Security in Mobile Computing

Security in Mobile Computing

Venus W. Samawi (Amman Arab University, Jordan)
DOI: 10.4018/978-1-4666-8751-6.ch085
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.
Chapter Preview
Top

Mobile Computing

Mobile computing is a term that refers to a set of computing operations that allows information accessing anytime, from any place, using any mobile device (laptops, tablets, or smartphones). If the information to be accessed is local, then the user is working under disconnected mode operation. When the device is connected to a network through wireless or wired connection, in this case the user is working under connected mode. Nowadays, mobile devices play an essential role in human daily lives. This is attributed to the availability of different forms of mobile communications (viz. 3G, 4G, GPRS, Bluetooth and Wi-Fi) that enable users to access various ubiquitous services regardless of time (Deepak & Pradeep, 2012). The main challenges faced by the mobile devices are limitation of their resources (viz. battery life, storage, and bandwidth) which affect the service qualities and communications (viz. mobility and security).

The availability of small powerful computing devices, improved telecommunication and specialized software helped the prevalence process of mobile computing (Deepak, 2012). The main mobile computing characteristics are common with other technologies. But they are of special importance to the mobile computing (Agrawal et al, 2003; Deepak & Pradeep, 2012; Nosrati et al, 2012).

  • Portability: The ability of the device to operate consistently during its move. It can operate at any time and in any place. Therefore, rechargeable batteries are needed to support working for several hours without needing any external charger

  • Data Connection: The networking infrastructure that allows digital connection to the Internet for transmitting and receiving data. Mobile connectivity could be cellular connection (GSM, CDMA or GPRS, 3G, and 4G networks), WiFi connection (accessed through a private business network or through public hotspot), or Satellite Internet access.

  • Social Interactivity (Interactivity): The collective cooperation and data exchanging between users.Here, data denotes files transfer, emails, facsimile, and accessing WWW. Interactivity is more important for mobile devices, since they have less computing power than other types of technology.

  • Individuality: A basic component in mobile computing, which providing communication services between individuals. Basically, mobile devices are designed for individuals

Complete Chapter List

Search this Book:
Reset