Enhancing security of android operating system based phones using quantum key distribution

Nageen Saleem, Areeba Rahman, Muhammad Rizwan, Fahad Ahmad, Shahid Naseem

Research output: Contribution to journalArticlepeer-review

1 Downloads (Pure)

Abstract

The Android-based devices are gaining popularity now a day. With the widespread use of smartphones both in private and work-related areas, securing these devices has become of paramount importance. These devices are prone to various security issues of malicious attacks and performance problems. Owners use their smartphones to perform tasks ranging from everyday communication with friends and family to the management of banking accounts and accessing sensitive work-related data. These factors, combined with limitations in administrative device control through owners and securitycritical applications, make Android-based smartphones a very attractive target for attackers and malware authors of any kind and motivation. Applications keep and manage diverse intrinsic data as well as sensitive private information such as address books. Smartphones enable swift and easy data exchange via 3G, 4G, and Wi-Fi. Thus, personal information stored on smartphones is prone to leakage. Up until recently, the Android Operating System’s security model has succeeded in preventing any significant attacks by malware. This can be attributed to a lack of attack vectors which could be used for self-spreading infections and low sophistication of malicious applications. The research provides a distinctive solution to the security threats being found in the Android operating system. This paper presents a data security and quality enhancement method based on amalgamating quantum attributes into the Android operating system that could effectively solve the issue raised. The paper provides a proposed architecture of Quantum Key distribution being embedded within the Android OS to improve efficiency. However, QKD is a new technology. The research unleashes the possible ways in which quantum could be effectively embedded in smartphones to resolve certain data security problems. Quantum key distribution implements the Android to guard and use in the case of a run-time kernel compromise. That is, even with a fully compromised kernel, an attacker cannot read key material stored in Quantum key.
Original languageEnglish
Article numbere10
Number of pages8
JournalEAI Endorsed Transactions on Scalable Information Systems
Volume7
Issue number28
DOIs
Publication statusPublished - 15 Jun 2020

Keywords

  • Quantum Key Distribution (QKD)
  • BB84 Protocol
  • Third-party applications
  • Encryption

Cite this