Mobile Computing Security: Issues and Requirements
https://doi.org/10.12720/JAIT.7.1.8-12Abstract
—In recent years the size of computing machines has decreased with more power of computing, which helped to develop the concept of mobile computing like laptops, PDAs, cell phones, data storage device, and other mobile devices. Most people begin acquisition these devices because of the nature and advantages such as easy of carrying and moving it from place to place. Although the wide spread and popularity of these devices, it has introduced new security threats which were not existing in the traditional computing, and it should be identified to protect the physical devices and the sensitive information of users. In this paper, we will highlight on some of the security issues related to mobile computing systems in order to avoid or reduce them, with addressing the security issues into two aspects: first is related to transmission of information over wireless networks, and the second is related to information residing on mobile devices. Finally, some security techniques and requirements are presented.
References (37)
- M. Becher, F. C. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck, and C. Wolf, "Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices," in Proc. 2011 IEEE Symposium on Security and Privacy, May, 2011, pp. 96-111.
- A. Gangula, S. Ansari, and M. Gondhalekar, "Survey on mobile computing security," in Proc. 2013 European IEEE. Conference on Modelling Symposium, November 2013, pp. 536-542.
- J. Korhonen, T. Savolainen, and J. Soininen, Deploying IPv6 in 3GPP Networks: Evolving Mobile Broadband from 2G to LTE and Beyond, John Wiley & Sons. E, 2013.
- I. Mavridis and G. Pangalos, "Security issues in a mobile computing paradigm," Communications and Multimedia Security, Springer. E, vol. 3, p. 61, August, 1997.
- J. York and P. C. Pendharkar, "Human-computer interaction issues for mobile computing in a variable work context," International Journal of Human-Computer Studies, vol. 60, no. 5, pp. 771-797, 2004.
- R. B'far, Mobile Computing Principles: Designing and Developing Mobile Applications with UML and XML, Cambridge University Press. L, 2004.
- M. Castells, The Rise of the Network Society: The Information Age: Economy, Society, and Culture, vol. 1, John Wiley & Sons, 2001.
- R. Malladi and D. P. Agrawal, "Current and future applications of mobile and wireless networks," Communications of the ACM, vol. 45, no. 10, pp. 144-146, 2002.
- M. Satyanarayanan, "Fundamental challenges in mobile computing," in Proc. the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, May 1996, pp. 1-7.
- M. I. Ladan. (2013). Mobile Computing: Security Issues. [Online]. Available: http://weblidi.info.unlp.edu.ar/ WorldComp2013- Mirror/p2013/ICW7143.pdf
- E. Newcomb, T. Pashley, and J. Stasko, "Mobile computing in the retail arena," in Proc. the SIGCHI Conference on Human Factors in Computing Systems, April 2003, pp. 337-344.
- R. A. Botha, S. M. Furnell, and N. L. Clarke, "From desktop to mobile: Examining the security experience," Computers & Security, vol. 28, no. 3, pp. 130-137, 2009.
- H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in mobile ad hoc networks: Challenges and solutions," Wireless Communications, vol. 11, no. 1, pp. 38-47, 2004.
- B. Bakmaz, M. Bakmaz, and Z. Bojkovic, "Security aspects in future mobile networks," in Proc. 15th International Conference on Systems, Signals and Image Processing, June 2008, pp. 479- 482.
- M. Cremonini, E. Damiani, S. C. di Vimercati, P. Samarati, A. Corallo, and G. Elia, "Security, privacy, and trust in mobile systems," Encyclopedia of E-Commerce, E-Government, and Mobile Commerce, Hershey: Idea Group Reference, pp. 973-978, June 2006.
- R. Sheikh, M. S. Chande, and D. K. Mishra, "Security issues in MANET: A review," in Proc. 2010 Seventh International IEEE Conference on Wireless and Optical Communications Networks, September 2010, pp. 1-4.
- I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong, "Freenet: A distributed anonymous information storage and retrieval system," Designing Privacy Enhancing Technologies, Springer Berlin Heidelberg, January 2001, pp. 46-66.
- J. Li, M. N. Krohn, D. Mazieres, and D. Shasha, "Secure untrusted data repository (SUNDR)," OSDI, vol. 4, p. 9, December, 2004.
- I. Stojmenovic, I. (Ed.). Handbook of Wireless Networks and Mobile Computing, vol. 27, John Wiley & Sons, 2003.
- J. Bellardo and S. Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," USENIX Security, pp. 15- 28, August 2003.
- T. S. Sobh, "Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art," Computer Standards & Interfaces, vol. 28, no. 6, pp. 670-694, 2006.
- A. Beach, M. Gartrell, and R. Han, "Solutions to security and privacy issues in mobile social networking," in Proc. IEEE International Conference on Computational Science and Engineering, vol. 4, August 2009, pp. 1036-1042.
- D. Geneiatakis, T. Dagiuklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, S. Ehlert, and D. Sisalem, "Survey of security vulnerabilities in session initiation protocol," IEEE Communications Surveys and Tutorials, vol. 8, no. 1-4, pp. 68-81, 2006.
- S. A. Schuckers, "Spoofing and anti-spoofing measures," Information Security Technical Report, vol. 7, no. 4, pp. 56-62, 2002.
- W. Stallings, Network Security Essentials: Applications and Standards, Pearson Education India, 2007.
- S. J. Cereola and R. J. Cereola, "Breach of data at TJX: An instructional case used to study COSO and COBIT, with a focus on computer controls, data security, and privacy legislation," Issues in Accounting Education, vol. 26, no. 3, pp. 521-545.
- S. Ramu, "Mobile malware evolution, detection and defense," EECE 571B, Term Survey Paper, 2006.
- C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2, pp. 293-315, 2003.
- J. J. V. Rensburg and B. Irwin, "Wireless security tools," Computer Science, vol. 83, no. 944, p. 3924, 2006.
- T. Hardjono and J. Seberry, Information Security Issues in Mobile
- M. Decker, "A security model for mobile processes," in Proc. 7th International IEEE Conference on Mobile Business, July 2008, pp. 211-220.
- G. H. Forman and J. Zahorjan, "The challenges of mobile computing," Computer, vol. 27, no. 4, pp. 38-47, 1994.
- F. M. Heikkila, "Encryption: Security considerations for portable media devices," IEEE Security & Privacy, vol. 5, no. 4, pp. 0022- 27, 2007.
- S. Schwiderski-Grosche and H. Knospe, "Secure mobile commerce," Electronics & Communication Engineering Journal, vol. 14, no. 5, pp. 228-238, 2002.
- J. Friedman and D. V. Hoffman, "Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses," Information, Knowledge, Systems Management, vol. 7, no. 1, pp. 159-180, 2008.
- H. Dwivedi, Mobile Application Security, Tata McGraw-Hill Education, 2010.
- G. Chang, C. Tan, G. Li, and C. Zhu, "Developing mobile applications on the android platform," Mobile Multimedia Processing, Springer Berlin Heidelberg, 2010, pp. 264-286.