Smartphone Remote Lock and Data Wipe System Based on Message Authentication Codes

Article Preview

Abstract:

Smartphones provide portability and convenience to users by means of personal information profiles. However, when the phones are lost or stolen, security threats may cause personal information to be exposed. To resolve these problems, the network operator must provide users with remote-locking or wiping-out functions so that malicious users cannot use the mobile devices. In this paper, we propose a smartphone remote lock and data wipe scheme using password-based message authentication. The proposed scheme provides users with a mechanism for verifying the integrity of command messages so that malicious users cannot attack the device by intentionally transmitting lock or wipe commands. In addition, we show that the system is designed to fit in the standard SMS PDU, and we test the performance in terms of memory usage, authentication time, and bandwidth usage by implementing it on Android smartphones.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

267-271

Citation:

Online since:

December 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Y.F. Chang, C.S. Chen and H. Zhou: Smart Phone For Mobile Commerce, Computer Standards & Interfaces, Vol. 31, Issue 4, Jun. (2009).

Google Scholar

[2] S.G. Punfa and R.P. Mislan: Smartphone Device Analysis, Small Scale Digital Device Forensics Journal, Vol. 2, No. 1, Jun. (2008).

Google Scholar

[3] Nokia Co.: Over-the-air Device Kill Pill and Lock, Patent Application No: US 11/560, 048, Nov. 15 (2006).

Google Scholar

[4] Nokia Mobile Phones Ltd.: Method and Apparatus for Controlling and Securing Mobile Phones That are Lost, Stolen or Misused, Patent Application No: US 09/610, 760, Jun. 6 (2000).

Google Scholar

[5] Sony Ericsson Mobile Communication: Mobile Apparatus with Remote Lock and Control Function, Patent Application No: US 10/554, 490, Apr. 28 (2004).

Google Scholar

[6] RSA Laboratories: PKCS #5 v2. 0: Password-Based Cryptography Standard, Mar. (1999).

Google Scholar

[7] 3GPP TS 23. 038 V7. 0. 0: 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Alphabets and Language-specific Information (Release 7), Mar. (2006).

Google Scholar

[8] GPP TS 23. 040 V6. 7. 0: 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Technical Realization of the Short Message Service (SMS) (Release 6), Mar. (2006).

Google Scholar

[9] G.L. Bodic: Mobile Messaging Technologies and Services, John Wiley & Sons (2002).

Google Scholar

[10] Information on http: /download-llnw. oracle. com/javase/1. 4. 2/docs/api/jav-ax/crypto/package -summary. html.

Google Scholar