Security Module Protecting the Privacy of Mobile Communication

  • Andrey Starikovskiy
  • Leonid Panfilov
  • Ilya ChugunkovEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 636)


This article describes a communication system that protects user data against theft or damage. In addition to any standard communications system elements the described communication system includes a security module. The security module is installed on the data transmission bus between the processor and communications. The security module includes a processing unit, capable of handling data according to a particular algorithm: encryption, masking or other. It eliminates the possibility of the transmission of any data to communication modules due to undocumented features of the processor, or any other module of the mobile device. The operating system and the security module only know the processing algorithm. Consequently, no information, other than that sent to the operating system leaves the device. The security module provides security and confidentiality of data; it does not require the production of a special security processor or any other units and can be implemented on the element base of leading world manufacturers.


Security module Ensuring the confidentiality of mobile communication Secure communication system 



This work was supported by Competitiveness Growth Program of the Federal Autonomous Educational Institution of Higher Professional Education National Research Nuclear University MEPhI (Moscow Engineering Physics Institute).


  1. 1.
    Anandajayam, P., Kumar, D.A.: Preferences extraction and ranking functions in mobile search. In: 2014 International Conference on Information Communication and Embedded Systems (ICICES), pp. 1–5, 27–28 February 2014Google Scholar
  2. 2.
    Zhang, P., Kumabe,; Yuichi Kogure, A., Akutagawa, M., Kinouchi, Y., Zhang, Q.: New functions developed for ICU/CCU remote monitoring system using a 3G mobile phone and evaluations of the system. In: 2008 Proceedings of the 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS 2008, pp. 5342–5345, 20–25 August 2008Google Scholar
  3. 3.
    Hancox, G., Richardson, J., Morris, A.: Drivers’ willingness to engage with their mobile phone: the influence of phone function and road demand. Intell. Transp. Syst. IET 7(2), 215–222 (2013)CrossRefGoogle Scholar
  4. 4.
    Mikhaylov, D.M., Starikovskiy, A.V., Zuykov, A.V., Froimson, M.I., Smirnov, A.S., Sychev, N.V., Boruchinkin, A.Y., Fesenko, S.D.: Mathematical models of threats of unauthorized access to sensitive information of mobile network subscribers and measures to protect mobile system. J. Theor. Appl. Inf. Technol. 78(1), 1–8 (2015)Google Scholar
  5. 5.
    Mikhaylov, D., Starikovskiy, A., Lebedev, G., Uleykin, E., Dmitry, R., Alexey, E., Alexander, B., Anastasia, T.: Developing a system for text-messages protection. In: Proceedings of the 8th International Conference on Security of Information and Networks, Sochi, Russia, pp. 326–329, 8–10 September 2015Google Scholar
  6. 6.
    Dmitry, M., Igor, Z., Andrey, S., Sergey, K., Anastasia, T., Alexander, Z.: Review of malicious mobile applications, phone bugs and other cyber threats to mobile devices. In: Proceedings of 2013 5th IEEE International Conference on Broadband Network & Multimedia Technology (5th IEEE IC-BNMT 2013), Guilin, China, pp. 302–305, 17–19th November 2013Google Scholar
  7. 7.
    Pu, S., Chen, Z., Huang, C., Liu, Y., Zen, B.: Threat analysis of smart mobile device. In: Proceedings of the 31th URSI General Assembly and Scientific Symposium, pp. 1–3 (2014)Google Scholar
  8. 8.
    Jana, D.; Bandyopadhyay, D., Management of security and privacy issues of application development in mobile cloud environment: a survey. In: Recent Advances and Innovations in Engineering (ICRAIE), pp. 1, 6, 9–11 May 2014Google Scholar
  9. 9.
    Mikhaylov, D.M., Zuykov, A.V., Froimson, M.I., Starikovskiy, A.V., Kharkov, S.M.: Algorithms for data analysis and detection of changes in the security level of data transmission in wireless networks. J. Theor. Appl. Inf. Technol. 69(2), 405–413 (2014)Google Scholar
  10. 10.
    Mikhailov, D.M., Zhukov, I.Y.: Protection of cell phones from attacks. In: Iwashko A.M.M. (ed.) Foylis 2011 (2012). 192 p. (ill)Google Scholar
  11. 11.
    Kasama, T., Yoshioka, K., Inoue, D., Matsumoto, T.: Malware detection method by catching their random behavior in multiple executions. In: IEEE/IPSJ 12th International Symposium on Applications and the Internet (SAINT), pp. 262–266 (2012)Google Scholar
  12. 12.
    Igor, Z., Dmitry, M., Sergey, K., Vitaliy, K., Igor, N.: The role of software telephone bugs in mobile security. Int. J. Soft Comput. 11(1), 1–3 (2016)Google Scholar
  13. 13.
    Shurigin, V.A., Makarov, V.V., Vavrenyuk, A.B., Starikovskiy, A.V.: Use of universal coding with binary data thirds for information compression and its security. Int. J. Soft Comput. 10(6), 383–390 (2015)Google Scholar
  14. 14.
    Inoue, K., Higo, Y., Yoshida, N., Choi, E., Kusumoto, S., Kim, K., Park, W., Lee, E.: Experience of finding inconsistently-changed bugs in code clones of mobile software. In: Proceedings of the 6th International Workshop on Software Clones, IWSC 2012, pp. 94–95 (2012)Google Scholar
  15. 15.
    李家宽: Mobile and communication method. Patent application CN103139767 A, 05 June 2013Google Scholar
  16. 16.
    Asokan, N., Ekberg, J.-E., Paatero, L.: Implementation of an integrity-protected secure storage. Patent application WO2006120302 A1, 16 November 2006Google Scholar
  17. 17.
    杨成兴, 周凤珍, 智海燕, 丁文彦, 秦龙, 周林峰, 王宏斌, 赵东, 张勇: Power system mobile phone terminal security reinforcing system. Patent application CN101925057 A, 22 December 2010Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  • Andrey Starikovskiy
    • 1
  • Leonid Panfilov
    • 1
  • Ilya Chugunkov
    • 1
    Email author
  1. 1.National Research Nuclear University MEPhI (Moscow Engineering Physics Institute)MoscowRussia

Personalised recommendations