What Is This Sensor and Does This App Need Access to It?
Journal Title: Informatics - Year 2019, Vol 6, Issue 1
Abstract
Mobile sensors have already proven to be helpful in different aspects of people’s everyday lives such as fitness, gaming, navigation, etc. However, illegitimate access to these sensors results in a malicious program running with an exploit path. While the users are benefiting from richer and more personalized apps, the growing number of sensors introduces new security and privacy risks to end users and makes the task of sensor management more complex. In this paper, first, we discuss the issues around the security and privacy of mobile sensors. We investigate the available sensors on mainstream mobile devices and study the permission policies that Android, iOS and mobile web browsers offer for them. Second, we reflect the results of two workshops that we organized on mobile sensor security. In these workshops, the participants were introduced to mobile sensors by working with sensor-enabled apps. We evaluated the risk levels perceived by the participants for these sensors after they understood the functionalities of these sensors. The results showed that knowing sensors by working with sensor-enabled apps would not immediately improve the users’ security inference of the actual risks of these sensors. However, other factors such as the prior general knowledge about these sensors and their risks had a strong impact on the users’ perception. We also taught the participants about the ways that they could audit their apps and their permissions. Our findings showed that when mobile users were provided with reasonable choices and intuitive teaching, they could easily self-direct themselves to improve their security and privacy. Finally, we provide recommendations for educators, app developers, and mobile users to contribute toward awareness and education on this topic.
Authors and Affiliations
Maryam Mehrnezhad and Ehsan Toreini
Real-Time and Embedded Detection of Hand Gestures with an IMU-Based Glove†
This article focuses on the use of data gloves for human-computer interaction concepts, where external sensors cannot always fully observe the user’s hand. A good concept hereby allows to intuitively switch the interac...
Back-Off Time Calculation Algorithms in WSN
In a Mobile Wireless Sensor Mesh Network (MWSMN), based on the IEEE 802.15.4 standard, low power consumption is vitally important since the network devices are mostly battery driven. This is especially true for devices...
Domain-Specific Aspect-Sentiment Pair Extraction Using Rules and Compound Noun Lexicon for Customer Reviews
Online reviews are an important source of opinion to measure products’ quality. Hence, automated opinion mining is used to extract important features (aspect) and related comments (sentiment). Extraction of correct asp...
Recognition of Physical Activities from a Single Arm-Worn Accelerometer: A Multiway Approach
In current clinical practice, functional limitations due to chronic musculoskeletal diseases are still being assessed subjectively, e.g., using questionnaires and function scores. Performance-based methods, on the othe...
Mobile Phones Help Develop Listening Skills
Listening is one of the most difficult language skills among the four communication competences; however, it has received much less time in English learning than the other three (reading, writing, and speaking). Also,...