Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Implementation of Permission Management Method for Before and After Applications the Update in Android-based IoT Platform Environment

Version 1 : Received: 8 May 2017 / Approved: 9 May 2017 / Online: 9 May 2017 (04:30:47 CEST)

How to cite: Park, I.; Kwak, J. Implementation of Permission Management Method for Before and After Applications the Update in Android-based IoT Platform Environment. Preprints 2017, 2017050075. https://doi.org/10.20944/preprints201705.0075.v1 Park, I.; Kwak, J. Implementation of Permission Management Method for Before and After Applications the Update in Android-based IoT Platform Environment. Preprints 2017, 2017050075. https://doi.org/10.20944/preprints201705.0075.v1

Abstract

The Android-based IoT platform just like the existing Android provides an environment that makes it easy to utilize Google's infrastructure services including development tools and APIs through which it helps to control the sensors of IoT devices. Applications running on the Android-based IoT platform are often UI free and are used without the user’s consent to registered permissions. It is difficult to respond to the misuse of permissions as well as to check them when they are registered indiscriminately while updating applications. This paper analyzes the versions of before and after an application the update running on the Android-based IoT platform and the collected permission lists. It aims to identify the same permissions before and after the update, and deleted and newly added permissions after the update were identified, and thereby respond to security threats that can arise from the permissions that is not needed for IoT devices to perform certain functions.

Keywords

Android permissions; Android IoT platform; Android update; Android application

Subject

Computer Science and Mathematics, Software

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.