Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges

Mobile social networks (MSNs) are the networks of individuals with similar interests connected to each other through their mobile devices. Recently, MSNs are proliferating fast supported by emerging wireless technologies that allow to achieve more efficient communication and better networking perfor...

Full description

Bibliographic Details
Main Authors: Aleksandr Ometov, Alla Levina, Pavel Borisenko, Roman Mostovoy, Antonino Orsino, Sergey Andreev
Format: Article
Language:English
Published: IEEE 2017-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/7858698/
id doaj-77c0097c411f4c1d85e214c27cc060b2
record_format Article
spelling doaj-77c0097c411f4c1d85e214c27cc060b22021-03-29T19:58:59ZengIEEEIEEE Access2169-35362017-01-0152591260110.1109/ACCESS.2017.26656407858698Mobile Social Networking Under Side-Channel Attacks: Practical Security ChallengesAleksandr Ometov0https://orcid.org/0000-0003-3412-1639Alla Levina1Pavel Borisenko2Roman Mostovoy3Antonino Orsino4Sergey Andreev5Tampere University of Technology, Tampere, FinlandITMO University, Saint Petersburg, RussiaITMO University, Saint Petersburg, RussiaITMO University, Saint Petersburg, RussiaTampere University of Technology, Tampere, FinlandTampere University of Technology, Tampere, FinlandMobile social networks (MSNs) are the networks of individuals with similar interests connected to each other through their mobile devices. Recently, MSNs are proliferating fast supported by emerging wireless technologies that allow to achieve more efficient communication and better networking performance across the key parameters, such as lower delay, higher data rate, and better coverage. At the same time, most of the MSN users do not fully recognize the importance of security on their handheld mobile devices. Due to this fact, multiple attacks aimed at capturing personal information and sensitive user data become a growing concern, fueled by the avalanche of new MSN applications and services. Therefore, the goal of this work is to understand whether the contemporary user equipment is susceptible to compromising its sensitive information to the attackers. As an example, various information security algorithms implemented in modern smartphones are thus tested to attempt the extraction of the said private data based on the traces registered with inexpensive contemporary audio cards. Our obtained results indicate that the sampling frequency, which constitutes the strongest limitation of the off-the-shelf side-channel attack equipment, only delivers low-informative traces. However, the success chances to recover sensitive data stored within a mobile device may increase significantly when utilizing more efficient analytical techniques as well as employing more complex attack equipment. Finally, we elaborate on the possible utilization of neural networks to improve the corresponding encrypted data extraction process, while the latter part of this paper outlines solutions and practical recommendations to protect from malicious side-channel attacks and keep the personal user information protected.https://ieeexplore.ieee.org/document/7858698/Mobile social networks (MSNs)information systems securityside-channel attackssocial networking servicesneural networks
collection DOAJ
language English
format Article
sources DOAJ
author Aleksandr Ometov
Alla Levina
Pavel Borisenko
Roman Mostovoy
Antonino Orsino
Sergey Andreev
spellingShingle Aleksandr Ometov
Alla Levina
Pavel Borisenko
Roman Mostovoy
Antonino Orsino
Sergey Andreev
Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges
IEEE Access
Mobile social networks (MSNs)
information systems security
side-channel attacks
social networking services
neural networks
author_facet Aleksandr Ometov
Alla Levina
Pavel Borisenko
Roman Mostovoy
Antonino Orsino
Sergey Andreev
author_sort Aleksandr Ometov
title Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges
title_short Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges
title_full Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges
title_fullStr Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges
title_full_unstemmed Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges
title_sort mobile social networking under side-channel attacks: practical security challenges
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2017-01-01
description Mobile social networks (MSNs) are the networks of individuals with similar interests connected to each other through their mobile devices. Recently, MSNs are proliferating fast supported by emerging wireless technologies that allow to achieve more efficient communication and better networking performance across the key parameters, such as lower delay, higher data rate, and better coverage. At the same time, most of the MSN users do not fully recognize the importance of security on their handheld mobile devices. Due to this fact, multiple attacks aimed at capturing personal information and sensitive user data become a growing concern, fueled by the avalanche of new MSN applications and services. Therefore, the goal of this work is to understand whether the contemporary user equipment is susceptible to compromising its sensitive information to the attackers. As an example, various information security algorithms implemented in modern smartphones are thus tested to attempt the extraction of the said private data based on the traces registered with inexpensive contemporary audio cards. Our obtained results indicate that the sampling frequency, which constitutes the strongest limitation of the off-the-shelf side-channel attack equipment, only delivers low-informative traces. However, the success chances to recover sensitive data stored within a mobile device may increase significantly when utilizing more efficient analytical techniques as well as employing more complex attack equipment. Finally, we elaborate on the possible utilization of neural networks to improve the corresponding encrypted data extraction process, while the latter part of this paper outlines solutions and practical recommendations to protect from malicious side-channel attacks and keep the personal user information protected.
topic Mobile social networks (MSNs)
information systems security
side-channel attacks
social networking services
neural networks
url https://ieeexplore.ieee.org/document/7858698/
work_keys_str_mv AT aleksandrometov mobilesocialnetworkingundersidechannelattackspracticalsecuritychallenges
AT allalevina mobilesocialnetworkingundersidechannelattackspracticalsecuritychallenges
AT pavelborisenko mobilesocialnetworkingundersidechannelattackspracticalsecuritychallenges
AT romanmostovoy mobilesocialnetworkingundersidechannelattackspracticalsecuritychallenges
AT antoninoorsino mobilesocialnetworkingundersidechannelattackspracticalsecuritychallenges
AT sergeyandreev mobilesocialnetworkingundersidechannelattackspracticalsecuritychallenges
_version_ 1724195526258196480