Smartphone Data Protection Using Mobile Usage Pattern Matching

Smartphone Data Protection Using Mobile Usage Pattern Matching

ISBN13: 9781609608514|ISBN10: 1609608518|EISBN13: 9781609608521
DOI: 10.4018/978-1-60960-851-4.ch002
Cite Chapter Cite Chapter

MLA

Hu, Wen-Chen, et al. "Smartphone Data Protection Using Mobile Usage Pattern Matching." Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies, edited by Junaid Ahmed Zubairi and Athar Mahboob, IGI Global, 2012, pp. 23-39. https://doi.org/10.4018/978-1-60960-851-4.ch002

APA

Hu, W., Kaabouch, N., Mousavinezhad, S. H., & Yang, H. (2012). Smartphone Data Protection Using Mobile Usage Pattern Matching. In J. Zubairi & A. Mahboob (Eds.), Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies (pp. 23-39). IGI Global. https://doi.org/10.4018/978-1-60960-851-4.ch002

Chicago

Hu, Wen-Chen, et al. "Smartphone Data Protection Using Mobile Usage Pattern Matching." In Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies, edited by Junaid Ahmed Zubairi and Athar Mahboob, 23-39. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-60960-851-4.ch002

Export Reference

Mendeley
Favorite

Abstract

Handheld devices like smartphones must include rigorous and convenient handheld data protection in case the devices are lost or stolen. This research proposes a set of novel approaches to protecting handheld data by using mobile usage pattern matching, which compares the current handheld usage pattern to the stored usage patterns. If they are drastic different, a security action such as requiring a password entry is activated. Various algorithms of pattern matching can be used in this research. Two of them are discussed in this chapter: (i) approximate usage string matching and (ii) usage finite automata. The first method uses approximate string matching to check device usage and the second method converts the usage tree into a deterministic finite automaton (DFA). Experimental results show this method is effective and convenient for handheld data protection, but the accuracy may need to be improved.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.