ePrints@IIScePrints@IISc Home | About | Browse | Latest Additions | Advanced Search | Contact | Help

Random security scheme selection for mobile transactions

Babu, B Sathish and Venkataram, Pallapa (2009) Random security scheme selection for mobile transactions. In: Security and Communication Networks, 2 (6). pp. 694-708.

Full text not available from this repository. (Request a copy)
Official URL: http://www3.interscience.wiley.com/journal/1223721...

Abstract

Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.

Item Type: Journal Article
Publication: Security and Communication Networks
Publisher: John Wiley and Sons
Additional Information: Copyright of this article belongs to John Wiley and Sons.
Keywords: mobile; wireless security; dynamic; transactions based; cognitive agents
Department/Centre: Division of Electrical Sciences > Electrical Communication Engineering
Date Deposited: 08 Mar 2010 13:03
Last Modified: 09 Oct 2018 15:49
URI: http://eprints.iisc.ac.in/id/eprint/25893

Actions (login required)

View Item View Item