Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

Protecting Future Personal Computing: Challenging Traditional Network Security Models

Brumfitt, H, Askwith, RJ and Zhou, B (2015) Protecting Future Personal Computing: Challenging Traditional Network Security Models. In: 13th IEEE International Conference on Dependable, Autonomic and Secure Computing . pp. 1772-1779. (13th IEEE International Conference on Dependable, Autonomic and Secure Computing, 26th - 28th October 2015, Livepool UK).

[img]
Preview
Text
124.pdf - Accepted Version

Download (1MB) | Preview

Abstract

The Internet is a notoriously two-way street. If multiple computers can communicate sensitive data across the internet, malicious entities can access the network and collect this data also. The range and number of connected devices is increasing dramatically and with this expansion so is the security risk. Collection of ever rising quantities of data, especially sensitive and personal data, raises many challenges and questions about the suitability of current security. The key problem our research investigates is how we can adapt traditional security models to enhance it both current and future deployment. The work is not aimed to replace existing security although it builds upon it to complement it and enhance existing methods. We utilise the timeliness of the Internet of Things as a focus to develop and experiment with our work. In this paper we present our novel framework and introduce our initial work to prove the concept is feasible. Our initial results are encouraging as to the impact the framework could have on future security.

Keywords- Network security; mobile security; smartphone;
malware detection; in-network; Collaborative; Internet of Things

Item Type: Conference or Workshop Item (Paper)
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Computer Science & Mathematics
Publisher: IEEE
Date Deposited: 09 Dec 2015 08:41
Last Modified: 13 Apr 2022 15:14
URI: https://researchonline.ljmu.ac.uk/id/eprint/2439
View Item View Item