Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
3 results
Search Results
Item Attacks on Android-Based Smartphones and Impact of Vendor Customization on Android OS Security(Springer Science and Business Media Deutschland GmbH, 2020) Kumar, S.; Kittur, L.J.; Pais, A.R.Smartphones are ubiquitous today, and they contain a large amount of personal and sensitive information. It is, therefore, essential to secure the underlying operating system. Android is the dominant operating system among the smartphone market; therefore, it is critical to uphold the security standards of Android. Android smartphone manufacturers and third-party custom ROM developers modify the operating system heavily to differentiate themselves among the competitors. The modifications done by the Smartphone manufacturers and third-party custom ROM developers posses a threat to the smartphone user’s privacy and make the Android OS vulnerable to advanced persistent threat (APT) attacks. This paper demonstrates that Smartphone manufacturers and third-party custom ROM developers can bypass Android’s security mechanisms and breach the user’s privacy without getting detected by the user by modifying parts of Android OS except for the kernel. In particular, this paper shows methods by which APT attacks can be performed on the Android 10’s Camera subsystem to capture pictures from the camera and upload them to a remote server without the user’s knowledge. © 2020, Springer Nature Switzerland AG.Item The Dependency of Healthcare on Security: Issues and Challenges(Springer Science and Business Media Deutschland GmbH info@springer-sbm.com, 2021) Kittur, L.J.; Mehra, R.; Chandavarkar, B.R.Information security and privacy in the sector of healthcare is an important issue that has to be given importance. With the growing adoption of electronic health records of patients, the need of accessing and sharing information between different healthcare professionals is also increasing. This gives rise to the attention that has to be provided for securing the information. Also the adoption of the Internet of Things in wireless body sensor networks, leads to the usage of Cloud and Fog in healthcare systems. Thus pointing towards secure methods of accessing, storing, processing of sensitive data. In this paper, an overview of different issues and challenges pertaining to the security of healthcare systems is presented. Also, the solutions to address the security concerns in the healthcare systems are also discussed. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.Item Key Pre-distribution Scheme for Wireless Sensor Networks Using Combinatorial Design(Springer Science and Business Media Deutschland GmbH, 2022) Kittur, L.J.; Pais, A.R.Considering Wireless Sensor Networks (WSNs) usage in sensitive applications, providing secure communication between the sensor nodes is of utmost importance. The key pre-distribution technique allows the sensor nodes to encrypt the messages employing the secret key to uphold the network security. Having limited computational powers and storage capacity are the constraints of sensor nodes. In this work, Combinatorial Design (CD) is employed to propose a deterministic scheme for key pre-distribution in WSNs wherein keyrings are generated from a given keypool. The network region is divided into many same-sized cells with regular sensor nodes and cell leaders deployed in each cell. The cell leaders possess higher resource and computational capabilities than the regular sensor nodes and thus are used for communication between cells. Whenever the regular sensor nodes need to establish communication links with other regular sensor nodes in the same cell, they can do so directly using the common secret key. The key pre-distribution scheme proposed for cell leaders is highly scalable. A detailed study of the scalability, the resiliency of the proposed scheme is also presented. The resiliency accomplished is comparable to other existing schemes. Still, at the same time, the given scheme provides full connectivity, high scalability without a significant increase in the storage overhead of the sensor nodes. © 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
