Abstract
With the growth of the mobile industry, a smart phone has the ability to store large amounts of valuable data such as personal and bank information, the users’ location, call logs and more. Thus, the security of data in the mobile world has become an important issue. The main objective of this survey paper is to review the state-of-the-art technologies for the security of mobile computing. It covers the modern mobile operating systems that are being widely used today. It also identifies the various types of attack vectors particularly designed to infect mobile devices and highlights the available security solution to counter each type of attack. Finally, it briefly discusses the outstanding limitations and challenges in the mobile computing world.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adebayo, O.S., AbdulAziz, N.: Android malware classification using static code analysis and apriori algorithm improved with particle swarm optimization. In: Proceedings of 2014 4th World Congress on Information and Communication Technologies (WICT), pp. 123–128 (2014)
Bergman, N., Stanfield, M., Rouse, J., Scambray, J.: Hacking Exposed: Mobile Security Secrets and Solutions. McGraw-Hill Education, New York (2013)
Chien, E.: Motivations of recent Android malware. Technical report, Symantec Security Response (2011)
Deepak, G., Pradeep, B.: Challenging issues and limitations of mobile computing. Int. J. Comput. Technol. Appl. 3, 177–181 (2012)
Desmedt, Y.: Man-in-the-middle attack. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, p. 759. Springer, Heidelberg (2011)
Esposito, F., Matta, I., Ishakian, V.: Slice embedding solutions for distributed service architectures. ACM Comput. Surv. 46, 6:1–6:29 (2013)
Fedler, R., Kulicke, M., Schutte, J.: An antivirus API for Android malware recognition. In: Proceedings of 2013 8th International Conference on Malicious and Unwanted Software: “The Americas” (MALWARE), pp. 77–84 (2013)
Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), pp. 3–14 (2011)
GarcĂa-Teodoro, P., DĂaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28, 18–28 (2009)
He, D., Chan, S., Guizani, M.: Mobile application security: malware threats and defenses. IEEE Wirel. Commun. 22, 138–144 (2015)
Ladan, M.I.: Mobile computing: security issues. In: Proceedings of 2013 International Conference on Wireless Networks (ICWN), pp. 1–6 (2013)
Lawton, G.: Is it finally time to worry about mobile malware? Computer 41, 12–14 (2008)
Leavitt, N.: Mobile phones: the next frontier for hackers? Computer 38, 20–23 (2005)
Li, W., Joshi, A.: Security issues in mobile ad hoc networks - a survey. Technical report, University of Maryland, USA (2008)
Masoud, N., Karimi, R., Hasanvand, H.A.: Mobile computing: principles, devices and operating systems. World Appl. Program. 2, 399–408 (2012)
mEducation: safeguarding, security and privacy in mobile education. Technical report, GSMA Connected Living Programme: mEducation (2012)
Miller, C., Honoroff, J., Mason, J.: Security evaluation of Apple’s iPhone. Technical report, Independent Security Evaluators (2007)
Nassar, M.: Wireless and mobile computing security challenges and their possible solutions. Am. Sci. Res. J. Eng. Technol. Sci. 3, 66–74 (2015)
Peikari, C.: Protecting embedded devices with integrated permission control (2006). US patent number US20060026687 A1, http://www.google.com/patents/US20060026687
Pullela, S.: Security issues in mobile computing. Technical report, University of Texas at Arlington, USA (2002)
Quercia, D., Hailes, S.: Sybil attacks against mobile users: friends and foes to the rescue. In: Proceedings of 2010 IEEE International Conference on Computer Communications (INFOCOM), pp. 1–5 (2010)
Saha, H.N., Bhattacharyya, D., Banerjee, P.K.: Semi-centralized multi-authenticated RSSI based solution to Sybil attack. Int. J. Netw. Secur. Appl. 1, 338–341 (2010)
Seo, S.H., Gupta, A., Sallam, A.M., Bertino, E., Yim, K.: Detecting mobile malware threats to homeland security through static analysis. J. Netw. Comput. Appl. 38, 43–53 (2014)
Shields, C., Levine, B.N., Margolin, N.B.: A survey of solutions to the Sybil attack. Technical report, University of Massachusetts Amherst, USA (2006)
Stamp, M.: Information Security Principles and Practice. Wiley, New York (2011)
Vasudeva, A., Sood, M.: Sybil attack on lowest ID clustering algorithm in the mobile ad hoc network. Int. J. Netw. Secur. Appl. 4, 135–147 (2012)
Verton, D.: Critical Threads 2006: IT*Security. Lulu.com, Raleigh (2006)
Wu, H., Schwab, S., Peckhams, R.L.: Signature based network intrusion detection system and method (2008). US patent number US7424744 B1, https://www.google.com/patents/US7424744
Xiao, Y.: Security in Distributed, Grid, Mobile, and Pervasive Computing. Auerbach Publications, Boston (2007)
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: defending against Sybil attacks via social networks. In: Proceedings of 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), pp. 267–278 (2006)
Zhou, Y., Jiang, X.: Dissecting Android malware: characterization and evolution. In: Proceedings of 2012 IEEE Symposium on Security and Privacy (S&P), pp. 95–109 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Alwahedi, S., Al Ali, M., Ishowo-Oloko, F., Woon, W.L., Aung, Z. (2017). Security in Mobile Computing: Attack Vectors, Solutions, and Challenges. In: Agüero, R., Zaki, Y., Wenning, BL., Förster, A., Timm-Giel, A. (eds) Mobile Networks and Management. MONAMI 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 191. Springer, Cham. https://doi.org/10.1007/978-3-319-52712-3_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-52712-3_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-52711-6
Online ISBN: 978-3-319-52712-3
eBook Packages: Computer ScienceComputer Science (R0)