Willingness-Based Access Control for Mobile Terminals

Article Preview

Abstract:

This paper briefly describes the current security situation of the mobile Internet, compares the difference between mobile terminals and PC terminals in terms of security, and discusses the security-related research of mobile terminals. After analyzing the feasibility and expected effect of the implementation of access control in a mobile terminal, we propose a Willingness-based Access Control scheme for mobile Internet. We design and complete the pay function with variable difficulties on the basis of MD5. Then, we build an experimental environment with mobile phone programming, test the scheme and analyze the results. The conclusions are given in the final.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2693-2697

Citation:

Online since:

June 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] DCCI. User survey of 2011 China mobile Internet(in Chinese). Beijing: Chinese Internet Network Information Center, 2011.

Google Scholar

[2] Leavitt.N. Mobile phones: the next frontier for hackers? IEEE Computer Society, 2005, 38(4): 20-30.

DOI: 10.1109/mc.2005.134

Google Scholar

[3] Shabtai.A. Google Android: A Comprehensive Security Assessment. IEEE Security and Privacy, 2010, 8(2):35-44.

DOI: 10.1109/msp.2010.2

Google Scholar

[4] Wei Liang. Discussion on the safety of the mobile Internet (in Chinese). Modern telecommunications technology.2009, 4(4):10-13.

Google Scholar

[5] Cryptographic hash function. http://en.wikipedia.org/wiki/One-way_hash_function.

Google Scholar

[6] Sandhu, R.S. Role-based Access Model. IEEE Computer, 1996, 29(2):38-47.

Google Scholar

[7] Charlie Miller. Mobile Attacks and Defense. IEEE Security and Privacy, 2011, 9(4): 68-70.

Google Scholar

[8] RFC 1321-1992. The MD5 Message-Digest Algorithm. MIT Laboratory for Computer Science and RSA Data Security.

Google Scholar

[9] William Enck, Machigar Ongtang, Patrick McDaniel. Understanding Android Security. IEEE Security and Privacy, 2009, 7(1): 50-57.

DOI: 10.1109/msp.2009.26

Google Scholar