
of the most popular types of distributed and mobile
computing environment [7, 8]. Mobile software agent extends
the concept of software object with the attributes and
capabilities of mobility, reactivity, autonomy, and
collaboration. Generally three different problems need to be
considered about the security of mobile agent, including
protection of a host from malicious agents, protection of an
agent from malicious hosts, and from other agents, where
attacks include damage, modification, DoS, breaking of
privacy, harassment, etc. As a result, two kinds of security
mechanisms are to be studied, as follows:
· Host protection, i.e. to protect the host and resource
from malicious access through proper definition of
interfaces based on Information Fortress Model.
Techniques include e.g. authentication credential,
access control and monitoring, code verification,
limitation techniques, and audit logging.
· Agent protection, i.e. to improve reliability through
redundancy and improve security through encryption.
Approaches include replication, persistence,
redirection, encrypted data and code, trail and code
obscuring, etc.
Mobile OS is often regarded as a kind of embedded OS,
which runs on a light-weight mobile device. The most
popular mobile light OSs include Windows CE, Palm OS,
and EPOC. Attacks to mobile OS include, just as those taking
effect in the PC world, viruses, Trojan horses, and malicious
programs in the form of rogue code. Similarly, antivirus
programs and application scanners based on hostile behaviour
are the two main methods to protect mobile applications and
OS. Java seems to be more and more important a
programming language for the construction of secure
applications. Whether mobile OS should be open or not
continues to be a hot topic for argument. Besides the
standpoint of technology, more efforts should be made to
draw the attentions of both customers and providers to the
possible risks of mobile devices.
When terminal security is discussed here, first we mean
light-weight terminals such as handheld or palm-size PDAs
or computers, second we pay attention to physical-level
security since higher level security has been involved in
previous discussions. Popular approaches include PIN for
user-to-device identification and smart card for device-toconnection
authentication. Attacks on Smart Cards fall into
two classes: invasive attack e.g. micro-probing to access the
chip surface, non-invasive attack e.g. DPA (Differential
Power Analysis), where the threat becomes much severe
when the attacker can obtain completely unsupervised access
to the smart card. Respective countermeasures include e.g.
top-layer sensor mesh against invasive attack and randomised
clock signal against non-invasive attack.
3) Mobile Multimedia: The overwhelming advantages of
digital data have led to all kinds of digital media being
composed and distributed widely over the Internet, but then
again the possibility of unrestricted duplication and unlimited
copying without loss of fidelity is brought along at the same
time. Two main techniques exist for the protection of
intellectual property rights (IPR): media encrypting and
information hiding. The former method takes care of the
protection of multimedia data during the transmission process
through suitable coding and encryption, while the latter
concerns mainly copyright protection and copy prevention.
Watermarking, as a special form of encryption, is one of the
most important techniques for information hiding, in which a
secret imperceptible digital code called digital watermark is
embedded into the multimedia data [9]. A watermark often
contains information about data origin, status, or destination.
Watermarking can be used in a wide range of media, e.g. text
document, image, video, and audio. It can also be used for
other purposes, including fingerprinting and data
authentication as well as embedded data labelling, etc. Many
kinds of attacks to a watermark exist, and so watermark
robustness is a very important research area leading to the
research of watermarking security.
C. Classified Applications Layer—Mobile E-commerce
This section uses mobile E-commerce as a representation
to describe the mobile security issues of the Classified
Applications layer. Mobile E-commerce is selected as the
discussed example because it is ever-increasingly popular as
a wireless Internet application converging a mobile
communications network with the Internet, and is thus a
promising candidate for the killer application.
Obviously the counterpart of mobile E-commerce is the
traditional E-commerce on the fixed Internet, while mobile Ecommerce
brings it into the mobile contexts: a mobile user
via mobile phone through a mobile connection [10, 11].
Mobile E-commerce comprehends all the commerce phases,
including the activities of both customer and merchant, from
searching the market and browsing sales information, through
making an order and payment, to service delivery and
customer support, and extends the fixed Web-based Ecommerce
with a full adaptation: commerce is available
anytime and anywhere at any form, according to user
preference.
Many security issues in mobile E-commerce should be
considered, and possible solutions can be based on the
security mechanisms used in the contexts of the three mobile
targets which have been introduced in the previous section,
while in the following we just provide a brief analysis of key
security requirements for a mobile E-commerce application.
· Identity Authentication, including the authentications
of both customer and merchant, to ensure between
each party of the business that the counterpart is truly
the expected one. To implement payment, usually a
financial institution is included in the scenario.
· Data Authentication, to make certain that the received
data really comes from the claimed counterpart, and at
the same time to prevent the counterpart from denial
of the bargain, i.e. non-repudiation.
· Secure communication, i.e. to keep the exchanged
information integral and confidential during the whole
communication interval.
It is worthy to notice that besides the requirements of
function and performance, such as protocol, interface, and
storage, mobile E-commerce also puts severe requirements
on the mobile terminal for security, including possible public
key functions for user and merchant authentications, digital
signature and certificate for data authentication, and private
key functions for secure communication.
V. CONCLUSIONS
This paper presents a general framework model for the
systematic research of mobile security. Some characteristics
of the framework are the following:
· It is a hierarchical structure in which mobile
applications and mobile security targets and a basic
security theory are positioned on three different layers
from top down.
· Classified mobile applications according to the
different application scenarios are considered on the
top level.
· We discuss mobile security in the entire domain of
information technology, including targets in networks
and communications, computers and computing, and
multimedia processing.
· Basic security theories are briefly introduced,
including security objectives, attacks, and
mechanisms, which are common to any limited area.
Along with the hints in the layout model, key research
topics and issues in each of the three levels of the mobile
security framework are defined respectively in the paper,
demonstrating that the framework can explicitly serve as an
effective guide to the systematic research of mobile security.
ACKNOWLEDGMENT
Financial support by the National Technology Agency of
Finland is gratefully acknowledged.
REFERENCES
[1] B.G. Evans and K. Baughan, “Visions of 4G,” Electronics &
Communication Engineering Journal, Vol. 12, No. 6, pp. 293–303,
Dec. 2000.
[2] C.-C. Lo and Y.-J. Chen, “Secure communication mechanisms for
GSM networks,” IEEE Trans. Consumer Electronics, Vol. 45, No. 4,
pp. 1074 –1080, Nov. 1999.
[3] K. Al-Tawil and A. Akrami, “A new authentication protocol for
roaming users in GSM networks,” in Proc. IEEE Int. Symp. Computers
and Communications, Red Sea, Egypt, July 1999, pp. 93–99.
[4] A. Mehrotra and L.S. Golding, “Mobility and security management in
the GSM system and some proposed future improvements,”
Proceedings of the IEEE, Vol. 86, No. 7, pp. 1480–1497, July 1998.
[5] C. Perkins,“Mobile IP and security issue: an overview, ” in Proc. First
IEEE/Popov Workshop on Internet Technologies and Services,
Moscow, Russia, Oct. 1999, pp. 131–148.
[6] A. Inoue, M. Ishiyama, A. Fukumoto, and T. Okamoto, “Secure mobile
IP using IP security primitives,” in Proc. Sixth IEEE Workshops on
Enabling Technologies: Infrastructure for Collaborative Enterprises,
MIT, Cambridge, Massachusetts, Jun. 1997, pp. 235–241.
[7] Vu Anh Pham and A. Karmouch, “Mobile software agents: an
overview,” IEEE Communications Magazine, Vol. 36, No. 7, pp. 26–
37, July 1998.
[8] M.S. Greenberg, L.C. Byington, and D.G. Harper, “Mobile agents and
security,” IEEE Communications Magazine, Vol. 36, No. 7, pp. 76–85,
July 1998.
[9] F. Hartung and M. Kutter, “Multimedia Watermarking Techniques,”
Proceedings of the IEEE, Vol. 87, No. 7, pp. 1079–1107, July 1999.
[10] D. Van Thanh, “Security issues in mobile ecommerce,” in Proc. 11th
International Workshop on Database and Expert Systems Applications,
Greenwich, London, UK, Sep. 2000, pp. 412–425.
[11] C.-W. Lan, C.-C. Chien, M.-Y. Hsieh, and I. Chen, “A mobile ecommerce
solution,” in Proc. Int.Symp. Multimedia Software
Engineering, Taipei, Taiwan, Dec. 2000, pp. 215–222.

