CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Security in Mobile: A Survey

Published on February 2015 by Rashmi V R, Sneha Johnson
Advanced Computing and Communication Techniques for High Performance Applications
Foundation of Computer Science USA
ICACCTHPA2014 - Number 1
February 2015
Authors: Rashmi V R, Sneha Johnson
a1380a45-a335-493b-8aef-84530682f7a4

Rashmi V R, Sneha Johnson . Security in Mobile: A Survey. Advanced Computing and Communication Techniques for High Performance Applications. ICACCTHPA2014, 1 (February 2015), 24-29.

@article{
author = { Rashmi V R, Sneha Johnson },
title = { Security in Mobile: A Survey },
journal = { Advanced Computing and Communication Techniques for High Performance Applications },
issue_date = { February 2015 },
volume = { ICACCTHPA2014 },
number = { 1 },
month = { February },
year = { 2015 },
issn = 0975-8887,
pages = { 24-29 },
numpages = 6,
url = { /proceedings/icaccthpa2014/number1/19432-6008/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Advanced Computing and Communication Techniques for High Performance Applications
%A Rashmi V R
%A Sneha Johnson
%T Security in Mobile: A Survey
%J Advanced Computing and Communication Techniques for High Performance Applications
%@ 0975-8887
%V ICACCTHPA2014
%N 1
%P 24-29
%D 2015
%I International Journal of Computer Applications
Abstract

Security is a moving target. Never mind if the pursuit of security can even be fully realized on mobile. Society at large has accepted the tenuous nature of security on personal computers as a virtually unavoidable consequence or side effect of the modern age. But compared to the PC world, mobile is still a relatively new and uncharted battlefield. Nowadays, mobile devices are an important part of our everyday lives since they enable us to access[4] a large variety of ubiquitous services. In recent years, the availability of these ubiquitous and mobile services has significantly increased due to the different form of connectivity provided by mobile devices, such as GSM, GPRS, Bluetooth and Wi-Fi. In the same trend, the number and typologies of vulnerabilities exploiting these services and communication channels have increased as well. Therefore, smartphones may now represent an ideal target for malware writers. As the number of vulnerabilities and, hence, of attacks increase, there has been a corresponding rise of security solutions proposed by researchers.

References
  1. Abdullahi Arabo_ and Bernardi Pranggono. Mobile Malware and Smart Device Security: . Trends, Challenges and Solutions, 19th International Conference on Control Systems and Computer Science, _The Oxford Internet Institute (OII), Oxford University, Oxford, OX1 3JS,
  2. G. Delac, M. Silic and J. Krolo. 2011,. Emerging Security Threats for Mobile Platforms", International Conference on Privacy Communication System & Mobile Platforms ,Faculty of Electrical Engineering and Computing, University of Zagreb, CroatiaK.
  3. Atul M. Tonge1, Suraj S. Kasture2 , Surbhi R. May. - Jun. 2013. Chaudhari,Cyber security: challenges for society. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 2 (), PP 67-75 www. iosrjournals. org
  4. Mariantonietta La Polla, Fabio Martinelli, and Daniele Sgandurra," A Survey on Security for Mobile Devices", ieee communications surveys & tutorials, vol. 15, no. 1, first quarter 2013
  5. Mohsen Sharifi, Somayeh Kafaie, and Omid Kashefi, Member, IEEE," A Survey and Taxonomy of Cyber Foraging of Mobile Devices", Ieee Communications Surveys & Tutorials, Vol. 14, No. 4, Fourth Quarter 2012.
  6. Henne, B. ; Distrib. Comput. & Security Group, Leibniz Univ. Hannover, Hannover, Germany ; Szongott, C. ; Smith, M. " Coupled multi-agent simulations for mobile security & privacy research " Date of Conference: 18-20 June 2012
  7. Hong-Il Ju ,"Security architecture for smart devices:, Mobile Security Res. Team, Electron. & Telecommun. Res. Inst. , Daejeon, South Korea ; Jeong-Nyeo Kim 15-17 Oct. 2012
  8. Wanqing You, Xiamen, China ; Longteng Xu ; Jingyu Rao, "A comparison of TCP and SSL for mobile security " , Dept. of Software Eng. , Univ. of Xiamen, 18-19 May 2013
  9. Mariantonietta La Polla, Fabio Martinelli, and Daniele Sgandurra, "Survey on Security for Mobile Devices", IEEE communications surveys & tutorials, vol. 15, no. 1, first quarter
Index Terms

Computer Science
Information Sciences

Keywords

Botnet Smart Phone Mobile Malware