سیستم ارتباطی برای دستگاه های اندروید
ترجمه نشده

سیستم ارتباطی برای دستگاه های اندروید

عنوان فارسی مقاله: MSYM: یک سیستم ارتباطی چند کاناله برای دستگاه های اندروید
عنوان انگلیسی مقاله: MSYM: A Multichannel Communication System for Android Devices
مجله/کنفرانس: شبکه های کامپیوتری – Computer Networks
رشته های تحصیلی مرتبط: مهندسی کامپیوتر، فناوری اطلاعات و ارتباطات
گرایش های تحصیلی مرتبط: مهندسی نرم افزار، مخابرات سیار
کلمات کلیدی فارسی: ارتباطات موبایلی، ارسال چندگانه، داده های شبکه، دستگاه اندروید، حملات استراق سمع
کلمات کلیدی انگلیسی: Mobile communication, Multiple transmission, Network data, Android device, Eavesdropping attacks
نوع نگارش مقاله: مقاله پژوهشی (Research Article)
شناسه دیجیتال (DOI): https://doi.org/10.1016/j.comnet.2019.107024
دانشگاه: Beijing Key Laboratory of Software Security Engineering Technique, Beijing Institute of Technology, Beijing 100081, China
صفحات مقاله انگلیسی: 38
ناشر: الزویر - Elsevier
نوع ارائه مقاله: ژورنال
نوع مقاله: ISI
سال انتشار مقاله: 2020
ایمپکت فاکتور: 4.205 در سال 2019
شاخص H_index: 119 در سال 2020
شاخص SJR: 0.592 در سال 2019
شناسه ISSN: 1389-1286
شاخص Quartile (چارک): Q1 در سال 2019
فرمت مقاله انگلیسی: PDF
وضعیت ترجمه: ترجمه نشده است
قیمت مقاله انگلیسی: رایگان
آیا این مقاله بیس است: خیر
آیا این مقاله مدل مفهومی دارد: ندارد
آیا این مقاله پرسشنامه دارد: ندارد
آیا این مقاله متغیر دارد: ندارد
کد محصول: E14206
رفرنس: دارای رفرنس در داخل متن و انتهای مقاله
فهرست مطالب (انگلیسی)

Abstract

۱٫ Introduction

۲٫ Background and motivation

۳٫ Related work

۴٫ Design

۵٫ Implementation

۶٫ Evaluation

۷٫ Discussion

۸٫ Conclusion

Declaration of Competing Interest

Acknowledgment

References

بخشی از مقاله (انگلیسی)

Abstract

Conventional mobile communication systems often use one single channel for data transmission, i.e., mobile devices use cellular network to transfer multimedia information. However, if attackers successfully hijack the single transmission channel, they can recover the communicated data. Focused on this issue, we introduce a Multichannel Communication System (MSYM), which aims to improve the data communication security for Android devices. The key idea of our approach is to leverage the diversity of communication mechanisms (e.g., Wi-Fi/cellular network, Bluetooth, and SMS) for transferring sensitive data in a secure way. More specifically, we use the VpnService interface provided by the Android platform to intercept the network data delivered by a sender program. Then, we split the network data into different fragments and improve the security by disordering and encrypting them via multiple transmission channels. When the target Android device receives the data fragments from different channels, it can decrypt and reorder them to reassemble the original data. In the end, we reuse the VpnService interface to inject the network data into the receiver program. Our approach can be deployed in Android devices to secure communication without the need of modifying the communication programs. In the evaluation, as a proof of concept, we implemented our approach on Android system. The experimental results show that our prototype system can secure data transmission with moderate performance cost.

Introduction

Mobile communication plays an increasingly important role in recent years, as more and more people exchange information via mobile devices. For example, over 2 billion people are using the instant messaging apps (e.g., WeChat and WhatsApp) on their mobile phones for exchanging messages, pictures and videos [6]. In addition, 90% of enterprises utilize mobile communication to boost productivity and streamline various business processes. Traditionally, most mobile devices only use one single wireless transmission channel (e.g., cellular network) for mobile communication. However, due to the openness of the wireless channel, it is possible for advanced attackers to eavesdrop the transmission and recover the sensitive data. For instance, adversaries can make use of bogus base stations to conduct man-in-the-middle (MITM) attack on modern Samsung mobile devices and obtain the sensitive information [23]. To prevent the communication data from being eavesdropped and recovered, a conventional solution is to leverage cryptographic protocols to perform data encryption and endpoint authentication. For example, the Wi-Fi Protected Access (WPA) and its subsequent standards (WPA2, WPA3) attempt to secure the wireless networks by applying multiple security protocols [13]. However, they may still suffer from eavesdropping attacks like the KRACK [35] attack. This attack shows that an attacker can exploit the vulnerability of WPA2 to read previously encrypted information. On the other hand, most mobile applications adopt the client-server model, which requires that all the communication data between two or more clients should be firstly forwarded to a central server. Nevertheless, some service providers may not be fully trusted. Taking the messaging server as an example, once it is hacked by adversaries, the recorded information would be leaked.