Abstract
Illegal or unintentional file transmission of important data is a sensitive and main security issue in embedded and mobile devices. Within restricted resources such as small memory size and low battery capacity, simple and efficient method is needed to lessen much effort for preventing this illegal activity. Therefore, we discuss a protection technique taking into account these considerations. In our method, sample bytes are extracted from an important file and then it is used to prohibit illegal file transfer and modification. To avoid attacker’s easy prediction about the selection position of the sample bytes, it is selected within whole extent of the file by equal distribution and at the random location. To avoid huge increase of the number of the sample bytes, candidate sampling area size of the file is chosen carefully after the analysis of the length and number of files. Also, considering computational overhead to calculate the number and position of the sample bytes to be selected, we propose three types of sampling methods. And we will show the evaluation result of these methods and recommend proper sampling approach to embedded device with low computational power. With the help of this technique, it has advantages that data leakage can be protected and prohibited effectively and the device can be managed securely within low overhead.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Smith, T.F., Waterman, M.S.: Identification of Common Molecular Subsequences. J. Mol. Biol. 147, 195–197 (1981)
Shi, Z., Ji, Z., Hu, M.: A Novel Distributed Intrusion Detection Model Based on Mobile Agent. In: ACM InfoSecu04, pp. 155–159 (2006)
Yong-guang, Z., Wenke, L., Yi-an, H.: Intrusion Detection Technique for Mobile Wireless Networks. In: ACM MONET, pp. 545–556 (2003)
Deepak, V.: An Efficient Signature Representation and Matching Method for Mobile Devices. In: Proceedings of the 2nd Annual International Workshop on Wireless Internet, vol. 220 (2006)
Geetha, R., Delbert, H.: A P2P Intrusion Detection System based on Mobile Agents. In: ACM ACME 2004, pp. 185–195 (2004)
National Center for Biotechnology Information, http://www.ncbi.nlm.nih.gov
Yogesh Prem, S., Hannes, T.: Protecting Mobile Devices from TCP Flooding Attacks. In: ACM mobiArch 2006, pp. 63–68 (2006)
Benjamin, H.: Mobile Device Security. In: ACM InfoSecCD Conference 2004, pp. 99–101 (2004)
Ingemar, J., Ton, K., Georg, P., Mathias, S.: Information Transmission and Steganography. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 15–29. Springer, Heidelberg (2005)
David, C., Sebastian, H., Pasquale, M.: Quantitative Analysis of the Leakage of Confidential Data. Electronic Notes in Theoretical Computer Science 59(3) (2003)
Christian, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)
Dan, B., James, S.: Collusion-Secure Fingerprinting for Digital Data. IEEE Transactions on Information Theory 44(5) (September 1998)
Binomial Distribution, http://en.wikipedia.org/wiki/Binomial_distribution
Digital Rights Management, http://en.wikipedia.org/wiki/Digital_rights_management
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chung, Bh., Kim, Jn. (2010). Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device. In: Kim, Th., Fang, Wc., Khan, M.K., Arnett, K.P., Kang, Hj., Ślęzak, D. (eds) Security Technology, Disaster Recovery and Business Continuity. Communications in Computer and Information Science, vol 122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17610-4_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-17610-4_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17609-8
Online ISBN: 978-3-642-17610-4
eBook Packages: Computer ScienceComputer Science (R0)