Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges
Mobile social networks (MSNs) are the networks of individuals with similar interests connected to each other through their mobile devices. Recently, MSNs are proliferating fast supported by emerging wireless technologies that allow to achieve more efficient communication and better networking perfor...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2017-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/7858698/ |
id |
doaj-77c0097c411f4c1d85e214c27cc060b2 |
---|---|
record_format |
Article |
spelling |
doaj-77c0097c411f4c1d85e214c27cc060b22021-03-29T19:58:59ZengIEEEIEEE Access2169-35362017-01-0152591260110.1109/ACCESS.2017.26656407858698Mobile Social Networking Under Side-Channel Attacks: Practical Security ChallengesAleksandr Ometov0https://orcid.org/0000-0003-3412-1639Alla Levina1Pavel Borisenko2Roman Mostovoy3Antonino Orsino4Sergey Andreev5Tampere University of Technology, Tampere, FinlandITMO University, Saint Petersburg, RussiaITMO University, Saint Petersburg, RussiaITMO University, Saint Petersburg, RussiaTampere University of Technology, Tampere, FinlandTampere University of Technology, Tampere, FinlandMobile social networks (MSNs) are the networks of individuals with similar interests connected to each other through their mobile devices. Recently, MSNs are proliferating fast supported by emerging wireless technologies that allow to achieve more efficient communication and better networking performance across the key parameters, such as lower delay, higher data rate, and better coverage. At the same time, most of the MSN users do not fully recognize the importance of security on their handheld mobile devices. Due to this fact, multiple attacks aimed at capturing personal information and sensitive user data become a growing concern, fueled by the avalanche of new MSN applications and services. Therefore, the goal of this work is to understand whether the contemporary user equipment is susceptible to compromising its sensitive information to the attackers. As an example, various information security algorithms implemented in modern smartphones are thus tested to attempt the extraction of the said private data based on the traces registered with inexpensive contemporary audio cards. Our obtained results indicate that the sampling frequency, which constitutes the strongest limitation of the off-the-shelf side-channel attack equipment, only delivers low-informative traces. However, the success chances to recover sensitive data stored within a mobile device may increase significantly when utilizing more efficient analytical techniques as well as employing more complex attack equipment. Finally, we elaborate on the possible utilization of neural networks to improve the corresponding encrypted data extraction process, while the latter part of this paper outlines solutions and practical recommendations to protect from malicious side-channel attacks and keep the personal user information protected.https://ieeexplore.ieee.org/document/7858698/Mobile social networks (MSNs)information systems securityside-channel attackssocial networking servicesneural networks |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Aleksandr Ometov Alla Levina Pavel Borisenko Roman Mostovoy Antonino Orsino Sergey Andreev |
spellingShingle |
Aleksandr Ometov Alla Levina Pavel Borisenko Roman Mostovoy Antonino Orsino Sergey Andreev Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges IEEE Access Mobile social networks (MSNs) information systems security side-channel attacks social networking services neural networks |
author_facet |
Aleksandr Ometov Alla Levina Pavel Borisenko Roman Mostovoy Antonino Orsino Sergey Andreev |
author_sort |
Aleksandr Ometov |
title |
Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges |
title_short |
Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges |
title_full |
Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges |
title_fullStr |
Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges |
title_full_unstemmed |
Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges |
title_sort |
mobile social networking under side-channel attacks: practical security challenges |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2017-01-01 |
description |
Mobile social networks (MSNs) are the networks of individuals with similar interests connected to each other through their mobile devices. Recently, MSNs are proliferating fast supported by emerging wireless technologies that allow to achieve more efficient communication and better networking performance across the key parameters, such as lower delay, higher data rate, and better coverage. At the same time, most of the MSN users do not fully recognize the importance of security on their handheld mobile devices. Due to this fact, multiple attacks aimed at capturing personal information and sensitive user data become a growing concern, fueled by the avalanche of new MSN applications and services. Therefore, the goal of this work is to understand whether the contemporary user equipment is susceptible to compromising its sensitive information to the attackers. As an example, various information security algorithms implemented in modern smartphones are thus tested to attempt the extraction of the said private data based on the traces registered with inexpensive contemporary audio cards. Our obtained results indicate that the sampling frequency, which constitutes the strongest limitation of the off-the-shelf side-channel attack equipment, only delivers low-informative traces. However, the success chances to recover sensitive data stored within a mobile device may increase significantly when utilizing more efficient analytical techniques as well as employing more complex attack equipment. Finally, we elaborate on the possible utilization of neural networks to improve the corresponding encrypted data extraction process, while the latter part of this paper outlines solutions and practical recommendations to protect from malicious side-channel attacks and keep the personal user information protected. |
topic |
Mobile social networks (MSNs) information systems security side-channel attacks social networking services neural networks |
url |
https://ieeexplore.ieee.org/document/7858698/ |
work_keys_str_mv |
AT aleksandrometov mobilesocialnetworkingundersidechannelattackspracticalsecuritychallenges AT allalevina mobilesocialnetworkingundersidechannelattackspracticalsecuritychallenges AT pavelborisenko mobilesocialnetworkingundersidechannelattackspracticalsecuritychallenges AT romanmostovoy mobilesocialnetworkingundersidechannelattackspracticalsecuritychallenges AT antoninoorsino mobilesocialnetworkingundersidechannelattackspracticalsecuritychallenges AT sergeyandreev mobilesocialnetworkingundersidechannelattackspracticalsecuritychallenges |
_version_ |
1724195526258196480 |