Skip to main content

Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device

  • Conference paper
Security Technology, Disaster Recovery and Business Continuity

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 122))

  • 1236 Accesses

Abstract

Illegal or unintentional file transmission of important data is a sensitive and main security issue in embedded and mobile devices. Within restricted resources such as small memory size and low battery capacity, simple and efficient method is needed to lessen much effort for preventing this illegal activity. Therefore, we discuss a protection technique taking into account these considerations. In our method, sample bytes are extracted from an important file and then it is used to prohibit illegal file transfer and modification. To avoid attacker’s easy prediction about the selection position of the sample bytes, it is selected within whole extent of the file by equal distribution and at the random location. To avoid huge increase of the number of the sample bytes, candidate sampling area size of the file is chosen carefully after the analysis of the length and number of files. Also, considering computational overhead to calculate the number and position of the sample bytes to be selected, we propose three types of sampling methods. And we will show the evaluation result of these methods and recommend proper sampling approach to embedded device with low computational power. With the help of this technique, it has advantages that data leakage can be protected and prohibited effectively and the device can be managed securely within low overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Smith, T.F., Waterman, M.S.: Identification of Common Molecular Subsequences. J. Mol. Biol. 147, 195–197 (1981)

    Article  Google Scholar 

  2. Shi, Z., Ji, Z., Hu, M.: A Novel Distributed Intrusion Detection Model Based on Mobile Agent. In: ACM InfoSecu04, pp. 155–159 (2006)

    Google Scholar 

  3. Yong-guang, Z., Wenke, L., Yi-an, H.: Intrusion Detection Technique for Mobile Wireless Networks. In: ACM MONET, pp. 545–556 (2003)

    Google Scholar 

  4. Deepak, V.: An Efficient Signature Representation and Matching Method for Mobile Devices. In: Proceedings of the 2nd Annual International Workshop on Wireless Internet, vol. 220 (2006)

    Google Scholar 

  5. Geetha, R., Delbert, H.: A P2P Intrusion Detection System based on Mobile Agents. In: ACM ACME 2004, pp. 185–195 (2004)

    Google Scholar 

  6. National Center for Biotechnology Information, http://www.ncbi.nlm.nih.gov

  7. Yogesh Prem, S., Hannes, T.: Protecting Mobile Devices from TCP Flooding Attacks. In: ACM mobiArch 2006, pp. 63–68 (2006)

    Google Scholar 

  8. Benjamin, H.: Mobile Device Security. In: ACM InfoSecCD Conference 2004, pp. 99–101 (2004)

    Google Scholar 

  9. Ingemar, J., Ton, K., Georg, P., Mathias, S.: Information Transmission and Steganography. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 15–29. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. David, C., Sebastian, H., Pasquale, M.: Quantitative Analysis of the Leakage of Confidential Data. Electronic Notes in Theoretical Computer Science 59(3) (2003)

    Google Scholar 

  11. Christian, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  12. Dan, B., James, S.: Collusion-Secure Fingerprinting for Digital Data. IEEE Transactions on Information Theory 44(5) (September 1998)

    Google Scholar 

  13. Binomial Distribution, http://en.wikipedia.org/wiki/Binomial_distribution

  14. Digital Rights Management, http://en.wikipedia.org/wiki/Digital_rights_management

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chung, Bh., Kim, Jn. (2010). Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device. In: Kim, Th., Fang, Wc., Khan, M.K., Arnett, K.P., Kang, Hj., Ślęzak, D. (eds) Security Technology, Disaster Recovery and Business Continuity. Communications in Computer and Information Science, vol 122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17610-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17610-4_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17609-8

  • Online ISBN: 978-3-642-17610-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics