Pub Date : 2017-03-13DOI: 10.1109/PERCOMW.2017.7917628
V. Chamola, C. Tham, G. Chalapathi
With the various technological advances, mobile devices are not just being used as a means to make voice calls; but are being used to accomplish a variety of tasks. Mobile devices are being envisioned to practically accomplish any task which could be done on a computer. This is hurdled by the limited computational resources available with the mobile devices due to their portable size. With the mobile devices being connected to the Internet, leveraging cloud services is being seen as a promising solution to overcome this hurdle. Computationally intensive tasks can be offloaded to the Cloud servers. However, owing to the latency and cost associated with using cloud services, edge devices (termed cloudlets) stationed near the mobile devices are being seen as a prospective alternative to replace/assist the Cloud services. The mobile devices have an easier access to the cloudlets being situated in their vicinity and can offload their task requests to them to be served at a lower cost. This paper considers a network of such connected cloudlets which provide service to the mobile devices in a given area. We address the issue of task assignment in such a scenario (i.e. which cloudlet serves which mobile device) aimed towards improving the quality of service experienced by the mobile devices in terms of minimizing the latency. Through numerical simulations we demonstrate the performance gains of the proposed task assignment scheme showing lower latency as compared to the traditional scheme for task assignment.
{"title":"Latency aware mobile task assignment and load balancing for edge cloudlets","authors":"V. Chamola, C. Tham, G. Chalapathi","doi":"10.1109/PERCOMW.2017.7917628","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917628","url":null,"abstract":"With the various technological advances, mobile devices are not just being used as a means to make voice calls; but are being used to accomplish a variety of tasks. Mobile devices are being envisioned to practically accomplish any task which could be done on a computer. This is hurdled by the limited computational resources available with the mobile devices due to their portable size. With the mobile devices being connected to the Internet, leveraging cloud services is being seen as a promising solution to overcome this hurdle. Computationally intensive tasks can be offloaded to the Cloud servers. However, owing to the latency and cost associated with using cloud services, edge devices (termed cloudlets) stationed near the mobile devices are being seen as a prospective alternative to replace/assist the Cloud services. The mobile devices have an easier access to the cloudlets being situated in their vicinity and can offload their task requests to them to be served at a lower cost. This paper considers a network of such connected cloudlets which provide service to the mobile devices in a given area. We address the issue of task assignment in such a scenario (i.e. which cloudlet serves which mobile device) aimed towards improving the quality of service experienced by the mobile devices in terms of minimizing the latency. Through numerical simulations we demonstrate the performance gains of the proposed task assignment scheme showing lower latency as compared to the traditional scheme for task assignment.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128957221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-13DOI: 10.1109/PERCOMW.2017.7917640
Jaemin Park, Kwangjo Kim
Remote attestation is used to enable verifiers to check if an underlying Trusted Computing Base (TCB) of a device and data from the TCB are trustworthy. However, the current remote attestation has limitations to be deployed in IoT from the perspective of the management in a massive and diverse collection of TCB measurements and the redundant execution of remote attestation. To mitigate these limitations, we present a trustworthy management of TCB measurements called TM-Coin (TCB Measurement-Coin) using the blockchain and ARM TrustZone. The TM-Coin transactions and protocol are presented to manage the TCB measurements of IoT devices using the blockchain, a decentralized database. The trusted execution environment provided by ARM TrustZone is used as the TCB to generate the TM-Coin transactions securely. Based on TM-Coin, the verifiers launch remote attestation of sensed data from the devices using the TCB measurements published in the blockchain without attesting to the TCB. We implemented a prototype to evaluate the performance overhead caused by TM-Coin.
{"title":"TM-Coin: Trustworthy management of TCB measurements in IoT","authors":"Jaemin Park, Kwangjo Kim","doi":"10.1109/PERCOMW.2017.7917640","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917640","url":null,"abstract":"Remote attestation is used to enable verifiers to check if an underlying Trusted Computing Base (TCB) of a device and data from the TCB are trustworthy. However, the current remote attestation has limitations to be deployed in IoT from the perspective of the management in a massive and diverse collection of TCB measurements and the redundant execution of remote attestation. To mitigate these limitations, we present a trustworthy management of TCB measurements called TM-Coin (TCB Measurement-Coin) using the blockchain and ARM TrustZone. The TM-Coin transactions and protocol are presented to manage the TCB measurements of IoT devices using the blockchain, a decentralized database. The trusted execution environment provided by ARM TrustZone is used as the TCB to generate the TM-Coin transactions securely. Based on TM-Coin, the verifiers launch remote attestation of sensed data from the devices using the TCB measurements published in the blockchain without attesting to the TCB. We implemented a prototype to evaluate the performance overhead caused by TM-Coin.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123414561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-13DOI: 10.1109/PERCOMW.2017.7917526
V. R. Reddy, A. Choudhury, Parijat Deshpande, Srinivasan Jayaraman, N. Thokala, Venkatesh Kaliaperumal
The alarming statistics of Diabetes Mellitus (DM) Type 2 as the most common and prevalent disease in India and world over [1] has fuelled research in the direction of non-invasive and continuous monitoring of this disease. This paper describes a demonstration of an inexpensive mobile-phone based android application which can collect Photoplethysmogram (PPG) from fingertip via built-in camera and flash and transfer it to a high-end cloud server for early detection of DM. Additionally, this application allows continuous monitoring of DM patients can aid in assisting the short and long-term complication risks. The proposed application is targeted to cater to the inherent demand to for a mobile-based, pervasive system for continuous, non-invasive monitoring and detection of DM. Our application has been successfully deployed on Nexus 5 and tested on controlled and diabetic group with 80% specificity and 84% sensitivity for a 100 patient dataset and presented in this paper.
{"title":"DMSense: A non-invasive Diabetes Mellitus Classification System using Photoplethysmogram signal","authors":"V. R. Reddy, A. Choudhury, Parijat Deshpande, Srinivasan Jayaraman, N. Thokala, Venkatesh Kaliaperumal","doi":"10.1109/PERCOMW.2017.7917526","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917526","url":null,"abstract":"The alarming statistics of Diabetes Mellitus (DM) Type 2 as the most common and prevalent disease in India and world over [1] has fuelled research in the direction of non-invasive and continuous monitoring of this disease. This paper describes a demonstration of an inexpensive mobile-phone based android application which can collect Photoplethysmogram (PPG) from fingertip via built-in camera and flash and transfer it to a high-end cloud server for early detection of DM. Additionally, this application allows continuous monitoring of DM patients can aid in assisting the short and long-term complication risks. The proposed application is targeted to cater to the inherent demand to for a mobile-based, pervasive system for continuous, non-invasive monitoring and detection of DM. Our application has been successfully deployed on Nexus 5 and tested on controlled and diabetic group with 80% specificity and 84% sensitivity for a 100 patient dataset and presented in this paper.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"49 14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133631097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-13DOI: 10.1109/PERCOMW.2017.7917637
A. Sojka-Piotrowska, P. Langendörfer
The Wireless Sensor Networks (WSN) are important part of Internet of Things. And one of the important requirements of WSN is to ensure that the data exchanged within these networks is secured. Since WSNs consist of resource constrained devices, it is crucial to investigate new, lightweight security solutions, which ensure fast computations, reduced energy consumption and desired level of security. This paper proposes using cryptographic algorithms based on Elliptic Curves, but with reduced key lengths, what makes them suitable for WSN. For this new idea, the security analysis was performed and the application areas were proposed.
{"title":"Shortening the security parameters in lightweight WSN applications for IoT - lessons learned","authors":"A. Sojka-Piotrowska, P. Langendörfer","doi":"10.1109/PERCOMW.2017.7917637","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917637","url":null,"abstract":"The Wireless Sensor Networks (WSN) are important part of Internet of Things. And one of the important requirements of WSN is to ensure that the data exchanged within these networks is secured. Since WSNs consist of resource constrained devices, it is crucial to investigate new, lightweight security solutions, which ensure fast computations, reduced energy consumption and desired level of security. This paper proposes using cryptographic algorithms based on Elliptic Curves, but with reduced key lengths, what makes them suitable for WSN. For this new idea, the security analysis was performed and the application areas were proposed.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132706706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-13DOI: 10.1109/PERCOMW.2017.7917595
M. Huber, G. Záruba, N. Burns, K. Daniel
This paper introduces SmartCare, a project revolving around a smart environment especially built to enable aging in place. The paper describes the vision behind SmartCare as well as its translation into a deployed system. The physical incarnation of SmartCare is the SmartCare apartment, an actual apartment in a retirement community. We provide a description the technologies that are deployed in the SmartCare apartment. This paper does not introduce novel algorithms for smart environments, rather it provides an architectural system description of a real smart environment that was designed to enable aging in place.
{"title":"SmartCare: An introduction","authors":"M. Huber, G. Záruba, N. Burns, K. Daniel","doi":"10.1109/PERCOMW.2017.7917595","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917595","url":null,"abstract":"This paper introduces SmartCare, a project revolving around a smart environment especially built to enable aging in place. The paper describes the vision behind SmartCare as well as its translation into a deployed system. The physical incarnation of SmartCare is the SmartCare apartment, an actual apartment in a retirement community. We provide a description the technologies that are deployed in the SmartCare apartment. This paper does not introduce novel algorithms for smart environments, rather it provides an architectural system description of a real smart environment that was designed to enable aging in place.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132911964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-13DOI: 10.1109/PERCOMW.2017.7917515
Bahareh Gholampooryazdi, S. Sigg
We investigate the recognition of walking speed by a prototypical 5G system exploiting 52 OFDM carriers over 12.48 MHz bandwidth at 3.45 GHz. We consider the impact of the number of channels exploited and compare the recognition performance with the accuracy achieved by acceleration-based sensing. Our results achieved in an experimental setting with five subjects suggest that accurate recognition of activities and environmental situations can be a reliable implicit service of future 5G installations.
{"title":"Walking speed recognition from 5G Prototype System","authors":"Bahareh Gholampooryazdi, S. Sigg","doi":"10.1109/PERCOMW.2017.7917515","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917515","url":null,"abstract":"We investigate the recognition of walking speed by a prototypical 5G system exploiting 52 OFDM carriers over 12.48 MHz bandwidth at 3.45 GHz. We consider the impact of the number of channels exploited and compare the recognition performance with the accuracy achieved by acceleration-based sensing. Our results achieved in an experimental setting with five subjects suggest that accurate recognition of activities and environmental situations can be a reliable implicit service of future 5G installations.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133062416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-13DOI: 10.1109/PERCOMW.2017.7917559
R. Guan, R. Harle
Fingerprinting has become the most popular approach for infrastructure-free indoor positioning systems. But fingerprinting relies on frequent and exhaustive building surveys to build and maintain a radio map of the indoor environment. A concept being developed recently is the crowdsourced indoor positioning system, where users of an indoor area will collectively contribute sensor data collected by personal smart devices to the construction of the radio map. As a proof of concept, this paper proposes and evaluates a promising approach for building the radio map based on a crowdsourced dataset. Evaluation shows that we can achieve a mean positioning error of less than 3 meters base on the crowdsourced map, slightly worse than conventional path survey approach.
{"title":"Towards a crowdsourced radio map for indoor positioning system","authors":"R. Guan, R. Harle","doi":"10.1109/PERCOMW.2017.7917559","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917559","url":null,"abstract":"Fingerprinting has become the most popular approach for infrastructure-free indoor positioning systems. But fingerprinting relies on frequent and exhaustive building surveys to build and maintain a radio map of the indoor environment. A concept being developed recently is the crowdsourced indoor positioning system, where users of an indoor area will collectively contribute sensor data collected by personal smart devices to the construction of the radio map. As a proof of concept, this paper proposes and evaluates a promising approach for building the radio map based on a crowdsourced dataset. Evaluation shows that we can achieve a mean positioning error of less than 3 meters base on the crowdsourced map, slightly worse than conventional path survey approach.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125724776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-13DOI: 10.1109/PERCOMW.2017.7917606
Baris Aksanli, J. Venkatesh, Christine S. Chan, A. S. Akyurek, T. Simunic
The Internet of Things (IoT) has brought increased sensing, monitoring and actuation capabilities to several domains including residential buildings. Residential energy management methods can leverage these capabilities and devise smarter solutions. This requires processing and reasoning data constantly generated by various IoT devices. In this paper, we use a hierarchical system model for IoT-based residential energy management, that includes a general purpose functional unit to drive data processing and reasoning. We apply this hierarchy to represent the electricity delivery structure from the utilities to individual residences. Our system captures additional data generated by various devices as user context and uses this context to determine user flexibility towards energy management. Our experiments show that modeling user context brings over 14% improvement in energy flexibility prediction accuracy and 12% reduction in annual grid energy cost.
{"title":"Context-aware and user-centric residential energy management","authors":"Baris Aksanli, J. Venkatesh, Christine S. Chan, A. S. Akyurek, T. Simunic","doi":"10.1109/PERCOMW.2017.7917606","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917606","url":null,"abstract":"The Internet of Things (IoT) has brought increased sensing, monitoring and actuation capabilities to several domains including residential buildings. Residential energy management methods can leverage these capabilities and devise smarter solutions. This requires processing and reasoning data constantly generated by various IoT devices. In this paper, we use a hierarchical system model for IoT-based residential energy management, that includes a general purpose functional unit to drive data processing and reasoning. We apply this hierarchy to represent the electricity delivery structure from the utilities to individual residences. Our system captures additional data generated by various devices as user context and uses this context to determine user flexibility towards energy management. Our experiments show that modeling user context brings over 14% improvement in energy flexibility prediction accuracy and 12% reduction in annual grid energy cost.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123391898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-13DOI: 10.1109/PERCOMW.2017.7917533
Ryota Jinnai, A. Inomata, Ismail Arai, K. Fujikawa
Recently, various devices begin to connect the Internet owing to the spread of IoT (Internet of Things). Introduction of IoT technology is progressing also for industrial systems such as plants for the purpose of improving cost efficiency. So, it has become an urgent matter to establish new security countermeasures. But it is not able to respond to some new incidents due to differences in performance or operation between IoT and conventional ICT systems. In some cases, device's stability is more important than the data it self. Therefore, we consider that the security measure from a new viewpoint becomes important. In this paper, we describe the scope of preceding study and hardware security problem that has never been studied. Furthermore, we show the result of load test and impact on output signals under DoS attack. And we propose and implement a new hardware device that can detect DoS attack by only observing electrical signals in the circuit as the countermeasure. Lastly, we explain the contents of the demonstration that implements our proposed method.
{"title":"Proposal of hardware device model for IoT endpoint security and its implementation","authors":"Ryota Jinnai, A. Inomata, Ismail Arai, K. Fujikawa","doi":"10.1109/PERCOMW.2017.7917533","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917533","url":null,"abstract":"Recently, various devices begin to connect the Internet owing to the spread of IoT (Internet of Things). Introduction of IoT technology is progressing also for industrial systems such as plants for the purpose of improving cost efficiency. So, it has become an urgent matter to establish new security countermeasures. But it is not able to respond to some new incidents due to differences in performance or operation between IoT and conventional ICT systems. In some cases, device's stability is more important than the data it self. Therefore, we consider that the security measure from a new viewpoint becomes important. In this paper, we describe the scope of preceding study and hardware security problem that has never been studied. Furthermore, we show the result of load test and impact on output signals under DoS attack. And we propose and implement a new hardware device that can detect DoS attack by only observing electrical signals in the circuit as the countermeasure. Lastly, we explain the contents of the demonstration that implements our proposed method.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124495775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-13DOI: 10.1109/PERCOMW.2017.7917532
Ryan V. Johnson, Rahul Murmuria, A. Stavrou, Vincent Sritapan
Mobile authentication has always been a usability and security challenge. In the past, researchers have discovered various methods to bypass the screen lock protection mechanism without entering authentication credentials on mobile devices. There is a clear need for authentication to be seamless and continuous but also address the security threats that stem from the current unlock-once, always-on mechanisms. To that end, we developed a framework for continuous behavioral authentication of users. In addition, we introduce a configurable “authentication level” for access to resources and applications. For example, if a user's authentication level declines below a pre-specified threshold, all external communications are disabled to prevent exfiltration of sensitive data. Similarly, viewing or modifying any sensitive data on the device is also restricted by moderating access to the underlying file system based on the user's authentication level. We will perform a live demonstration of our entire system implemented for Android 6.0.1, and show how it can successfully defend against a wide range of attacks while improving the usability of the mobile device by offering a seamless authentication experience.
{"title":"Pairing continuous authentication with proactive platform hardening","authors":"Ryan V. Johnson, Rahul Murmuria, A. Stavrou, Vincent Sritapan","doi":"10.1109/PERCOMW.2017.7917532","DOIUrl":"https://doi.org/10.1109/PERCOMW.2017.7917532","url":null,"abstract":"Mobile authentication has always been a usability and security challenge. In the past, researchers have discovered various methods to bypass the screen lock protection mechanism without entering authentication credentials on mobile devices. There is a clear need for authentication to be seamless and continuous but also address the security threats that stem from the current unlock-once, always-on mechanisms. To that end, we developed a framework for continuous behavioral authentication of users. In addition, we introduce a configurable “authentication level” for access to resources and applications. For example, if a user's authentication level declines below a pre-specified threshold, all external communications are disabled to prevent exfiltration of sensitive data. Similarly, viewing or modifying any sensitive data on the device is also restricted by moderating access to the underlying file system based on the user's authentication level. We will perform a live demonstration of our entire system implemented for Android 6.0.1, and show how it can successfully defend against a wide range of attacks while improving the usability of the mobile device by offering a seamless authentication experience.","PeriodicalId":319638,"journal":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125456984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}