Skip to main content

Security Module Protecting the Privacy of Mobile Communication

  • Conference paper
  • First Online:
Biologically Inspired Cognitive Architectures (BICA) for Young Scientists (BICA 2017)

Abstract

This article describes a communication system that protects user data against theft or damage. In addition to any standard communications system elements the described communication system includes a security module. The security module is installed on the data transmission bus between the processor and communications. The security module includes a processing unit, capable of handling data according to a particular algorithm: encryption, masking or other. It eliminates the possibility of the transmission of any data to communication modules due to undocumented features of the processor, or any other module of the mobile device. The operating system and the security module only know the processing algorithm. Consequently, no information, other than that sent to the operating system leaves the device. The security module provides security and confidentiality of data; it does not require the production of a special security processor or any other units and can be implemented on the element base of leading world manufacturers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Anandajayam, P., Kumar, D.A.: Preferences extraction and ranking functions in mobile search. In: 2014 International Conference on Information Communication and Embedded Systems (ICICES), pp. 1–5, 27–28 February 2014

    Google Scholar 

  2. Zhang, P., Kumabe,; Yuichi Kogure, A., Akutagawa, M., Kinouchi, Y., Zhang, Q.: New functions developed for ICU/CCU remote monitoring system using a 3G mobile phone and evaluations of the system. In: 2008 Proceedings of the 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS 2008, pp. 5342–5345, 20–25 August 2008

    Google Scholar 

  3. Hancox, G., Richardson, J., Morris, A.: Drivers’ willingness to engage with their mobile phone: the influence of phone function and road demand. Intell. Transp. Syst. IET 7(2), 215–222 (2013)

    Article  Google Scholar 

  4. Mikhaylov, D.M., Starikovskiy, A.V., Zuykov, A.V., Froimson, M.I., Smirnov, A.S., Sychev, N.V., Boruchinkin, A.Y., Fesenko, S.D.: Mathematical models of threats of unauthorized access to sensitive information of mobile network subscribers and measures to protect mobile system. J. Theor. Appl. Inf. Technol. 78(1), 1–8 (2015)

    Google Scholar 

  5. Mikhaylov, D., Starikovskiy, A., Lebedev, G., Uleykin, E., Dmitry, R., Alexey, E., Alexander, B., Anastasia, T.: Developing a system for text-messages protection. In: Proceedings of the 8th International Conference on Security of Information and Networks, Sochi, Russia, pp. 326–329, 8–10 September 2015

    Google Scholar 

  6. Dmitry, M., Igor, Z., Andrey, S., Sergey, K., Anastasia, T., Alexander, Z.: Review of malicious mobile applications, phone bugs and other cyber threats to mobile devices. In: Proceedings of 2013 5th IEEE International Conference on Broadband Network & Multimedia Technology (5th IEEE IC-BNMT 2013), Guilin, China, pp. 302–305, 17–19th November 2013

    Google Scholar 

  7. Pu, S., Chen, Z., Huang, C., Liu, Y., Zen, B.: Threat analysis of smart mobile device. In: Proceedings of the 31th URSI General Assembly and Scientific Symposium, pp. 1–3 (2014)

    Google Scholar 

  8. Jana, D.; Bandyopadhyay, D., Management of security and privacy issues of application development in mobile cloud environment: a survey. In: Recent Advances and Innovations in Engineering (ICRAIE), pp. 1, 6, 9–11 May 2014

    Google Scholar 

  9. Mikhaylov, D.M., Zuykov, A.V., Froimson, M.I., Starikovskiy, A.V., Kharkov, S.M.: Algorithms for data analysis and detection of changes in the security level of data transmission in wireless networks. J. Theor. Appl. Inf. Technol. 69(2), 405–413 (2014)

    Google Scholar 

  10. Mikhailov, D.M., Zhukov, I.Y.: Protection of cell phones from attacks. In: Iwashko A.M.M. (ed.) Foylis 2011 (2012). 192 p. (ill)

    Google Scholar 

  11. Kasama, T., Yoshioka, K., Inoue, D., Matsumoto, T.: Malware detection method by catching their random behavior in multiple executions. In: IEEE/IPSJ 12th International Symposium on Applications and the Internet (SAINT), pp. 262–266 (2012)

    Google Scholar 

  12. Igor, Z., Dmitry, M., Sergey, K., Vitaliy, K., Igor, N.: The role of software telephone bugs in mobile security. Int. J. Soft Comput. 11(1), 1–3 (2016)

    Google Scholar 

  13. Shurigin, V.A., Makarov, V.V., Vavrenyuk, A.B., Starikovskiy, A.V.: Use of universal coding with binary data thirds for information compression and its security. Int. J. Soft Comput. 10(6), 383–390 (2015)

    Google Scholar 

  14. Inoue, K., Higo, Y., Yoshida, N., Choi, E., Kusumoto, S., Kim, K., Park, W., Lee, E.: Experience of finding inconsistently-changed bugs in code clones of mobile software. In: Proceedings of the 6th International Workshop on Software Clones, IWSC 2012, pp. 94–95 (2012)

    Google Scholar 

  15. 李家宽: Mobile and communication method. Patent application CN103139767 A, 05 June 2013

    Google Scholar 

  16. Asokan, N., Ekberg, J.-E., Paatero, L.: Implementation of an integrity-protected secure storage. Patent application WO2006120302 A1, 16 November 2006

    Google Scholar 

  17. 杨成兴, 周凤珍, 智海燕, 丁文彦, 秦龙, 周林峰, 王宏斌, 赵东, 张勇: Power system mobile phone terminal security reinforcing system. Patent application CN101925057 A, 22 December 2010

    Google Scholar 

Download references

Acknowledgments

This work was supported by Competitiveness Growth Program of the Federal Autonomous Educational Institution of Higher Professional Education National Research Nuclear University MEPhI (Moscow Engineering Physics Institute).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ilya Chugunkov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Starikovskiy, A., Panfilov, L., Chugunkov, I. (2018). Security Module Protecting the Privacy of Mobile Communication. In: Samsonovich, A., Klimov, V. (eds) Biologically Inspired Cognitive Architectures (BICA) for Young Scientists. BICA 2017. Advances in Intelligent Systems and Computing, vol 636. Springer, Cham. https://doi.org/10.1007/978-3-319-63940-6_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-63940-6_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-63939-0

  • Online ISBN: 978-3-319-63940-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics