Classification and Mapping of Adaptive Security for Mobile Computing

被引:11
|
作者
Sajjad, Maryam [1 ]
Ahmad, Aakash [2 ]
Malik, Asad Waqar [1 ]
Altamimi, Ahmed B. [2 ]
Alseadoon, Ibrahim [2 ]
机构
[1] Natl Univ Sci & Technol NUST, Sch Elect Engn & Comp Sci SEECS, Islamabad 44000, Pakistan
[2] Univ Hail UoH, Coll Comp Sci & Engn CCSE, Hail, Saudi Arabia
关键词
Security; Mobile computing; Mobile handsets; Mobile communication; Servers; Data privacy; Systematics; Autonomic computing; evidence based software engineering; mobile computing; security; mapping study; PROTOCOL;
D O I
10.1109/TETC.2018.2791459
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Context: Mobile computing has emerged as a disruptive technology that has empowered its users with portable, connected and context-aware computation. However, issues such as resource poverty, energy efficiency and specifically data security and privacy represents the critical challenges for mobile computing. Objective: The objective of this work is to systematically identify, taxonomically classify and map the state-of-research on adaptive security (a.k.a. self-protection) for mobile computing. Methodology: We followed evidence based software engineering method to conduct a systematic mapping study of 43 qualitatively selected studies-published from 2003 to 2017-on adaptive security for mobile computing. Results and Conclusions: Classification and mapping of the research highlights three prominent themes that support adaptive security for (i) Mobile Device Data and Resources, (ii) Mobile to Mobile Communication, and (iii) Mobile to Server Communication. Mapping analysis suggests that security of mobile device data and resources is the most researched theme. The mapping study highlights that active and futuristic research trends are primarily focused on security as a service, whereas; the frequent research challenges relate to self-protecting mobile devices, user-driven privacy decisions and context-aware security. The results of the mapping study facilitate knowledge transfer that can benefit researchers and practitioners to understand the role of adaptive and context-aware security in mobile computing environments.
引用
收藏
页码:814 / 832
页数:19
相关论文
共 50 条
  • [1] Adaptive security protocol selection for mobile computing
    Rocha, Bruno P. S.
    Costa, Daniel N. O.
    Moreira, Rande A.
    Rezende, Cristiano G.
    Loureiro, Antonio A. F.
    Boukerche, Azzedine
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 33 (05) : 569 - 587
  • [2] Security of Mobile Cloud Computing: A Systematic Mapping Study
    Jara Juarez, Diego X.
    Cedillo, Priscila
    [J]. 2017 IEEE SECOND ECUADOR TECHNICAL CHAPTERS MEETING (ETCM), 2017,
  • [3] Adaptive Security for Self-Protection of Mobile Computing Devices
    Aakash Ahmad
    Asad Waqar Malik
    Abdulrahman Alreshidi
    Wilayat Khan
    Maryam Sajjad
    [J]. Mobile Networks and Applications, 2023, 28 : 653 - 672
  • [4] A Context-Adaptive Security Framework For Mobile Cloud Computing
    Dey, Saurabh
    Sampalli, Srinivas
    Ye, Qiang
    [J]. 2015 11TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN), 2015, : 89 - 95
  • [5] Adaptive Security for Self-Protection of Mobile Computing Devices
    Ahmad, Aakash
    Malik, Asad Waqar
    Alreshidi, Abdulrahman
    Khan, Wilayat
    Sajjad, Maryam
    [J]. MOBILE NETWORKS & APPLICATIONS, 2023, 28 (02): : 1 - 20
  • [6] Online Domain Adaptive Classification for Mobile-to-Edge Computing
    Abkenar, Forough Shirin
    Badia, Leonardo
    Levorato, Marco
    [J]. 2023 IEEE 24TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, WOWMOM, 2023, : 21 - 29
  • [7] Teaching mobile computing and mobile security
    Yuan, Xiaohong
    Williams, Kenneth
    Bryant, Kelvin
    Xu, Jinsheng
    Esterline, Albert
    McCrickard, Scott
    Liu, Anyi
    Hardnett, Charles
    Mohanarajah, Selvarajah
    Lineberry, Litany H.
    Rutledge, Rachel
    [J]. 2016 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2016,
  • [8] Survey on Mobile Computing Security
    Gangula, Arunkumar
    Ansari, Saad
    Gondhalekar, Mayur
    [J]. UKSIM-AMSS SEVENTH EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS 2013), 2013, : 536 - 542
  • [9] Security in mobile computing environments
    Veijalainen, J
    Visa, A
    [J]. MOBILE NETWORKS & APPLICATIONS, 2003, 8 (02): : 111 - 112
  • [10] Mobile Security and Trusted Computing
    Mitchell, Chris
    [J]. IT-INFORMATION TECHNOLOGY, 2006, 48 (06): : 321 - 326