Version 1
: Received: 8 May 2017 / Approved: 9 May 2017 / Online: 9 May 2017 (04:30:47 CEST)
How to cite:
Park, I.-K.; Kwak, J. Implementation of Permission Management Method for Before and After Applications the Update in Android-based IoT Platform Environment. Preprints2017, 2017050075. https://doi.org/10.20944/preprints201705.0075.v1
Park, I.-K.; Kwak, J. Implementation of Permission Management Method for Before and After Applications the Update in Android-based IoT Platform Environment. Preprints 2017, 2017050075. https://doi.org/10.20944/preprints201705.0075.v1
Park, I.-K.; Kwak, J. Implementation of Permission Management Method for Before and After Applications the Update in Android-based IoT Platform Environment. Preprints2017, 2017050075. https://doi.org/10.20944/preprints201705.0075.v1
APA Style
Park, I. K., & Kwak, J. (2017). Implementation of Permission Management Method for Before and After Applications the Update in Android-based IoT Platform Environment. Preprints. https://doi.org/10.20944/preprints201705.0075.v1
Chicago/Turabian Style
Park, I. and Jin Kwak. 2017 "Implementation of Permission Management Method for Before and After Applications the Update in Android-based IoT Platform Environment" Preprints. https://doi.org/10.20944/preprints201705.0075.v1
Abstract
The Android-based IoT platform just like the existing Android provides an environment that makes it easy to utilize Google's infrastructure services including development tools and APIs through which it helps to control the sensors of IoT devices. Applications running on the Android-based IoT platform are often UI free and are used without the user’s consent to registered permissions. It is difficult to respond to the misuse of permissions as well as to check them when they are registered indiscriminately while updating applications. This paper analyzes the versions of before and after an application the update running on the Android-based IoT platform and the collected permission lists. It aims to identify the same permissions before and after the update, and deleted and newly added permissions after the update were identified, and thereby respond to security threats that can arise from the permissions that is not needed for IoT devices to perform certain functions.
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.