Abstract
This article describes a communication system that protects user data against theft or damage. In addition to any standard communications system elements the described communication system includes a security module. The security module is installed on the data transmission bus between the processor and communications. The security module includes a processing unit, capable of handling data according to a particular algorithm: encryption, masking or other. It eliminates the possibility of the transmission of any data to communication modules due to undocumented features of the processor, or any other module of the mobile device. The operating system and the security module only know the processing algorithm. Consequently, no information, other than that sent to the operating system leaves the device. The security module provides security and confidentiality of data; it does not require the production of a special security processor or any other units and can be implemented on the element base of leading world manufacturers.
References
Anandajayam, P., Kumar, D.A.: Preferences extraction and ranking functions in mobile search. In: 2014 International Conference on Information Communication and Embedded Systems (ICICES), pp. 1–5, 27–28 February 2014
Zhang, P., Kumabe,; Yuichi Kogure, A., Akutagawa, M., Kinouchi, Y., Zhang, Q.: New functions developed for ICU/CCU remote monitoring system using a 3G mobile phone and evaluations of the system. In: 2008 Proceedings of the 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS 2008, pp. 5342–5345, 20–25 August 2008
Hancox, G., Richardson, J., Morris, A.: Drivers’ willingness to engage with their mobile phone: the influence of phone function and road demand. Intell. Transp. Syst. IET 7(2), 215–222 (2013)
Mikhaylov, D.M., Starikovskiy, A.V., Zuykov, A.V., Froimson, M.I., Smirnov, A.S., Sychev, N.V., Boruchinkin, A.Y., Fesenko, S.D.: Mathematical models of threats of unauthorized access to sensitive information of mobile network subscribers and measures to protect mobile system. J. Theor. Appl. Inf. Technol. 78(1), 1–8 (2015)
Mikhaylov, D., Starikovskiy, A., Lebedev, G., Uleykin, E., Dmitry, R., Alexey, E., Alexander, B., Anastasia, T.: Developing a system for text-messages protection. In: Proceedings of the 8th International Conference on Security of Information and Networks, Sochi, Russia, pp. 326–329, 8–10 September 2015
Dmitry, M., Igor, Z., Andrey, S., Sergey, K., Anastasia, T., Alexander, Z.: Review of malicious mobile applications, phone bugs and other cyber threats to mobile devices. In: Proceedings of 2013 5th IEEE International Conference on Broadband Network & Multimedia Technology (5th IEEE IC-BNMT 2013), Guilin, China, pp. 302–305, 17–19th November 2013
Pu, S., Chen, Z., Huang, C., Liu, Y., Zen, B.: Threat analysis of smart mobile device. In: Proceedings of the 31th URSI General Assembly and Scientific Symposium, pp. 1–3 (2014)
Jana, D.; Bandyopadhyay, D., Management of security and privacy issues of application development in mobile cloud environment: a survey. In: Recent Advances and Innovations in Engineering (ICRAIE), pp. 1, 6, 9–11 May 2014
Mikhaylov, D.M., Zuykov, A.V., Froimson, M.I., Starikovskiy, A.V., Kharkov, S.M.: Algorithms for data analysis and detection of changes in the security level of data transmission in wireless networks. J. Theor. Appl. Inf. Technol. 69(2), 405–413 (2014)
Mikhailov, D.M., Zhukov, I.Y.: Protection of cell phones from attacks. In: Iwashko A.M.M. (ed.) Foylis 2011 (2012). 192 p. (ill)
Kasama, T., Yoshioka, K., Inoue, D., Matsumoto, T.: Malware detection method by catching their random behavior in multiple executions. In: IEEE/IPSJ 12th International Symposium on Applications and the Internet (SAINT), pp. 262–266 (2012)
Igor, Z., Dmitry, M., Sergey, K., Vitaliy, K., Igor, N.: The role of software telephone bugs in mobile security. Int. J. Soft Comput. 11(1), 1–3 (2016)
Shurigin, V.A., Makarov, V.V., Vavrenyuk, A.B., Starikovskiy, A.V.: Use of universal coding with binary data thirds for information compression and its security. Int. J. Soft Comput. 10(6), 383–390 (2015)
Inoue, K., Higo, Y., Yoshida, N., Choi, E., Kusumoto, S., Kim, K., Park, W., Lee, E.: Experience of finding inconsistently-changed bugs in code clones of mobile software. In: Proceedings of the 6th International Workshop on Software Clones, IWSC 2012, pp. 94–95 (2012)
李家宽: Mobile and communication method. Patent application CN103139767 A, 05 June 2013
Asokan, N., Ekberg, J.-E., Paatero, L.: Implementation of an integrity-protected secure storage. Patent application WO2006120302 A1, 16 November 2006
杨成兴, 周凤珍, 智海燕, 丁文彦, 秦龙, 周林峰, 王宏斌, 赵东, 张勇: Power system mobile phone terminal security reinforcing system. Patent application CN101925057 A, 22 December 2010
Acknowledgments
This work was supported by Competitiveness Growth Program of the Federal Autonomous Educational Institution of Higher Professional Education National Research Nuclear University MEPhI (Moscow Engineering Physics Institute).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Starikovskiy, A., Panfilov, L., Chugunkov, I. (2018). Security Module Protecting the Privacy of Mobile Communication. In: Samsonovich, A., Klimov, V. (eds) Biologically Inspired Cognitive Architectures (BICA) for Young Scientists. BICA 2017. Advances in Intelligent Systems and Computing, vol 636. Springer, Cham. https://doi.org/10.1007/978-3-319-63940-6_44
Download citation
DOI: https://doi.org/10.1007/978-3-319-63940-6_44
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-63939-0
Online ISBN: 978-3-319-63940-6
eBook Packages: EngineeringEngineering (R0)