work organizers to holiday planners. But this is only
the beginning. As Dilinchian (2009) acknowledges,
smartphones will also “serve health, emergency
services, defence, education, banking, retailing, and
other sectors benefiting from information services”
in the near future
2
.
Smartphone users also store a vast array of
different data on their devices, ranging from
personal pictures to messages (email, SMS, MMS),
contact lists, addresses, birthdates, music, movies
and various other files, depending on the respective
Operating Systems (OS) used. Smartphones can
therefore be considered as light versions of
computers with ubiquitous telephony functionality.
However, this trend also leads to new challenges
in the field of research and development (R&D):
Like desktop computers or their mobile counterparts
such as notebooks or netbooks, smartphones are
increasingly subject to security threats. So far,
relatively little is known about viruses for
smartphones but those and other types of security
breaches will be of relevance in the near future. Due
to the manifold technical possibilities of establishing
connections to the device (UMTS, Infrared,
Bluetooth, W-Lan), the data stored on these devices
is increasingly at risk. In addition, smartphones can
be stolen, lost or merely left at the table unnoticed in
a café or restaurant. If found by a third party with
malign intentions, the data on the device are usually
accessible, unless the owner decided to use
additional device protection mechanisms like pass
codes or device locks.
According to a recent mobile security report
published by McAffee (2009), the “need for
additional security measures on the application,
device platform and network level” arises because
“mobile devices become increasingly multi-
functional and are connected to other guarded and
unguarded networks”. This is primarily because the
main security mechanism with regards to
smartphone or even mobile phone usage still is the
Personal Identification Number (PIN). The PIN
however does not provide sufficient protection to the
data stored on the devices because it authenticates
the user with the network of his Mobile Network
Operator (MNO) when turning on the device. After
the PIN has been entered, the device remains open
and if left in standby mode or constantly turned on,
2
For some sectors, this is already the case. As the broad
availability of mobile banking and brokerage application
available for the iPhone or Android based phones show, the
finance industry has already benefitted from this development.
no other security barrier prevents third parties from
accessing the device. Unless the user explicitly
chooses otherwise, the default setting for
smartphones is considered to be “insecure”, the
device itself remains like a bike lock, it is either
closed or open.
An increased awareness of these issues has led
some research institutes to the evaluation and
analysis of security concerns from a user
perspective. While technical aspects of data
protection and privacy are without a doubt the final
means to an end, it is of crucial importance for
researchers and developers alike to get an idea of
what users consider necessary with regards to their
communication devices. Only then can technically
adequate solutions be provided, that actually have a
chance of being established on the market. Because
there is still a wide gap between usability
3
and
security, the combination of both concepts signifies
an important challenge to researchers and developers
alike. If passwords are becoming more complex
4
,
users might disapprove because in addition to the
already existing amount of PINs and pass codes that
have to be remembered regularly, e.g. ATMs, email
passwords, PC passwords, etc, the objective increase
in security may easily lead to a subjective decrease
in usability. The longer the password, the more
overburdened the user is and thus experiences a poor
usability. In many cases this can even lead to by-
pass strategies on behalf of the user, such as
choosing the same password or PIN for different
applications or services or opting for passwords that
are easy to remember, such as birthdates or names.
The security of devices is then threatened, because
the user turns out to be the weakest link in the
security chain.
In order to make life easier for the users and
increase the joys of using communication devices, a
solution might be to implement different security
levels on smartphones for accessing different types
of data or applications, thereby increasing the
overall protection. If then combined with novel
authentication methods, such as biometric
authentication or memory-based authentication, a
gradual approach to security, based on individual
preferences, might make smartphone usage safer
3
Usability, which can be described as the extent to which a
product can be used with “effectivity, efficiency and
satisfaction” (Iso, 1998), plays an important role in the choice
of an authentication method.
4
For example through a combination of numbers, letters (both
small case and upper case) and symbols.
SECRYPT 2010 - International Conference on Security and Cryptography
156