Skip to main content

Security in Mobile Computing: Attack Vectors, Solutions, and Challenges

  • Conference paper
  • First Online:
Mobile Networks and Management (MONAMI 2016)

Abstract

With the growth of the mobile industry, a smart phone has the ability to store large amounts of valuable data such as personal and bank information, the users’ location, call logs and more. Thus, the security of data in the mobile world has become an important issue. The main objective of this survey paper is to review the state-of-the-art technologies for the security of mobile computing. It covers the modern mobile operating systems that are being widely used today. It also identifies the various types of attack vectors particularly designed to infect mobile devices and highlights the available security solution to counter each type of attack. Finally, it briefly discusses the outstanding limitations and challenges in the mobile computing world.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adebayo, O.S., AbdulAziz, N.: Android malware classification using static code analysis and apriori algorithm improved with particle swarm optimization. In: Proceedings of 2014 4th World Congress on Information and Communication Technologies (WICT), pp. 123–128 (2014)

    Google Scholar 

  2. Bergman, N., Stanfield, M., Rouse, J., Scambray, J.: Hacking Exposed: Mobile Security Secrets and Solutions. McGraw-Hill Education, New York (2013)

    Google Scholar 

  3. Chien, E.: Motivations of recent Android malware. Technical report, Symantec Security Response (2011)

    Google Scholar 

  4. Deepak, G., Pradeep, B.: Challenging issues and limitations of mobile computing. Int. J. Comput. Technol. Appl. 3, 177–181 (2012)

    Google Scholar 

  5. Desmedt, Y.: Man-in-the-middle attack. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, p. 759. Springer, Heidelberg (2011)

    Google Scholar 

  6. Esposito, F., Matta, I., Ishakian, V.: Slice embedding solutions for distributed service architectures. ACM Comput. Surv. 46, 6:1–6:29 (2013)

    Article  MATH  Google Scholar 

  7. Fedler, R., Kulicke, M., Schutte, J.: An antivirus API for Android malware recognition. In: Proceedings of 2013 8th International Conference on Malicious and Unwanted Software: “The Americas” (MALWARE), pp. 77–84 (2013)

    Google Scholar 

  8. Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), pp. 3–14 (2011)

    Google Scholar 

  9. García-Teodoro, P., Díaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28, 18–28 (2009)

    Article  Google Scholar 

  10. He, D., Chan, S., Guizani, M.: Mobile application security: malware threats and defenses. IEEE Wirel. Commun. 22, 138–144 (2015)

    Article  Google Scholar 

  11. Ladan, M.I.: Mobile computing: security issues. In: Proceedings of 2013 International Conference on Wireless Networks (ICWN), pp. 1–6 (2013)

    Google Scholar 

  12. Lawton, G.: Is it finally time to worry about mobile malware? Computer 41, 12–14 (2008)

    Article  Google Scholar 

  13. Leavitt, N.: Mobile phones: the next frontier for hackers? Computer 38, 20–23 (2005)

    Google Scholar 

  14. Li, W., Joshi, A.: Security issues in mobile ad hoc networks - a survey. Technical report, University of Maryland, USA (2008)

    Google Scholar 

  15. Masoud, N., Karimi, R., Hasanvand, H.A.: Mobile computing: principles, devices and operating systems. World Appl. Program. 2, 399–408 (2012)

    Google Scholar 

  16. mEducation: safeguarding, security and privacy in mobile education. Technical report, GSMA Connected Living Programme: mEducation (2012)

    Google Scholar 

  17. Miller, C., Honoroff, J., Mason, J.: Security evaluation of Apple’s iPhone. Technical report, Independent Security Evaluators (2007)

    Google Scholar 

  18. Nassar, M.: Wireless and mobile computing security challenges and their possible solutions. Am. Sci. Res. J. Eng. Technol. Sci. 3, 66–74 (2015)

    Google Scholar 

  19. Peikari, C.: Protecting embedded devices with integrated permission control (2006). US patent number US20060026687 A1, http://www.google.com/patents/US20060026687

  20. Pullela, S.: Security issues in mobile computing. Technical report, University of Texas at Arlington, USA (2002)

    Google Scholar 

  21. Quercia, D., Hailes, S.: Sybil attacks against mobile users: friends and foes to the rescue. In: Proceedings of 2010 IEEE International Conference on Computer Communications (INFOCOM), pp. 1–5 (2010)

    Google Scholar 

  22. Saha, H.N., Bhattacharyya, D., Banerjee, P.K.: Semi-centralized multi-authenticated RSSI based solution to Sybil attack. Int. J. Netw. Secur. Appl. 1, 338–341 (2010)

    Google Scholar 

  23. Seo, S.H., Gupta, A., Sallam, A.M., Bertino, E., Yim, K.: Detecting mobile malware threats to homeland security through static analysis. J. Netw. Comput. Appl. 38, 43–53 (2014)

    Article  Google Scholar 

  24. Shields, C., Levine, B.N., Margolin, N.B.: A survey of solutions to the Sybil attack. Technical report, University of Massachusetts Amherst, USA (2006)

    Google Scholar 

  25. Stamp, M.: Information Security Principles and Practice. Wiley, New York (2011)

    Book  Google Scholar 

  26. Vasudeva, A., Sood, M.: Sybil attack on lowest ID clustering algorithm in the mobile ad hoc network. Int. J. Netw. Secur. Appl. 4, 135–147 (2012)

    Google Scholar 

  27. Verton, D.: Critical Threads 2006: IT*Security. Lulu.com, Raleigh (2006)

    Google Scholar 

  28. Wu, H., Schwab, S., Peckhams, R.L.: Signature based network intrusion detection system and method (2008). US patent number US7424744 B1, https://www.google.com/patents/US7424744

  29. Xiao, Y.: Security in Distributed, Grid, Mobile, and Pervasive Computing. Auerbach Publications, Boston (2007)

    Book  Google Scholar 

  30. Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: defending against Sybil attacks via social networks. In: Proceedings of 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), pp. 267–278 (2006)

    Google Scholar 

  31. Zhou, Y., Jiang, X.: Dissecting Android malware: characterization and evolution. In: Proceedings of 2012 IEEE Symposium on Security and Privacy (S&P), pp. 95–109 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zeyar Aung .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Alwahedi, S., Al Ali, M., Ishowo-Oloko, F., Woon, W.L., Aung, Z. (2017). Security in Mobile Computing: Attack Vectors, Solutions, and Challenges. In: Agüero, R., Zaki, Y., Wenning, BL., Förster, A., Timm-Giel, A. (eds) Mobile Networks and Management. MONAMI 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 191. Springer, Cham. https://doi.org/10.1007/978-3-319-52712-3_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-52712-3_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-52711-6

  • Online ISBN: 978-3-319-52712-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics