Efficient intrusion detection for mobile devices using spatio-temporal mobility patterns

Sausan Yazji, Robert P. Dick, Peter I Scheuermann, Goce Trajcevski

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Mobile phones are ubiquitous and are used for email, text messages, navigation, education, and as a pyment tool (e.g., Mobile Money - extensively used in China and Japan [1]). Consequently, mobile devices carry a lot of personal data and, if stolen, that data can be more important than the loss of the device. Most of the works on mobile devices security have focused on physical aspects and/or access control, which do not protect the private data on a stolen device that is in the post authentication state. However, some existing works, e.g. Laptop Cop [2] aim to protect data on stolen devices by remotely and manually deleting it, which requires user intervention. It may take hours before the user notices the loss of his device.

Original languageEnglish (US)
Title of host publicationMobile and Ubiquitous Systems
Subtitle of host publicationComputing, Networking, and Services - 7th International ICST Conference, MobiQuitous 2010, Revised Selected Papers
PublisherSpringer Verlag
Pages342-343
Number of pages2
ISBN (Print)9783642291531
DOIs
StatePublished - 2012
Event7th International ICST Conference on Mobile and Ubiquitous Systems, MobiQuitous 2010 - Sydney, NSW, Australia
Duration: Dec 6 2010Dec 9 2010

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume73 LNICST
ISSN (Print)1867-8211

Other

Other7th International ICST Conference on Mobile and Ubiquitous Systems, MobiQuitous 2010
Country/TerritoryAustralia
CitySydney, NSW
Period12/6/1012/9/10

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Efficient intrusion detection for mobile devices using spatio-temporal mobility patterns'. Together they form a unique fingerprint.

Cite this