Study Exploring Security Threats in Waste Phones a Life Cycle Based Approach
In 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation. IEEE.
6 Pages Posted: 4 Sep 2019
Date Written: August 19, 2019
Waste Electrical and Electronic Equipment (WEEE) recycling has become imperative for every nation where the large scale WEEE e-waste management is considered crucial, however, often neglecting small WEEEs. Mobile phone is one of the most important and widely used small WEEE. High metal concentration of mobile phones make their systematic recycling of paramount importance; in contrast, a very small fraction of these devices end up in the government sanctioned recycling units. A majority of the devices are refurbished and repaired which enters the second-hand device market. The existence of the second-hand market has often been neglected in the supply chain of WEEE. Thus, the second-hand device market has introduced the problem of improper channeling and disposal of waste mobile phones with disoriented e-waste management. This can lead to potential threat of exposing personal information from the device of the owner, including login credentials of crucial applications, emails, contact list, messages, and photos. Such disclosures can lead to security threats such as identity theft, data tampering, information disclosure, and others. In this study, through systematic background review, we provide theoretical characterization of the small WEEE, develop the life cycle framework of a mobile phone, identify potential security threats of the devices including cloud storage, and propose mitigation techniques in the implementation stage within the supply chain.
Suggested Citation: Suggested Citation