Security in smartphones and tablets

Akram, S T (2014) Security in smartphones and tablets. BTech thesis.

[img]
Preview
PDF
1188Kb

Abstract

Mobile devices like smartphones and tablets are turning into a vehicle for productive and advantageous approach to access, find and share information/data. However, lack of the efficient and proper security measures has paved a way for the cyber-attackers to get this information and misuse it for their own purpose. Data leakage resulting from device loss or theft is major security risk associated with the smartphones and other mobile devices. One way to protect the data is to use encryption/decryption technique. Though there is many encryption/decryption technique available but most of them are susceptible to various attacks. Another problem is there is no proper encryption/decryption procedure for end point to end point security (between two or more phones). We proposed novel key generation techniques to be used in encryption/decryption process. The same technique can also be used for end point to end point secure communication. These techniques have been tested against various attacks on real android devices and it has been found that it withstand all types of attacks.

Item Type:Thesis (BTech)
Uncontrolled Keywords:Security; key Generation; Android
Subjects:Engineering and Technology > Computer and Information Science > Information Security
Divisions: Engineering and Technology > Department of Computer Science
ID Code:5990
Deposited By:Hemanta Biswal
Deposited On:25 Aug 2014 11:44
Last Modified:25 Aug 2014 11:44
Supervisor(s):Jena, S K

Repository Staff Only: item control page