A Multi-Indicator Light Weight Defense Scheme for Smartphone Camera-Based Attacks
Abstract
Over the years, cyber criminals have succeeded in exposing some vulnerabilities in smartphones and have exploited those vulnerabilities in several ways. In recent years, one of the growing attacks on smartphones is the camera-based attacks. Attackers are able to exploit smartphone vulnerabilities to cause harm to smartphone users by using cameras of the smartphones to capture images and videos. Privacy leakage and confidentiality remains a big threat to smartphone users and this has gained attention from researchers and industry players across the world. In this research paper, a multi-indicator light weight defense scheme is presented to address the rising smartphone camera-based attacks. The random forest algorithm, the Gini coefficient index and the entropy method are adopted in the designing of the proposed scheme. The means of the threat indicators and the Mean Square Deviation (MSD) is also calculated in order to ensure accurate scores and weight assignments of the threat indicators. The proposed multi-indicator light weight scheme demonstrated to be consistent with real situations. A review of literature in camera-based attacks is also presented in this research paper.
References
Franklin, M. K., Ray, A., & Bhattacharyya, D. K. (2017). Lightweight cryptographic module for secure communication in Android. International Journal of Network Security, 19(6), 954-962.
Gao, D., Li, K., & Yao, Y. (2018). Efficient malware detection for Android using deep neural networks. Future Generation Computer Systems, 86, 1171-1179.
Statista (2021). Android OS platform version market share worldwide from 2013 to 2021. Retrieved from https://www.statista.com/statistics/271774/share-of-android-platforms-on-mobile-devices-with-google-play/
Weichbrodt, N., Tölle, D., & Lukasiewycz, M. (2018). Lightweight secure bootstrapping of Android devices. IEEE Transactions on Dependable and Secure Computing, 15(4), 578-590.
Al-Riyami, S. S., & Paterson, K. G. (2003). Lightweight authentication protocols for securing RFID. Proceedings of the 8th Australasian Conference on Information Security and Privacy (ACISP 2003) (pp. 149-164). Springer.
Bogdanov, A., Knežević, M., Leander, G., Toz, D., Varici, K., & Verbauwhede, I. (2007). PRESENT: An ultra-lightweight block cipher. In Lecture notes in computer science: Vol. 4727. Cryptographic hardware and embedded systems - CHES 2007 (pp. 450-466). Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74735-2_31
Großschädl, J., & Indesteege, S. (2014). Lightweight cryptography: Cryptographic engineering for a pervasive world. International Journal of Cryptography and Information Security, 4(1), 11-24.
Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: issues, practices, and architectures. Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS ’04) (pp. 210-219). ACM. https://doi.org/10.1145/1030083.1030112
Sarkar, P., Singh, A., & Karmakar, A. (2019). Lightweight symmetric key encryption algorithm based on diffusion and substitution. Journal of Ambient Intelligence and Humanized Computing, 10(10), 4151-4164.
Bernstein, D. J. (2005). Salsa20 Specification (Version 1.0). Retrieved from https://cr.yp.to/snuffle/salsa20.html
Bertoni, G., Daemen, J., Peeters, M., & Van Assche, G. (2017). The Gimli permutation. In International Conference on Cryptographic Hardware and Embedded Systems (pp. 3-28). Springer.
Guo, J., Peyrin, T., & Poschmann, A. (2011). The PHOTON family of lightweight hash functions. In International Conference on Selected Areas in Cryptography (pp. 157-175). Springer.
Deshpande, S. P., Pattalwar, S. V., & Lohiya, P. B. (2017). Light weight defense mechanism against camera based attacks. IRA-International Journal of Technology & Engineering, 7, 137-147. https://doi.org/10.21013/jte.icsesd201714
Wu, L., Du, X., & Fu, X. (2014). Security threats to mobile multimedia applications: Camera-based attacks on mobile phones. IEEE Communications Magazine, 52, 80-87. https://doi.org/10.1109/mcom.2014.6766089
Nage, G., Jadhav, A. R., Kazi, A. N., & Mundhe, S. (2016). Camera based attacks on mobile phones. International Journal of Modern Trends in Engineering and Research, 3.
Ramesh, G., Pooja, B. R., Shilpa, B., Sujatha, B., & Suma, M. (2018). Security threats to mobile multimedia applications: Camera-based attacks on mobile phones. International Journal of Advance Research and Innovative Ideas in Education, 4(2), 3015-3020.
Hussain, M., Al-Haiqi, A. M., Zaidan, A. A., Zaidan, B. B., Kiah, M. L., Anuar, N. B., & Abdulnabi, M. (2016). The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks. Pervasive Mob. Comput., 25, 1-25. https://doi.org/10.1016/j.pmcj.2015.12.001
Rogez, G., Rihan, J., Ramalingam, S., Orrite, C., & Torr, P. H. S. (2008). Randomized trees for human pose detection. In 2008 IEEE Conference on Computer Vision and Pattern Recognition (pp. 1-8). Anchorage, AK, USA. https://doi.org/10.1109/cvpr.2008.4587617
Zhang, K. et al. (2019). Random forest algorithm-based lightweight comprehensive evaluation for wireless user perception. IEEE Access, 7, 173477-173484. https://doi.org/10.1109/ACCESS.2019.2956285
Vennam, P., Pramod, T. C., Thippeswamy, B. M., Kim, Y.-G., & Pavan Kumar, B. N. (2021). Attacks and preventive measures on video surveillance systems: A review. Applied Sciences, 11(12), 5571. https://doi.org/10.3390/app11125571
Deshpande, S., Pattalwar, S., Lohiya, P. (2017). Light weight defense mechanism against camera based attacks. Proceedings of the International Conference on Science & Engineering for Sustainable Development (2017), 137-147. https://doi.org/10.21013/jte.icsesd201714
Eisenbarth, T., Gong, Z., Güneysu, T., Heyse, S., Indesteege, S., Kerckhof, S., Koeune, F., Nad, T., Plos, T., Regazzoni, F. et al. (2012). Compact implementation and performance evaluation of block ciphers in ATtiny devices. In Progress in Cryptology - AFRICACRYPT 2012 (pp. 172-187). Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31410-0_11
Okamura, T. (2017). Lightweight cryptography applicable to various IoT devices. NEC Technical Journal, 12(1), 67-71.
This work is licensed under a Creative Commons Attribution 4.0 International License.