Study Exploring Security Threats in Waste Phones a Life Cycle Based Approach

In 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation. IEEE.

6 Pages Posted: 4 Sep 2019

See all articles by Biswajit Debnath

Biswajit Debnath

Jadavpur University

Sanchari Das

Indiana University Bloomington, School of Informatics and Computing

Ankita Das

Techno India University

Date Written: August 19, 2019

Abstract

Waste Electrical and Electronic Equipment (WEEE) recycling has become imperative for every nation where the large scale WEEE e-waste management is considered crucial, however, often neglecting small WEEEs. Mobile phone is one of the most important and widely used small WEEE. High metal concentration of mobile phones make their systematic recycling of paramount importance; in contrast, a very small fraction of these devices end up in the government sanctioned recycling units. A majority of the devices are refurbished and repaired which enters the second-hand device market. The existence of the second-hand market has often been neglected in the supply chain of WEEE. Thus, the second-hand device market has introduced the problem of improper channeling and disposal of waste mobile phones with disoriented e-waste management. This can lead to potential threat of exposing personal information from the device of the owner, including login credentials of crucial applications, emails, contact list, messages, and photos. Such disclosures can lead to security threats such as identity theft, data tampering, information disclosure, and others. In this study, through systematic background review, we provide theoretical characterization of the small WEEE, develop the life cycle framework of a mobile phone, identify potential security threats of the devices including cloud storage, and propose mitigation techniques in the implementation stage within the supply chain.

Suggested Citation

Debnath, Biswajit and Das, Sanchari and Das, Ankita, Study Exploring Security Threats in Waste Phones a Life Cycle Based Approach (August 19, 2019). In 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation. IEEE.. Available at SSRN: https://ssrn.com/abstract=3443923

Biswajit Debnath

Jadavpur University ( email )

188,
Raja S.C. Mullick Road
Kolkata, 24 parganas 700033
India

Sanchari Das (Contact Author)

Indiana University Bloomington, School of Informatics and Computing ( email )

Bloomington, IN
United States

Ankita Das

Techno India University ( email )

EM-4, Sector-V
Salt Lake
Kolkata, West Bengal 700091
India

Here is the Coronavirus
related research on SSRN

Paper statistics

Downloads
21
Abstract Views
122
PlumX Metrics