A Multi-Indicator Light Weight Defense Scheme for Smartphone Camera-Based Attacks

  • Arnold Mashud Abukari Department of Computer Science, Tamale Technical University, Tamale, Ghana
  • Abukari Abdul Aziz Danaa Department of Computer Science, Tamale Technical University, Tamale, Ghana
  • Diyawu Mumin Department of Computer Science, Tamale Technical University, Tamale, Ghana
  • Shiraz Ismail Department of Computer Science, Tamale Technical University, Tamale, Ghana
Keywords: camera-based attack, smartphone, cyber attack, random forest, light weight defense scheme, cyber security

Abstract

Over the years, cyber criminals have succeeded in exposing some vulnerabilities in smartphones and have exploited those vulnerabilities in several ways. In recent years, one of the growing attacks on smartphones is the camera-based attacks. Attackers are able to exploit smartphone vulnerabilities to cause harm to smartphone users by using cameras of the smartphones to capture images and videos. Privacy leakage and confidentiality remains a big threat to smartphone users and this has gained attention from researchers and industry players across the world. In this research paper, a multi-indicator light weight defense scheme is presented to address the rising smartphone camera-based attacks. The random forest algorithm, the Gini coefficient index and the entropy method are adopted in the designing of the proposed scheme. The means of the threat indicators and the Mean Square Deviation (MSD) is also calculated in order to ensure accurate scores and weight assignments of the threat indicators. The proposed multi-indicator light weight scheme demonstrated to be consistent with real situations. A review of literature in camera-based attacks is also presented in this research paper.

References

Franklin, M. K., Ray, A., & Bhattacharyya, D. K. (2017). Lightweight cryptographic module for secure communication in Android. International Journal of Network Security, 19(6), 954-962.

Gao, D., Li, K., & Yao, Y. (2018). Efficient malware detection for Android using deep neural networks. Future Generation Computer Systems, 86, 1171-1179.

Statista (2021). Android OS platform version market share worldwide from 2013 to 2021. Retrieved from https://www.statista.com/statistics/271774/share-of-android-platforms-on-mobile-devices-with-google-play/

Weichbrodt, N., Tölle, D., & Lukasiewycz, M. (2018). Lightweight secure bootstrapping of Android devices. IEEE Transactions on Dependable and Secure Computing, 15(4), 578-590.

Al-Riyami, S. S., & Paterson, K. G. (2003). Lightweight authentication protocols for securing RFID. Proceedings of the 8th Australasian Conference on Information Security and Privacy (ACISP 2003) (pp. 149-164). Springer.

Bogdanov, A., Knežević, M., Leander, G., Toz, D., Varici, K., & Verbauwhede, I. (2007). PRESENT: An ultra-lightweight block cipher. In Lecture notes in computer science: Vol. 4727. Cryptographic hardware and embedded systems - CHES 2007 (pp. 450-466). Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74735-2_31

Großschädl, J., & Indesteege, S. (2014). Lightweight cryptography: Cryptographic engineering for a pervasive world. International Journal of Cryptography and Information Security, 4(1), 11-24.

Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: issues, practices, and architectures. Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS ’04) (pp. 210-219). ACM. https://doi.org/10.1145/1030083.1030112

Sarkar, P., Singh, A., & Karmakar, A. (2019). Lightweight symmetric key encryption algorithm based on diffusion and substitution. Journal of Ambient Intelligence and Humanized Computing, 10(10), 4151-4164.

Bernstein, D. J. (2005). Salsa20 Specification (Version 1.0). Retrieved from https://cr.yp.to/snuffle/salsa20.html

Bertoni, G., Daemen, J., Peeters, M., & Van Assche, G. (2017). The Gimli permutation. In International Conference on Cryptographic Hardware and Embedded Systems (pp. 3-28). Springer.

Guo, J., Peyrin, T., & Poschmann, A. (2011). The PHOTON family of lightweight hash functions. In International Conference on Selected Areas in Cryptography (pp. 157-175). Springer.

Deshpande, S. P., Pattalwar, S. V., & Lohiya, P. B. (2017). Light weight defense mechanism against camera based attacks. IRA-International Journal of Technology & Engineering, 7, 137-147. https://doi.org/10.21013/jte.icsesd201714

Wu, L., Du, X., & Fu, X. (2014). Security threats to mobile multimedia applications: Camera-based attacks on mobile phones. IEEE Communications Magazine, 52, 80-87. https://doi.org/10.1109/mcom.2014.6766089

Nage, G., Jadhav, A. R., Kazi, A. N., & Mundhe, S. (2016). Camera based attacks on mobile phones. International Journal of Modern Trends in Engineering and Research, 3.

Ramesh, G., Pooja, B. R., Shilpa, B., Sujatha, B., & Suma, M. (2018). Security threats to mobile multimedia applications: Camera-based attacks on mobile phones. International Journal of Advance Research and Innovative Ideas in Education, 4(2), 3015-3020.

Hussain, M., Al-Haiqi, A. M., Zaidan, A. A., Zaidan, B. B., Kiah, M. L., Anuar, N. B., & Abdulnabi, M. (2016). The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks. Pervasive Mob. Comput., 25, 1-25. https://doi.org/10.1016/j.pmcj.2015.12.001

Rogez, G., Rihan, J., Ramalingam, S., Orrite, C., & Torr, P. H. S. (2008). Randomized trees for human pose detection. In 2008 IEEE Conference on Computer Vision and Pattern Recognition (pp. 1-8). Anchorage, AK, USA. https://doi.org/10.1109/cvpr.2008.4587617

Zhang, K. et al. (2019). Random forest algorithm-based lightweight comprehensive evaluation for wireless user perception. IEEE Access, 7, 173477-173484. https://doi.org/10.1109/ACCESS.2019.2956285

Vennam, P., Pramod, T. C., Thippeswamy, B. M., Kim, Y.-G., & Pavan Kumar, B. N. (2021). Attacks and preventive measures on video surveillance systems: A review. Applied Sciences, 11(12), 5571. https://doi.org/10.3390/app11125571

Deshpande, S., Pattalwar, S., Lohiya, P. (2017). Light weight defense mechanism against camera based attacks. Proceedings of the International Conference on Science & Engineering for Sustainable Development (2017), 137-147. https://doi.org/10.21013/jte.icsesd201714

Eisenbarth, T., Gong, Z., Güneysu, T., Heyse, S., Indesteege, S., Kerckhof, S., Koeune, F., Nad, T., Plos, T., Regazzoni, F. et al. (2012). Compact implementation and performance evaluation of block ciphers in ATtiny devices. In Progress in Cryptology - AFRICACRYPT 2012 (pp. 172-187). Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31410-0_11

Okamura, T. (2017). Lightweight cryptography applicable to various IoT devices. NEC Technical Journal, 12(1), 67-71.

Published
2023-09-29
How to Cite
Abukari, A. M., Danaa, A. A. A., Mumin , D., & Ismail, S. (2023). A Multi-Indicator Light Weight Defense Scheme for Smartphone Camera-Based Attacks. Earthline Journal of Mathematical Sciences, 13(2), 543-553. https://doi.org/10.34198/ejms.13223.543553
Section
Articles

Most read articles by the same author(s)