Mobile Social Networking below Side-Channel Attacks: sensible Security Challenges

Authors

  • Geetha Kurikala  Computer Science and Engineering, Sri Indu College of Engineering & Technology, Telangana, India
  • K Gurnadha Gupta  Computer Science and Engineering, Sri Indu College of Engineering & Technology, Telangana, India

Keywords:

Mobile social networks (MSNs), information systems security, side-channel attacks, social networking services, neural networks.

Abstract

Mobile social networks (MSNs) are the networks of people with similar intefirests connected to every alternative through their mobile devices. Recently, MSNs are proliferating quick supported by rising wireless technologies that permit achieving a lot of economical communication and higher networking performance across the key parameters, like lower delay, higher rate, and higher coverage. At a similar time, most of the MSN users don't absolutely acknowledge the importance of security on their hand-held mobile devices. Owing to this reality, multiple attacks aimed toward capturing personal info and sensitive user information become a growing concern, oil-fired by the avalanche of latest MSN applications and services. Therefore, the goal of this work is to know whether or not the up to date user instrumentality is prone to compromising its sensitive info to the attackers. As associate degree example, numerous info security algorithms enforced in trendy smart phones are therefore tested to try the extraction of the same personal information supported the traces registered with cheap up to date audio cards. Our obtained results indicate that the oftenest, that constitutes the strongest limitation of the off-the-rack side-channel attack instrumentality, solely delivers low-informative traces. However, the success probabilities to recover sensitive information keep on a mobile device could increase considerably once utilizing a lot of economical analytical techniques additionally as using a lot of complicated attack instrumentality. Finally, we elaborate on the possible utilization of neural networks to boost the corresponding encrypted data extraction process, while the latter part of this paper outlines solutions and practical recommendations to protect from malicious side-channel attacks and keep the personal user information protected.

References

  1. L. Lin, L. Xu, S. Zhou, and Y. Xiang, "Trustworthiness-hypercube-based reliable communication in mobile social networks," Inf. Sci., vol. 369,34 50, Nov. 2016.
  2. X. Hu, T. H. S. Chu, V. C. M. Leung, E. C. H. Ngai, P. Kruchten, and H. C. B. Chan, "A survey on mobile social networks: Applications, platforms, system architectures, and future research directions," IEEE Commun. Surv. Tuts., vol. 17, no. 3, pp. 1557 1581, 3rd Quart., 2015.
  3. Z. Su, Q. Xu, and Q. Qi, "Big data in mobile social networks: A QoE-oriented framework," IEEE Netw., vol. 30, no. 1, pp. 52 57, Jan./Feb. 2016.
  4. D. Zhang, D. Zhang, H. Xiong, C.-H. Hsu, and A. V. Vasilakos, "BASA: Building mobile ad-hoc social networks on top of Android," IEEE Netw., vol. 28, no. 1, pp. 4 9, Jan./Feb. 2014.
  5. E. Miluzzo et al., "Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application," in Proc. 6th ACM Conf. Embedded Netw. Sensor Syst., Nov. 2008, pp. 337 350.
  6. N. Kayastha, D. Niyato, P. Wang, and E. Hossain, "Applications, architec-tures, and protocol design issues for mobile social networks: A survey," Proc. IEEE, vol. 99, no. 12, pp. 2130 2158, Dec. 2011.
  7. B. Bai, L. Wang, Z. Han, W. Chen, and T. Svensson, "Caching based socially-aware D2D communications in wireless content delivery net-works: A hypergraph framework," IEEE Wireless Commun., vol. 23, no. 4,74 81, Aug. 2016.
  8. N. Vastardis and K. Yang, "Mobile social networks: Architectures, social properties, and key research challenges," IEEE Commun. Surv. Tuts., vol. 15, no. 3, pp. 1355 1371, 3rd Quart., 2013.
  9. Y. Li, S. Su, and S. Chen, "Social-aware resource allocation for device-to-device communications underlaying cellular networks," IEEE Wireless Commun. Lett., vol. 4, no. 3, pp. 293 296, Jun. 2015.
  10. L. Gou et al., "MobiSNA: A mobile video social network application," in Proc. 8th ACM Int. Workshop Data Eng. Wireless Mobile Access, Jun. 2009, pp. 53 56.
  11. W. Cai, V. C. M. Leung, and M. Chen, "Next generation mobile cloud gaming," in Proc. IEEE 7th Int. Symp. Service Oriented Syst. Eng. (SOSE), Mar. 2013, pp. 551 560.
  12. R. Terlutter and M. L. Capella, "The gami cation of advertising: Analysis and research directions of in-game advertising, advergames, and advertis-ing in social network games," J. Advertising, vol. 42, nos. 2 3, pp. 95 112, 2013

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
Geetha Kurikala, K Gurnadha Gupta, " Mobile Social Networking below Side-Channel Attacks: sensible Security Challenges, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.1076-1074, March-April-2017.