Next Article in Journal
Green Logistic Provider Selection with a Hesitant Fuzzy Linguistic Thermodynamic Method Integrating Cumulative Prospect Theory and PROMETHEE
Next Article in Special Issue
Constructing Differentiated Educational Materials Using Semantic Annotation for Sustainable Education in IoT Environments
Previous Article in Journal
Reaching Sustainable Financial Health: Gender Differences in Risk-Taking Patterns of Financially Excluded People
Previous Article in Special Issue
Instant Social Networking with Startup Time Minimization Based on Mobile Cloud Computing
Open AccessArticle

Efficient Protection of Android Applications through User Authentication Using Peripheral Devices

School of Electronics Engineering, Kyungpook National University, Daegu 41566, Korea
*
Author to whom correspondence should be addressed.
Sustainability 2018, 10(4), 1290; https://doi.org/10.3390/su10041290
Received: 22 March 2018 / Revised: 17 April 2018 / Accepted: 20 April 2018 / Published: 22 April 2018
Android applications store large amounts of sensitive information that may be exposed and exploited. To prevent this security risk, some applications such as Syrup and KakaoTalk use physical device values to authenticate or encrypt application data. However, by manipulating these physical device values, an attacker can circumvent the authentication by executing a Same Identifier Attack and obtain the same application privileges as the user. In our work, WhatsApp, KakaoTalk, Facebook, Amazon, and Syrup were subjected to the Same Identifier Attack, and it was found that an attacker could gain the same privileges as the user, in all five applications. To solve such a problem, we propose a technical scheme—User Authentication using Peripheral Devices. We applied the proposed scheme to a Nexus 5X smartphone running Android version 7.1 and confirmed that the average execution time was 0.005 s, which does not affect the other applications’ execution significantly. We also describe the security aspects of the proposed scheme and its compatibility with the Android platform and other applications. The proposed scheme is practical and efficient in terms of resource usage; therefore, it will be useful for Android users to improve Android application security. View Full-Text
Keywords: Android vulnerability; Android protection; Same Identifier Attack; User Authentication using Peripheral Devices; Android security Android vulnerability; Android protection; Same Identifier Attack; User Authentication using Peripheral Devices; Android security
Show Figures

Figure 1

MDPI and ACS Style

Kim, J.; Jung, I.Y. Efficient Protection of Android Applications through User Authentication Using Peripheral Devices. Sustainability 2018, 10, 1290.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop