Keywords

1 Introduction

Security risks in mobile platforms are increasingly a customer concern. In particular, the theft of personal data is a widely discussed issue. As a consequence, some mobile platforms have begun to develop specific solutions to avoid the theft of private data from mobile terminals. Indeed, threats in mobile platforms open up a new market for anti-virus providers, whose products have been adapted to protect mobile platforms (e.g. McAfee Mobile Security). These new services are of particular interest in corporate environments, where personal devices can inadvertently introduce malware into the system. In addition, from a commercial point of view, new emerging technologies (e.g. NFC) open the door to new ways to trick the user [6, 11].

Furthermore, the widespread use of multimedia applications does necessitate the presence of mechanisms to ensure the quality of service (QoS), and more generally the quality of experience (QoE). These applications have the added difficulty of being deployed in resource-constrained devices, so more requirements have to be taken into account apart from those concerned with improving the multimedia capabilities. Therefore it is not only the network parameters that must to be controlled. In mobile platforms the QoS mechanisms have to integrate network parameters (e.g. bandwidth) and device parameters (e.g. battery power). Furthermore, as user’s satisfaction is closely related with the success of the platform, it is fundamental to add QoE measurements to the quality study. However, security mechanisms can damage the user’s opinion [13]. In fact, security mechanisms tend to consume network and local resources and can easily affect the normal performance of devices.

The main objective behind the approach presented here is to provide an analysis about security and QoS tradeoffs in mobile platforms where the aforementioned concepts will be widely exposed. Indeed, although such concepts are separately analyzed in several papers, in the end they have to coexist in the same environment. Thus, understanding these relationships previous to running it on the architecture is fundamental to savings in cost and ensuring better security and performance. As a result, we provide a parametric relationship scheme between security and QoS, which also considers the effect that such dependencies have on the user perception.

The remainder of the paper is organized as follows: Sect. 2 provides an analysis on the current challenges related with Security and QoS. In Sect. 3, an analysis of Security and QoS tradeoffs in mobile platforms is shown. Finally, Sect. 4 discusses related work and Sect. 5 concludes the paper.

2 Security and QoS Challenges

Figure 1 shows a simplified diagram with the main Security and QoS challenges identified based on the current literature. We consider three sections: commercial purposes, development and communication.

Fig. 1
figure 1

Security and QoS challenges

Commercial Purposes: Identifies popular characteristics developed with the aim of improving functionality of personal devices to be more attractive for the user. For example, in the QoS context, the use of multiple radio antennas allows better transmission services at higher speeds and also offers the possibility for early detection of collisions, among other things [12], but increase the complexity of the system [2, 21]. Regarding security, NFC allows secure e-payment, and can be built in the device as it is anti-tampering, but it can also affect the system’s overhead by increasing the transaction time and therefore the response time [5]. To the contrary, QR-codes can be used (like tokens) in authentication mechanisms to reduce the response time [18]. However, both NFC and QR-codes open the door to new threats [19] and ways to trick the user [5, 10]. We also note that context-based services are also of growing interest [22], because they allow a more realistic behavior based on knowledge.

Development: Takes into account the security risks due to a wrong implementation of security requirements [9, 20]. Related with it, [14] highlights the importance of establishing different users’ permission levels to prevent that, once the attacker finds a bug in the system, it can take absolute control. Also it is necessary to pay attention to problems caused by incompatibility of functions. For example, privacy mechanisms based on space randomization (e.g. ASLR) can be unusable when inheritance-based mechanisms (e.g. Zygote) are used to allow two processes to share the same memory space to reduce the overhead [17]. Note that privacy is becoming a major issue, because user participation in mobile platforms requires it. But, privacy is being continuously threatened. For example, in [8], the authors show that it is possible to recover information from mobile platforms even though it has been deleted.

Communication: Considers the requirements and mechanisms to protect network communication at a low cost. From a QoS point of view, solutions to provide end-to-end QoS guarantees should consider local QoS requirements, such as memory, or energy consumption. The last one is critical, not only to improve the QoE, but also because without it the device is useless. Traditional QoS requirements and energy consumption tradeoffs are studied in [1, 3, 21]. In particular, [1] provides a solution based on predicting the behavior of the system, which is not always a feasible option. From a security point of view, trust mechanisms are fundamental to ensure the survival of a communication platform based on the interaction between entities through the Internet. However, it implies in several cases the use of certificates or complex authentication schemes that are not supported on mobile phones.

3 Parametric Relationships on Mobile Platforms

This section analyses the dependencies between Security and QoS parameters illustrated in Fig. 2. Below, the mathematical definition of each relation is described.

Fig. 2
figure 2

Security and QoS parametric relationships in mobile platform

3.1 Mathematical Definition

In our previous work [16] we defined a set of dependency relationships between parameters (1, 2, 5, 6). However, we need to add new equations to the current formulation to express the specific dependencies on mobile platforms. Below, we work with a formulation based on basic expressions (1–4) in order to clarify the dependencies diagram (Fig. 2).

Basic expressions

Complex expressions (based on 1–4)

\( D^{ + } ::aD^{ + } b \Rightarrow (\Updelta a \to \Updelta b) \)

(1)

\( D^{c} ::(\Updelta a \to \Updelta b) \wedge (\nabla a \to \nabla b) \equiv aD^{ + } b \wedge aD^{\neg + } b \)

(5)

\( D^{ - } ::aD^{ - } b \Rightarrow (\Updelta a \to \nabla b) \)

(2)

\( D^{t} ::aD^{c} b \wedge bD^{c} a \)

(6)

\( D^{\neg + } ::aD^{\neg + } b \Rightarrow (\nabla a \to \nabla b) \)

(3)

\( D^{\neg c} ::(\Updelta a \to \nabla b) \wedge (\nabla a \to \Updelta b) \equiv aD^{ - } b \wedge aD^{\neg - } b \)

(7)

\( D^{\neg - } ::aD^{\neg - } b \Rightarrow (\nabla a \to \Updelta b) \)

(4)

\( D^{i + } ::(\Updelta a \to \Updelta b) \wedge (\nabla a \to \Updelta b) \equiv aD^{ + } b \wedge aD^{\neg - } b \)

(8)

  

\( D^{i - } ::(\Updelta a \to \nabla b) \wedge (\nabla a \to \nabla b) \equiv aD^{ - } b \wedge aD^{\neg + } b \)

(9)

In order to get a basic set of equations, we add to the formulation in [16] the Eqs. (3 and 4), corresponding to inverse positive and negative respectively. D¬+ (3) means that the decrement of the first parameter causes the decrement of the second parameter, while in D¬− (4) the decrement of the first parameter causes the increment of the second parameter. Moreover, complex equations are obtainable from basic equations by adding to the formulation in [16] the Eqs. 7, 8 and 9, corresponding to inverse complete, independent positive and independent negative respectively. D¬c (7) means that both parameters are related negatively (D) and inverse negatively (D¬−). The independent relationships (8 and 9) have been added to reflect the dependencies in which regardless the change of value in the first parameter the result is always the increasing (Di+) or decreasing (Di−) of the second parameter. This happens, for example, with the relationship between parameters Delay and Jitter, as we shall see.

3.2 Dependency Relationships Diagram

Fig. 2 shows the dependency relationships diagram that we will now explain. Each dependency is marked with the dependency symbol corresponding to the dependency relationship (+, −, ¬ +, ¬ −, c, t, ¬ c, i + , i−) and the reference to the article where it appears. However, some of them are based on known formulations for the calculation of some parameters, specifically 10, 11 and 12. These last dependencies have been highlighted with the symbol *. There are also some dependencies that are explained in the text, and that appear without being referenced in any paper previously mentioned here. Moreover, the diagram also integrates the SLA traffic classes named in [15], which are: Interactive, Background, Streaming and Conversational.

$$ {\text{Delay }} = \, \# {\text{bits}}/{\text{DataRate}} $$
(10)
$$ {\text{Jitter }} = \, \left| {{\text{DelayT}}_{0} -{\text{ DelayT}}_{ 1} } \right| $$
(11)
$$ {\text{Throughput}}\left( {\text{per user}} \right) \, = {\text{ DataRate}}/\# {\text{Users}} $$
(12)

As we can see, delay, throughput and power consumption are highly influenced by the rest of parameters and characteristics. On the one hand, delay severely affects network performance. As we can see in Fig. 2, both streaming and conversational traffic are affected whether delay increases or not. Note that buffering can help to minimize the delay if the data can be pre-processed while it is in the buffer, and also helps to decrease packet loss when an adequate buffer size is defined. However, the buffering technique demands memory in order to work. We also observe that the handover increases the delay, as do the authentication mechanisms. Moreover, although increasing data rate can decrease the delay (13), it is important to note that it also may cause interferences because high speeds introduce noise. In addition, long packet size can increase the delay because it introduces more data to be sent in the same packet (14). So, depending on the intermediary communication mechanisms, it can require a greater amount of time to be processed (e.g. decode/coding data). In addition, when the receptor fails, the entire packet has to be sent again.

$$ (\Updelta DataRate \to \nabla Delay) \wedge (\nabla DataRate \to \Updelta Delay) \equiv DataRateD^{\neg c} Delay $$
(13)
$$ (\Updelta \# bits \to \Updelta Delay) \wedge (\nabla \# bits \to \nabla Delay) \equiv PacketSizeD^{c} Delay $$
(14)

On the other hand, although increasing the packet size means the delay increases, when the packet size is very small it may cause throughput degradation because each packet requires that a header is sent, increasing the volume of data to be sent. Therefore, header content is not considered as useful data for communication at service level, and thus the throughput decreases. However, if the packet size is too big then the throughput can be damaged too. For example, if the packet size is static and the data to be sent is less than the packet size, then the packet has to be completed with garbage data to achieve the total size, and such data cannot be counted as useful data. The problem is greater if bandwidth reservation mechanisms are static. In such cases, the bandwidth that has been previously reserved is unusable for other devices. As a consequence, the greater the packet size the higher the bandwidth reservation, decreasing the network’s resources.

Note that, when the delay increases then the throughput decreases because the channel is probably saturated. Contrarily, when the delay decreases the throughput can be increased because there are more available resources for data transmission and fewer errors are likely to occur. If the throughput is poor, the service is not receiving sufficient data to work properly. This can damage the user’s perception of the service, which is also affected when the response time increases. Packet loss affects both; throughput and delay. When packet loss is high (e.g. due to congestion or the high error probability), the delay increases and, contrarily, the throughput decreases (in the case that the re-send data is not considered for throughput calculation). Indeed, if the packet loss increases, then the number of retransmissions also increases, thus increasing the data transfer and also the power consumption.

Regarding the power consumption, it is strongly decreased by the time that the antennas are active (required time-on). Thus, although local security mechanisms increase the computational requirements, the power consumption is increased mainly due to those operations related with data transmission. Note that, by decreasing the required time-on, the power consumption can also decrease if the network interface is disabled in such situations. Indeed, if the data rate increases, then the required time-on decreases, but it is possible that noise appears when speed increases. LTE, one 4G technology, requires ICIC techniques to avoid interferences, precisely due to high speeds. However, it does not mean that, because of this, LTE terminals consume less energy. On the contrary, LTE technology is able to use multiple antennas, improving performance in communications, but also requiring more energy for transmission. Besides, multiple antennas also increase the complexity of the terminal, where concurrent operations can coexist increasing the interference probability.

Finally, in general, security mechanisms increase the response time. It is particularly true when additional messages to establish a secure communication channel are required. The rising amount of data to be sent inevitably affects power consumption, but also causes delay, which increases as a consequence of the growing traffic. Cryptographic techniques also affect power consumption, but sent data requires even more energy than that. Therefore, when authentication mechanisms have to be performed during the handover, the overall performance of the network can be severely damaged. Indeed, the handover process involves several operations to be effective (message interchange between entities), and, therefore, it also increases the power consumption by itself. Lastly, privacy mechanisms based on space randomization (e.g. ASLR) provide local security for user’s data. However, context-based services require the storing of the user’s preferences in the mobile platform or sending it to an external server in order to work. In both cases the user’s privacy is affected.

4 Related Work

There are some papers related with the study of Security and QoS tradeoffs, although they have been developed within a specific scenario. Therefore they do not provide a general view of the current state of the art in mobile platforms. For example, [13] analyzes how the authentication mechanisms affects delay, and how it affects the user’s perception. Moreover, the end-to-end secure protocol proposed in [7] for Java ME-based mobile data collection also considers the balance between flexibility, efficiency, usability and security. In said work, the effect that different encryption algorithms (e.g. AES, RSA) have on performance has been studied. Moreover, [4] propose SECR3T, a secure communication system over 3G networks that considers QoS restrictions. For example, the paper shows the effect that encryption protocols have on delay (minimum and maximum), and how it affects different types of data (audio and video). Power consumption is also considered, and the authors conclude that it greatly depends on the implementation of the protocol used (e.g. TLS, ECDH). Moreover, as we have seen, in [18] the advantages of using QR-codes for authentication in Cloud computing environments in order to increase the performance are highlighted, and in [5] the impact of NFC technology on delay and computation time is shown.

5 Conclusions

In this paper we have seen how several studies have focused on both security and QoS concepts, although with different aims, deploying mechanisms or defining models to solve specific problems. We have carried out an analysis of such mechanisms and also detected further challenges to be addressed. Moreover, we have grouped this knowledge in a comprehensive dependency relationship map, in order to enable the future development of tools to support developers in the development of secure and efficient services for mobile platforms. The final diagram shows that delay, throughput and power consumption are highly influenced by the rest of the parameters and characteristics. Note that, in this paper we provide several examples where security and QoS tradeoffs are present. However, in such papers the tradeoffs are very specific, mainly focusing on a particular problem or scenario and are not considered together. This lack of abstraction makes the complete understanding of security and QoS tradeoffs in mobile networks more difficult. The novelty of this paper is therefore, precisely, in providing such a global vision where, in addition, parametric relationships are provided within an understandable logic.