113,032 research outputs found

    A Framework for Privacy and Hate Speeches Control on Social Media in Mobile Computing

    Get PDF
    The hype in information technology has led to the use of mobile devices to carry out several activities such as financial transactions, communications, learning and other related activities using the internet. Social networking platforms today are used to facilitate the activities carried out on mobile devices. The use of these social network platforms such as Facebook, Twitter, Whatsapp, Snapchat, Instagram among others on mobile devices is called mobile social network. A mobile social network makes it faster and easier for users to relate to one another and carry out other related activities at convenience. The major challenge with the use of social network applications on mobile devices is that, many illegal activities are carried out such as hate speeches and bigotry statement which has demeaning the interest of users. This research work proposes a technique for discovering and blocking hate speeches and bigotry users on social network platforms using text scanning and matching algorithm; in order to curtail the damages caused to national security and unity by such statement. Keywords: Mobile social network, social network

    eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

    Get PDF
    The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system

    CryptKi: Mobile Hardware Wallet

    Get PDF
    Cryptocurrencies are rapidly receiving mainstream attention and adoption. As a result, new technologies are developing to store and transact cryptocurrencies to keep up with a rapidly developing market. We have developed a way to utilize a mobile phone to communicate with the Ethereum blockchain in order to monitor and initiate cryptocurrency transactions. The project allows users to create new Ethereum addresses and to send arbitrary amounts of Ether to existing Ethereum addresses, while maintaining security for the end user. We conclude that this method of communication with the Ethereum blockchain is viable and is an avenue for exploration in the future. As a result from this project, we anticipate a growth of new cryptocurrency applications on mobile devices. Furthermore, the various security features utilized in this project such as pin randomization, mnemonic recovery, and hardware level encryption can be implemented in other applications to increase security for all users

    A data-centric model for smartphone security

    Get PDF
    Recently the usage of mobile devices has increased rapidly and it will be growing even more with enhancements in mobile device's functionality. Due to their enhanced functionality, mobile devices are used in corporate businesses and carry valuable information such as corporate transactions. So the security of mobile devices needs to be improved.This paper discusses various vulnerabilities of different components and functionalities of mobile devices such as SMS, wireless and applications. Moreover, mobile malware threats are explained and their effects are studied. Finally, a data-centric model to protect all the vulnerabilities and prevent application and malware threats is suggested. The model is able to ensure confidentiality, integrity and availability of data stored on mobile devices

    Design of Prototype Payment Application System With Near Field Communication (NFC) Technology based on Android

    Get PDF
    Since the late 1990s, people have enjoyed a comfortable lifestyle. Mobile devices supported by the development of wireless networks have spread throughout the world. People can get information, order tickets, download songs and perform commercial transactions, called mobile commerce. Mobile commerce applications become the most popular application for mobile device users who want to do business and financial transactions easily and securely, anytime and anywhere they are. Today the use of physical cash is experiencing a decline in popularity in the business world, because it is being replaced by non-physical payments are often called electronic money (e-money). An important technology behind mobile payments is called Near Field Communication (NFC). As an indication that the NFC has tremendous business potential, leading companies like Nokia, Microsoft, Visa Inc., and MasterCard Worldwide and NXP Semiconductors, is actively engaged on them. Payment processing integrated with NFC technology based mobile operating system that is a trend today is Android that support NFC technology is version 2.3.3 Gingerbread. The prototype application is designed to pay for 2 on the user side of the user as consumer and the merchant side as a trader or seller by using the handset that already have NFC technology is Google Samsung Nexus S. Pay an application prototype also implements the concept of security in e-commerce transactions by using the protocol-to-Tag Tag so that the user needs for security and comfort during the financial transaction are met. &nbsp

    A Policy Analysis of Cybersecurity and Mobile Applications: Implications on the Media Space

    Get PDF
    This study presents discussion for several examples that illustrates the importance of having a security policy for mobile phones. The study further examines the importance of developing a national security policy created for mobile devices in order to protect sensitive, and personal data to safeguard the media space. By inspection, it was observed from the literature that smartphones are becoming a vehicle to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of smartphones do not have pre-installed security software. This lack in security is an opportunity for malicious cyber attackers to hack into the various devices that are popular (i.e. Android, iPhone and Blackberry). Traditional security software found in personal computers (PCs), such as firewalls, antivirus, and encryption, is not currently available in smartphones. Moreover, smartphones are even more vulnerable than personal computers because more people are using smartphones to do personal tasks. Nowadays, smartphone users can email, use social networking applications (Facebook and Twitter), buy and download various applications and shop. Furthermore, users can now conduct monetary transactions, such as buying goods, redeeming coupons and tickets, banking and processing point-of-sale payments. Monetary transactions are especially attractive to cyber attackers because they can gain access to bank account information after hacking a user’s smartphone. Lastly, smartphones are small and are easy to carry anywhere. Unfortunately, the convenience of using smartphones to do personal task is the loophole cyber attackers need to gain access to personal data. Keywords: Smartphones, Social Media, Cybersecurity, Computers, E-commerce, Operating Systems, Internets, Browsers DOI: 10.7176/ISDE/13-1-04 Publication date:March 31st 202

    A new architecture for secure two-party mobile payment transactions

    Get PDF
    xi, 229 leaves : ill. ; 29 cmThe evolution of wireless networks and mobile device technologies has increased concerns about performance and security of mobile systems. We propose a new secured applicationlevel architecture for a two-party mobile payment transaction that is carried out between a resource-limited mobile device and a resource-rich computer server over wireless networks. As an example of such transactions, the mobile banking transaction is focused on throughout this thesis. The proposed architecture, namely SA2pMP, employs a lightweight cryptography scheme (combining both a Public-key cryptography algorithm (ECDSA) and a Symmetric-key cryptography algorithm (AES)), a multi-factor authentication mechanism, and a transaction log strategy. The proposed architecture is designed to satisfy the four properties of confidentiality, authentication, integrity and non-repudiation that are required by any secure system. The architecture can be implemented on a Java ME enabled mobile device. The security API library can be reused in implementing other two-party mobile applications. The present study shows that SA2pMP is a unique lightweight security architecture providing comprehensive security for two-party mobile payment transactions. In addition, simulations demonstrate that SA2pMP can be installed in resource-limited mobile devices as a downloadable software application. The main contribution of the thesis is to suggest a design for a security architecture for two-party mobile payment transactions, for example, mobile banking. It suggests a four-layer model of mobile payment participants, based on Karnouskos (2004). This model clarifies how participants are involved in a mobile payment transaction. In addition, an improved model is suggested to guide security aspects of system design, which is based on an Onion Layer Framework (Wei, C.Liu, & Koong, 2006)
    corecore