Abstract
Mobile phones are ubiquitous and are used for email, text messages, navigation, education, and as a pyment tool (e.g., Mobile Money - extensively used in China and Japan [1]). Consequently, mobile devices carry a lot of personal data and, if stolen, that data can be more important than the loss of the device.
Most of the works on mobile devices security have focused on physical aspects and/or access control, which do not protect the private data on a stolen device that is in the post authentication state. However, some existing works, e.g. Laptop Cop [2] aim to protect data on stolen devices by remotely and manually deleting it, which requires user intervention. It may take hours before the user notices the loss of his device.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chen, L.-D.: A Model of Consumer Acceptance of Mobile Payment. J. IJMC 6(1), 32–52 (2008)
Laptop COP Software, http://www.laptopcopsoftware.com/index.html
Yazji, S., Chen, X., Dick, R.P., Scheuermann, P.: Implicit User Re-authentication for Mobile Devices. In: Zhang, D., Portmann, M., Tan, A.-H., Indulska, J. (eds.) UIC 2009. LNCS, vol. 5585, pp. 325–339. Springer, Heidelberg (2009)
Sun, B., Yu, F., Wu, K., Xiao, Y., Leung, V.: Enhancing Security Using Mobility-Based Anomaly Detection in Cellular Mobile Networks. IEEE Trans. Vehicular Technology (2007)
Hall, J., Barbeau, M., Kranakis, E.: Anomaly-Based Intrusion Detection Using Mobility Profiles of Public Transportation Users. In: Proc. WiMob (2005)
Yan, G., Eidenbenz, S., Sun, B.: Mobi-Watchdog: You Can Steal, But You Can’t Run! In: Proc. WiSec (2009)
Gonzalez, M.C., Hidalgo, C.A., Barabasi, A.L.: Understanding Individual Human Mobility Patterns. J. Nature 453 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Yazji, S., Dick, R.P., Scheuermann, P., Trajcevski, G. (2012). Efficient Intrusion Detection for Mobile Devices Using Spatio-temporal Mobility Patterns. In: Sénac, P., Ott, M., Seneviratne, A. (eds) Mobile and Ubiquitous Systems: Computing, Networking, and Services. MobiQuitous 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 73. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29154-8_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-29154-8_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29153-1
Online ISBN: 978-3-642-29154-8
eBook Packages: Computer ScienceComputer Science (R0)