What Is This Sensor and Does This App Need Access to It?
Mobile sensors have already proven to be helpful in different aspects of people’s everyday lives such as fitness, gaming, navigation, etc. However, illegitimate access to these sensors results in a malicious program running with an exploit path. While the users are benefiting from richer a...
Main Authors: | Maryam Mehrnezhad, Ehsan Toreini |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-01-01
|
Series: | Informatics |
Subjects: | |
Online Access: | https://www.mdpi.com/2227-9709/6/1/7 |
Similar Items
-
Advantages and Risks of Sensing for Cyber-Physical Security
by: Han, Jun
Published: (2018) -
Design and Research of Security System in University Laboratory
by: Ding Li, et al.
Published: (2020-07-01) -
An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks
by: Xiao Chun Yin, et al.
Published: (2019-07-01) -
Energy Depletion Attacks in Low Power Wireless Networks
by: Van-Linh Nguyen, et al.
Published: (2019-01-01) -
Internet of Things Based Blockchain for Temperature Monitoring and Counterfeit Pharmaceutical Prevention
by: Rajani Singh, et al.
Published: (2020-07-01)