Research Article

Ubi-RKE: A Rhythm Key Based Encryption Scheme for Ubiquitous Devices

Table 1

Security threats of ubiquitous device and their descriptions.

Security threatDescription

MalwareMalware can infect ubiquitous devices through e-mails, web sites, malicious files, and so forth. Users of infected devices can experience undesired effects, security breaches, and/or damage to the device.

LossLoss of a ubiquitous device is equivalent to loss of all information stored on the device. Ubiquitous device in wrong hands leads to unauthorized access and misuse and discloses the contents stored on the device.

SniffingUbiquitous devices use a wireless communication method such as 3G, 4G, Bluetooth, and Wi-Fi. Users can connect to public and private wireless networks to communicate between devices and networks. This means that users have a potential risk of information leakage from an attacker seeking to access the data.

Unauthorized information accessUsers install many applications on ubiquitous devices. We cannot check every piece of data inside and outside a network for every application. Recovery of leaked data is difficult, even if the data are stolen through the network.